diff --git "a/results_retrieval/emb_bge_base/retrieval_recursivecharacterchunker_openparsegpu.json" "b/results_retrieval/emb_bge_base/retrieval_recursivecharacterchunker_openparsegpu.json" new file mode 100644--- /dev/null +++ "b/results_retrieval/emb_bge_base/retrieval_recursivecharacterchunker_openparsegpu.json" @@ -0,0 +1,22210 @@ +[ + { + "top_k": 10, + "mrr": 0.4291044973544974, + "recall": 0.6366666666666667, + "count_empty_strings": 4 + }, + [ + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", + "target_page": 2, + "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. \n\n**Transitional provision**\n\n**3.**—(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an \naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 \nis treated as beginning on 13th May 2020 and ending on 31st December 2020. \n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the \ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period \nbeginning with that date, it is to be apportioned— \n\n(a) on a time basis according to the respective length of the periods, or \n(b) if that method would produce a result that is unjust or unreasonable, on a just and \n\nreasonable basis. \n\n*David Rutley*\n*Maggie Throup*\nTwo of the Lords Commissioners of Her Majesty’s Treasury 20th April 2020 \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those \n\n(**a**) “Financial account” and “reporting financial institution” are defined in the table in regulation 24(2) of the principal \nRegulations. \n(**b**) “The DAC” is defined in regulation 1(3)(a) of the principal Regulations.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "S T A T U T O R Y I N S T R U M E N T S \n\n\n \n \n \n \n [html]\n
Thenternational
ax ComDevelopment ( Accuracy expensions )ndmen
RegTableMade
.-20th Apri
0Laid beforee House of
Comm21st Apri0
\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— \n\n(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**)", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "(o) New Accounting Standards \nA new Japanese accounting standard “Impairment of Fixed Assets” \nwas issued in August 2002 that is effective for fiscal years beginning \non or after April 1, 2005. The new standard requires that tangible and \nintangible fixed assets be carried at cost less depreciation, and be \nreviewed \nin \ncircumstances indicate that the carrying amount of an asset may not \nbe recoverable. Companies would be required to recognize an \nimpairment loss in their income statement if certain indicators of \nasset impairment exist and the book value of an asset exceeds the \nundiscounted sum of future cash flows of the asset. The Company is \ncurrently assessing the impact of this new accounting standard on its \nfinancial position and operating results. (m) Derivative financial instruments \nThe Company and certain consolidated subsidiaries have entered into \nvarious derivative transactions in order to manage certain risks arising \nfrom adverse fluctuations in foreign currency exchange rates, interest \nrates, and stock and commodity prices. Derivative \nfinancial \ninstruments are carried at fair value with changes in unrealized gain \nor loss charged or credited to operations, except for those which \nmeet the criteria for deferral hedge accounting under which \nunrealized gain or loss is deferred as an asset or a liability. \nReceivables and payables hedged by qualified forward foreign \nexchange contracts are translated at the corresponding foreign \nexchange contract rates. \n\nfor impairment whenever events or changes \n\n2. ACCOUNTING CHANGES", + "page_start": 78, + "page_end": 78, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "The accounting pronouncements we adopted that had an impact on \nour financial results or require further explanation are explained as \nfollows: \n(cid:129)*IFRS 10, Consolidated Financial Statements (IFRS 10)*– As a result of \nthe adoption of \nIFRS 10, we have changed our approach to \ndetermining whether we have control over and consequently \nwhether we consolidate our investees. IFRS 10 introduces a new \ncontrol model that is applicable to all investees. Among other things, \nit requires the consolidation of an investee if we control the investee \non the basis of de facto circumstances. \nIn accordance with the \ntransitional provisions of \nIFRS 10, we re-assessed the control \nconclusion for our investees at January 1, 2013. We made no \nchanges in the current or comparative period as a result of this \nassessment. \n\n(cid:129)*IFRS 11, Joint Arrangements (IFRS 11)*– As a result of the adoption of \nIFRS 11, we have changed how we evaluate our interests in joint \narrangements. Under IFRS 11, we classify our interests in joint \narrangements as either joint operations or joint ventures depending \non our right to the assets and obligations for the liabilities of the \narrangements. When making this assessment, we consider \nthe \nform of any separate \nstructure of \nvehicles, the contractual terms of the arrangements and other facts \nand circumstances. We have re-evaluated our involvement in our \njoint arrangements and have accounted for these either using the \nproportionate \nequity method \ndepending on whether the investment is defined as a joint operation \nor a joint venture, respectively. The adoption of IFRS 11 was not \nmaterial to the current or comparative year. \n\nthe arrangements, the legal \n\n*Instruments: Presentation (IAS 32)*– In December \n2011, the IASB amended IAS 32 to clarify the meaning of when an \nset-off. The \nentity has a current \namendments are effective for annual periods beginning on or after \nJanuary 1, 2014 and are required to be applied retrospectively. We \ndo not expect this to have a significant impact on our consolidated \nfinancial statements. \n\nlegally enforceable right of \n\n(cid:129)*IAS 39,*\n\n*Instruments: Recognition and Measurement*\n*(IAS 39)*– In June 2013, the IASB amended IAS 39 to provide relief \nfrom discontinuing an existing hedging relationship when a novation \nthat was not contemplated in the original hedging documentation \nmeets specific criteria. The amendments are effective for annual \nperiods beginning on or after January 1, 2014 and are required to be \napplied retrospectively. We are assessing the impact of \nthis \namendment on our consolidated financial statements. \n\n*Financial*", + "page_start": 104, + "page_end": 104, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**4. Future Accounting Policy Changes**\n\nIFRS 9 ‑ Financial Instruments (“IFRS 9”) \n\nIFRS 9, as issued in 2010, reflects the first phase of the IASB’s work on the replacement of IAS 39 and applies to classification and \nmeasurement of financial assets and financial liabilities as defined in IAS 39. The standard was initially effective for annual periods beginning \non or after January 1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7, \ncontaining the effective date and transition provisions was amended to remove the mandatory effective date of IFRS 9. This was intended \nto provide sufficient time for preparers to make the transition to the new requirements. The Company may still choose to apply IFRS \nimmediately, but is not required to do so. In subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the \nfirst phase of IFRS will have an effect on the classification and measurement of the Company’s financial assets, but will not have an impact \non the classification measurements of financial liabilities. The Company is in the process of assessing the impact IFRS 9 may have on future \nfinancial statements. \n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”) \n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant \nlegislation, occurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing \nthe impact IFRIC 21 may have on future financial statements.", + "page_start": 76, + "page_end": 76, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Future Accounting Policy Changes**\n\nIFRS 9 ‑ Financial Instruments (“IFRS 9”) \n\nIFRS 9, as issued in 2010, reflects the first phase of the IASB’s work on the replacement of IAS 39 and applies to classification and measurement \nof financial assets and financial liabilities as defined in IAS 39. The standard was initially effective for annual periods beginning on or after January \n1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7, containing the effective date \nand transition provisions, was amended to remove the mandatory effective date of IFRS 9. This was intended to provide sufficient time for \npreparers to make the transition to the new requirements. The Company may still choose to apply IFRS immediately, but is not required to do so. \n\nIn subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the first phase of IFRS will have an effect on the \nclassification and measurement of the Company’s financial assets, but will not have an impact on the classification measurements of financial \nliabilities. The Company is in the process of assessing the impact IFRS 9 may have on future financial statements. \n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”) \n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant legislation, \noccurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing the impact IFRIC \n21 may have on future financial statements. \n\n**Disclosure Controls and Procedures and Internal Controls**\n\nThe Company’s management, including the Chief Executive Officer and the Chief Financial Officer, does not expect that the Company’s Disclosure \nControls and Procedures and Internal Controls will prevent or detect all error and all fraud. Because of the inherent limitations in all control \nsystems, an evaluation of controls can provide only reasonable, not absolute, assurance that all control issues and instances of fraud or error, if \nany, within the company have been detected. \n\n*Disclosure Controls and Procedures*\nAs of December 31, 2013, the Company’s management evaluated the effectiveness of the operation of its disclosure controls and procedures \n(“Disclosure Controls”), as defined under rules adopted by the Canadian Securities Administrators. This evaluation was performed under the \nsupervision of, and with the participation of, the Chief Executive Officer and the Chief Financial Officer. \n\nDisclosure controls and procedures are designed to ensure that information required to be disclosed in documents filed with securities \nregulatory authorities is recorded, processed, summarized and reported on a timely basis, and is accumulated and communicated to the \nCompany’s management, including the Chief Executive Officer and the Chief Financial Officer, as appropriate, to allow timely decisions regarding \nrequired disclosure. \n\nBased on the evaluation of Disclosure Controls, the Chief Executive Officer and the Chief Financial Officer have concluded that, subject to the \ninherent limitations noted above, the Company’s Disclosure Controls are effective in ensuring that material information relating to the Company \nand its consolidated subsidiaries is made known to the Company’s management on a timely basis by others within those entities, and is included \nas appropriate in this mD&a. \n\n*Internal Controls over Financial Reportin*g \nInternal controls over financial reporting (“ICFR”) are designed to provide reasonable assurance regarding the reliability of the Company’s \nfinancial reporting and its preparation of financial statements for external purposes in accordance with IFRS. Management’s documentation and \nassessment of the effectiveness of the Company’s ICFR continues as of the date of this MD&A with the focus on processes and controls in areas \nidentified as being “key risks”.", + "page_start": 62, + "page_end": 62, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "[html]b.Foreign currency translationc. RevenueDeferred tax assets and liabilities are offset if there is a legally enforceable right to offset current tax liabilities and assets, and they relate to income taxes levied by the same tax authority on the same taxable entity.( i )Transactions and balancesRevenue is measured at the fair value of the consideration received or receivable. Sales revenue represents the net proceeds receivable from the buyer.Foreign currency transactions are translated into the respective functional currencies of the Group entities at exchange rates on the dates of the transactions. Foreign exchange gains ands resulting from the settlement of such actions and from the translation at year - exchange rates of monetary assets and thes. denominated in foreien cverses.UUU GUU STITTT SGITSthe distribution of cash dividends are recognised at the same time that the liability to pay the related dividend is recognised.reAngued in the profit or loss, except when are deferred in equity as qualifying cash hedges and qualifying net investmentcompleted. Transportation and refinery costs are expensed when incurred.Tax consolidationhedges or are attributable to part of the netd. Income taxgroup with effect from 1 July 2003 and areinvestment in a foreign operation.Income tax expense comprises current and deferred tax. Current tax and deferred tax istherefore taxed as a single entity from that date. The head entity within the tax - consolidation group is Kingsgate Consolidated Limited.Translation differences on assets and liabilities carried at fair value are reported as part of the fair value gain or loss. Translation differences on non - monetary assets and liabilities such as society.deferred tax. Current tax and deferred tax is recognised in profit or loss except to the extent that it relates to a business combination, or items recognised directly in equity or in other comprehensive income.group is Kingspate Consolidated Limited. Current tax expense or benefit, deferred assets and deferred tax liabilities arising fare recognised in profit or loss as part of the fair value gain or loss. Translation differences on non - monetary assets are included in the fair value reserve in equity.Current tax is the expected tax payable or receivable on the taxable income or loss for the year, using tax rates enacted or substantively enacted at the reporting date, and any adjusttax - consolidation group are recognised in the separate financial etatements of the members of the tax - consolidation group using the “ stand alone taxpayer ” approach by reference to the carrying amounts in the separate financial stataExchange gains and losses which arise on balances between Group entities are talen toment to tax payable in respect of previous years. Deferred tax is provided using the liabilitythe foreign currency translation reserve where the intra - group balances are in substance part of the Group ’ s net investment. Where as a result of ‘ vehous in rinvertment.’ snewinvelved wholen.method, providing for temporary differences between the carrying amounts of assets and liabilities for financial reporting purposes and1.7 ° Current tax assets or liabilities and deferred tax assets arising from unused tax losses assumeda change in circumstances, a previously designated intra - group balance is intended to be settled in the foreseeable future, the intra - groupthe amounts used for taxation purposes. The amount of deferred tax provided is based on the expected manner of realisation or settlement ofby the", + "page_start": 70, + "page_end": 70, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "future, the intra - groupthe amounts used for taxation purposes. The amount of deferred tax provided is based on the expected manner of realisation or settlement ofby the head entity from the subsidiaries in the tax - consolidation group, are recognised as amounts receivable or payable to other entities in the tax - consolidation group in conjunctionbalance is no longer regarded as part of net investment. The exchange differences for suchthe carrying amount of assets and liabilities, using tax rates enacted or substantively enactedin the tax - consolidation group in conjunction with any tax funding agreement amounts.balance previously talken directly to the foreign currency translation reserves are recognised inat the reporting date.Specificationsthe profit or loss.A deferred tax asset is recognised for unused taxarising from unused tax losses of the tax - consolid( II )Foreign operationsdifferences, to the extent that it is probable that future taxable profits will be available against which they can be utilised. Deferred tax assetsthat future taxable profits of the tax - consolidation group will be available against which the asset can be utilised.Group entities ( none of which has the currency of a hyperinflationary economy ) that have aare reviewed at each reporting date and are reduced to the extent that it is no lionger nrut at atrigitistical attending trials lieve a functional currency different from the presenta -reduced to the extent that it is no longer probable that the related tax benefit will be realised.Tax funding and sharing agreementstion currency are translated into the presenta -tion currency as follows :Deferred tax is not recognised for :I ' N INImbers of the GIX - consolidation g70. up have entered into a funding agreement that sets out the funding obligations of members of theO the assets and liabilities of the foreign opera -• temporary differences on the initial recogni -tions, including goodwill and fair value adjustments arising on acquisition, aretion of assets or liabilities in a transaction that is not a business combination and thattranslated at the year - end exchange rate ;affects neither accounting nor taxable profit≥ 3 the income and expenses of foreign operationTabletions are translated at average exchangeOral differences related to invest -by the head entity, resulting in the head entity recognising an intra - group receivable or payable in the separate financial statements of therates ( unless this is not a reasonable approximation of the cumulative effect of the ratements in subsidiaries where the Company is able to control the timing of the reversal ofphenening, or not senses, on senses, on sense, non - case income and expenses are translated at the dates of the transactions ); andthe temporary differences and it is probable that they will not reverse in the foreseeable future ; and9 foreign currency differences are recognised in other comprehensive income, and presentedX taxable temporary differences ar initial recognition of goodwill.", + "page_start": 70, + "page_end": 70, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "a) As described in Note 2(b), effective April 1, 2003, Nissan Motor Manufacturing (UK) Ltd., a consolidated subsidiary, implemented early \nadoption of a new accounting standard for retirement benefits in the United Kingdom. The effect of this change was to decrease operating \nincome in the “Automobile” segment by ¥1,686 million for the year ended March 31, 2004 as compared with the corresponding amount which \nwould have been recorded if the previous method had been followed. \n\nb) As described in Note 2(c), effective April 1, 2003, the Company and its domestic consolidated subsidiaries changed their method of \naccounting for noncancelable lease transactions which transfer substantially all risks and rewards associated with the ownership of assets, \nfrom accounting for them as operating leases, to finance leases. The effect of this change was to decrease sales and operating expenses in \nthe “Automobile” segment by ¥237 million and ¥21,805 million respectively, to increase operating income, total assets, depreciation expense \nand capital expenditures in the “Automobile” segment by ¥21,568 million ¥136,522 million, ¥46,986 million and ¥55,581 million, respectively, \nto decrease sales and operating expenses and capital expenditures in the “Sales Financing” segment by ¥33,351 million, ¥33,374 million and \n¥29,716 million, respectively, to increase operating income, total assets and depreciation expense in the “Sales Financing” segment by ¥23 \nmillion, ¥662 million and ¥292 million, respectively, and to increase sales and operating expenses in “Eliminations” by ¥15,645 million for the \nyear ended March 31, 2004 as compared with the corresponding amounts which would have been recorded if the previous method had been \nfollowed.", + "page_start": 94, + "page_end": 94, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", + "target_page": 2, + "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**Pension Obligations**\nOur retiree pension plans had a funding deficit of approximately $172 \nmillion at December 31, 2013. We have been making special minimum \nmonthly payments in addition to our regular contributions to eliminate \nthe pension liability. During 2013, our funding deficit was reduced by \n$162 million. \n\naccrued obligations in the future. See*Critical accounting estimates*for \nmore information. \n\n*Purchase of Annuities*\nFrom time to time we have made additional lump-sum contributions to \nour pension plans, and the pension plans have purchased annuities \nfrom insurance companies to fund the pension benefit obligations for \ncertain groups of \nretired employees in the plans. Purchasing the \nannuities relieves us of our primary responsibility for that portion of \nthe accrued benefit obligations for the retired employees and eliminates \nthe significant risk associated with the obligations. \nThe special payments, including contributions associated with benefits \npaid from the plans, were approximately $7 million in 2013. We expect \nour total estimated funding requirements to be $96 million in 2014 and \nto be adjusted annually thereafter, based on various market factors \nsuch as interest rates and expected returns and staffing assumptions. \n\nWe did not make any additional lump-sum contributions to our pension \nplans in 2013 or 2012, and the pension plans did not purchase \nadditional annuities. \nChanges in factors such as the discount rate, increase in compensation \nand the expected return on plan assets can affect the accrued benefit \nobligation, pension expense and the deficiency of plan assets over \n\n\n \n \n \n \n [html]\n
CategoriesThe risk it managesTypes of derivative instruments
Debt Derivatives• Impact of fluctuations in foreign exchange rates on principal and interest payments for US denominated long - term debt• Cross - currency interest rate exchange agreements • Forward foreign exchange agreements ( from time to time, as applicable )
Expenditure Derivatives• Impact of fluctuations in foreign exchange rates on forecasted US dollar denominated expenditures• Forward foreign exchange agreements
Equity Derivatives• Impact of fluctuations in share price on stock - based compensation expense• Total return swap agreements
\n\n*New Debt Derivatives to Hedge Senior Notes Issued In 2013*\n\nUS$ Hedging effect \n\nUS$ Principal/ \nnotional amount \n(millions) \nFixed \nhedged Cdn.$ \nCdn$ \nequivalent \n(millions) Maturity \ndate Coupon \nrate Effective date interest rate 1 \nMarch 7, 2013 US$ 500 2023 3.00% 3.60% $ 515 \nMarch 7, 2013 US$ 500 2043 4.50% 4.60% $ 515 \n\nWe also manage our exposure to fluctuating interest rates and we have \nfixed the interest rate on 95.3% of our debt including short-term \nborrowings at December 31, 2013 (2012 – 100%). \nAll of our Debt Derivatives currently outstanding have been designated \nas effective hedges against \nforeign exchange risk for accounting \npurposes as described below and in note 20 to the consolidated \nfinancial statements. \n\n**Debt Derivatives**\nWe use cross currency interest exchange agreements (Debt Derivatives), \nto hedge the foreign exchange risk on all of the principal and interest \nobligations of our US dollar denominated senior notes and debentures. \nAt December 31, 2013 we used Debt Derivatives to hedge the foreign \nexchange risk on 100% of the principal and interest obligations on all \nour US dollar denominated debt. We use Debt Derivatives for risk \nmanagement purposes only. \nSubtotal US$ 1,000 $ 1,030", + "page_start": 65, + "page_end": 65, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the funding, administration, communication and \ninvestment management of the plans \n(cid:129) selecting and monitoring the performance of all \n\nthird parties \nperforming duties in respect of the plans, including audit, actuarial \nand investment management services \n(cid:129) proposing, considering and approving amendments to the defined \nbenefit pension plans \n(cid:129) proposing, considering and approving amendments of the Statement \nof Investment Policies and Procedures \n(cid:129) reviewing management and actuarial reports prepared in respect of \nthe administration of the defined benefit pension plans \n(cid:129) reviewing and approving the audited financial statements of the \ndefined benefit pension plan funds.", + "page_start": 121, + "page_end": 121, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. \n\n**Transitional provision**\n\n**3.**—(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an \naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 \nis treated as beginning on 13th May 2020 and ending on 31st December 2020. \n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the \ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period \nbeginning with that date, it is to be apportioned— \n\n(a) on a time basis according to the respective length of the periods, or \n(b) if that method would produce a result that is unjust or unreasonable, on a just and \n\nreasonable basis. \n\n*David Rutley*\n*Maggie Throup*\nTwo of the Lords Commissioners of Her Majesty’s Treasury 20th April 2020 \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those \n\n(**a**) “Financial account” and “reporting financial institution” are defined in the table in regulation 24(2) of the principal \nRegulations. \n(**b**) “The DAC” is defined in regulation 1(3)(a) of the principal Regulations.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Parliament may make provision under which, if the Appropriation Act in respect \nof any financial year has not come into operation by the beginning of that financial year, \nthe President may authorize the withdrawal of moneys from the Consolidated Fund for \nthe purpose of meeting expenditure necessary to carry on the services of the \nGovernment until the expiration of four months from the beginning of that financial year \nor the coming into operation of the Appropriation Act, whichever is the earlier. \n**121. Contingencies Fund**\n\n(1) Parliament may make provision for the establishment of a Contingencies \n\nFund and for authorizing the President, if satisfied that there has arisen an urgent and \nunforeseen need for expenditure for which no other provision exists, to make advances \nfrom that Fund to meet that need. \n\n(2) Where any advance is made from the Contingencies Fund, a supplementary \nestimate shall be laid before the National Assembly as soon as possible for the purpose \nof replacing the amount so advanced.", + "page_start": 51, + "page_end": 51, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "The Company maintains a nonqualified deferred retirement plan for certain key \nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their \nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on \nthe deferred balances, as a retirement fund. Participants receive a Company match of \nup to 4% of salary, net of any Company match received under the Company’s 401(k) \nplan. All employee deferrals vest immediately. The Company matching contributions \nvest ratably over a three-year period. The Company recorded charges for matching \ncontributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002.", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**Hedging Reserve**\nWe measure all derivatives at fair value on the consolidated statements \nof financial position, and record changes in fair value of cash flow \nhedging derivatives in the fair value reserve as a component of equity \nthrough other comprehensive income, if the derivatives are effective \nand until we recognize the hedged asset or liability in net income. \n\n**Defined Benefit Pension Plans**\nOur defined benefit pension plan obligation is actuarially determined at \nthe end of the year, and we recognize remeasurements in other \ncomprehensive income and retained earnings. \n\nThe holders of Class A shares are entitled to receive dividends at the \nrate of up to five cents per share but only after dividends at the rate of \nfive cents per share have been paid or set aside on the Class B shares. \nClass A Voting and Class B Non-Voting shares therefore participate \nequally in dividends. \n\n**Normal Course Issuer Bid**\nIn February 2013, we renewed our normal course issuer bid. During the \n12-month period commencing February 25, 2013 and ending \nFebruary 24, 2014, we may purchase on the TSX, the NYSE and/or \nalternative trading systems up to the lesser of 35.8 million Class B Non- \nVoting shares, representing approximately 10% of the then issued and \noutstanding Class B Non-Voting shares, and that number of Class B \nNon-Voting shares that can be purchased under the normal course \nissuer bid for an aggregate purchase price of $500 million. The actual \nnumber of Class B Non-Voting shares purchased, if any, and the timing \nof such purchases will be determined by considering market conditions, \nshare prices, our cash position, and other factors.", + "page_start": 123, + "page_end": 123, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]Deferred pension liability( 33 )( 33 )\n
provide these benefits for our funded plans at December 31.2013 and 2012.2013
2012Plan assets, at fair value$
37$833
Accrued benefit obligationsTable≥ 09
1.167Deficiency of plan assets over accrued benefit obligationsEffect of asset ceiling limit( 172 )
( 334 )Net deferred pension liability$
( 181 )$( 334 )
Consists of :Deferred pension asset$
8$9
( 189 )( 343 )Net deferred pension liability
$( 181 )$
( 334 )The table below shows our pension fund assets for the years ended 2013 and 2012.2013
2012Plan αossets, January 1$
833$684
Interest income4040
Remeasurements, return on plan assets recognized in othercomprehensive income and equity65
37Contributions by employees26
22Contributions by employer101
85Benefits paid( 26 )
Administrative expenses paid from plan assets( 2 )( 2 )
Plan assets, December 31$1.037
$833The table below shows the accrued benefit obligations arising from
funded obligations for the years ended December 31.2013 and 2012.13 ar12.1
20132012Accrued benefit obligations, January 1
$67$
817Service cost71
46Interest cost52
45Benefits paid( 26 )
Contributions by employees2623
Remeasurements, recognized in other comprehensiveincome and equity( 81 )
269Accrued benefit obligations, December 31$
1.209$. 167
\n\nThe assets of the defined benefit pension plans are invested and \nmanaged following all applicable regulations and the Statement of \nInvestment Policies and Procedures, and reflect the characteristics and \nasset mix of each defined benefit pension plan. Investment and market \nreturn risk is managed by: \n(cid:129) contracting professional \n\nto execute the \ninvestment strategy following the Statement of Investment Policies \nand Procedures and regulatory requirements \n\ninvestment managers \n\n(cid:129) specifying the kinds of investments that can be held in the plans and \nmonitoring compliance \n\n(cid:129) using asset allocation and diversification strategies, and \n(cid:129) purchasing annuities from time to time. \n\nThe funded pension plans are registered with the Office of \nthe \nSuperintendent of Financial Institutions and are subject to the Federal \nPension Benefits Standards Act. The plans are also registered with the \nCanada Revenue Agency and are subject to the Canada Income Tax \nAct. The benefits provided under the plans and the contributions to the \nplans are funded and administered in accordance with all applicable \nlegislation and regulations.", + "page_start": 121, + "page_end": 121, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Once such stipulations are satisfied, the associated net assets are released from net assets with donor restrictions and recognized as net assets without donor restrictions.
Contributions received are recorded as net assets without donor restriction or net assets with donor restrictions depending on the existence and / or nature of any donor restrictions.
( e ) Cash and Cash EquivalentsThe Foundation manages is can through major hipsensia Indickiness, it, June 3.2014 and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2012, the foundary and 2013, the paperson and 2013, the foun
ΩRestricted CashRestricted cash includes standby letters of credit for ( 1 ) the Foundation ’ s headquarters office lease and ( 2 ) one of the Foundations Employee of Resociate responsible for administering compensation and benefits fore
( g ) Contributions ReceivableContributions receivable represent glit amounts due from rainous enfiles, which are occasionally directed at specific activities. Contitudions receivable due more than one year from the contribution data and discussived to present
Xh )Investments
The Foundation ' s policy regarding investments is to invest cash in short - term, intermediate - lerm, and long - term feed income, and equity instruments without assuming material undual roles to principal. Preservation of principal anThe Foundation presents its investment portfolios as short - term and long - term based on expectations
", + "page_start": 8, + "page_end": 8, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Tenure of office of Director of Public Prosecutions \nTenure of office of Auditor-General \nPensions laws and protection of pensions rights \nPower of Commissions in relation to pensions, etc. \n\nCHAPTER VIII \nFinance \n\nConsolidated Fund \nWithdrawals from Consolidated Fund or other public funds \nAuthorization of expenditure \nAuthorization of expenditure in advance of appropriation \nContingencies Fund \nRemuneration of certain officers \nPublic debt \nAuditor-General \n\nCHAPTER IX \nMiscellaneous \n\nResignations \nReappointments and concurrent appointments \nInterpretation \n\nFirst Schedule - Election of Specially Elected Members of the National \nAssembly \nSecond Schedule - Division of Districts into regions for the purpose of \nselecting Members of Ntlo ya Dikgosi \n\nL.N. 83, 1966, \nAct 30, 1969, \nAct 43, 1969, \nAct 25, 1970, \nAct 28, 1972, \nAct 24, 1973, \nAct 28, 1978, \nS.I. 25, 1980, \nAct 32, 1982, \nAct 1, 1983, \nAct 22, 1987, \nS.I. 37, 1991, \nAct 27, 1992, \nS.I. 51, 1993, \nS.I. 119, 1993, \nAct 16, 1997, \nAct 18, 1997, \nAct 1, 1999, \nAct 2, 2002, \nAct 12, 2002, \nAct 9, 2005, \nS.I. 91, 2006.", + "page_start": 3, + "page_end": 3, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The cost of pensions is actuarially determined and takes into account
the following assumptions and methods for pension accounting related to our defined benefit plans :
• the expected rates of salary increases for calculating increases in future benefits
• mortality rates for calculating the life expectancy of plan members, and
• past service costs from plan amendments are immediately expensed in net income.
We recognize contributions to defined contribution plans as an employee benefit experse in operating costs in the consolidated statements of income in the periods the employees provide the related senices.
See note 22 for more information about our pension plans.
Termination Benefits
We recognize termination benefits as an expense when we are committed to a formal detailed plan to terminate employment before the normal retirement date and it is not realistic that we will withdraw it.
Property, Plant and Equipment
Recognition and Measurement
We recognize property, plant and equipment at cost, less accumulated depreciation and accumulated impairment losses.
Cost includes expenditures that are directly attributable to the acquisition of the asset. The cost of self - constructed assets also includes :
• the cost of materials and direct labour
· costs directly associated with bringing the assets to a working condition for their intended use
· costs of dismantling and removing the items and restoring the site where they are located ( see Provisions, above ), and • borrowing costs on qualifying assets.
We use estimates to determine certain costs that are directly attributable to self - constructed assets. These estimates primarily includecertain internal and external direct labour associated with the acquisition, construction, d
They also include interest costs, which we capitalize to certain property, plant and equipment during construction and development.
We use significant estimates to determine the estimated useful lives of property, plant and equipment, considering industry tends such as technological advancements, our past experience, our expected use and our review of asset lives
", + "page_start": 101, + "page_end": 101, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", + "target_page": 1, + "target_passage": "the bind- ing energy and scattering resistance of the molecules", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] �� E[X] − E[M@VC], \n(3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "To estimate the effect of adsorbates on the electrical con- \nductance of doped CNTs, we first consider the change in con- \nductance when a single molecule is adsorbed on a metal site of \nan otherwise pristine CNT. In Fig. 2(b) we show the calculated \nchange in conductance relative to the metal site with no ad- \nsorbate. In contrast to the binding energies, there are no clear \ntrends in the conductances. The sensitivity of the conductance \nis perhaps most clearly demonstrated by the absence of cor- \nrelation between different types of vacancies, i.e. between the \nthree panels in Fig. 2(b). Close to the Fermi level, the conduc- \ntance of a perfect armchair CNT equals 2G0. The presence \nof the metal dopant leads to several dips in the transmission \nfunction known as Fano antiresonances [20]. The position \nand shape of these dips depend on the d-levels of the transi- \ntion metal atom, the character of its bonding to the CNT, and \nis further affected by the presence of the adsorbate molecule. \nThe coupling of all these factors is very complex and makes \nit difficult to estimate or rationalize the value of the conduc- \ntance. For the spin polarized cases, we use the spin-averaged \n\nWe now return to the discussion of the validity of Eq. (7). \nAs mentioned, the series coupling of individual scatterers \nshould be valid when lφ < d. However, even for lφ > d \nand assuming that the Anderson localization length, lloc in \nthe system exceeds lφ, Eq. (7) remains valid if one replaces \nthe actual resistance R by the sample averaged resistance (cid:104)R(cid:105) \n[29]. At room temperature under ambient conditions, interac- \ntions with external degrees of freedom such as internal CNT \nphonons and vibrational modes of the adsorbed molecules \nwould rapidly randomize the phase of the electrons. There- \nfore Eq. (7) should certainly be valid in the limit of low dop- \ning concentrations. On the other hand, the total number of \ndopants, N , should be large enough for the statistical treat- \nment of the coverage to hold. Finally, we stress that Eq. (7) \nrepresents a conservative estimate of the change in resistance. \nIn fact, in the regime where lφ > lloc, i.e. in the Anderson \nlocalization regime, the resistance would be highly sensitive \nto changes in the fractional coverage of active sites. Calcula- \ntion of the actual resistance of the CNT in this regime would, \nhowever, involve a full transport calculation in the presence of \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "All total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) \n\nwhere E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT]", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Typical KMC results for the final dried-in nanoparticle structures resulting from the evaporative \n\ndewetting processes of nanoparticle solutions (nanofluids) in the case of (a) a spinodal-like process at µ = \n\n−2.55, (b) nucleation and growth of holes at µ = −2.3, (c) unstable fronts at µ = −2.3 and low mobility \n\nM = 5, and (d) unstable fronts at µ = −2.3 and medium mobility M = 10. The starting configuration in \n\n(a) and (b) is a homogeneous liquid film with uniformly distributed particles whereas in (c) and (d) a hole \n\nat the center is nucleated ‘by hand’. The remaining parameters are (a,b) M = 50, (cid:15)nl = 2.0, (cid:15)nn = 1.5, \n\nn = 0.2, kT = 0.3, MC steps= 500, domain size 1200 × 1200; (c,d) εnn = 2.0, (cid:15)nl = 1.5, ρav \nρav n = 0.2, \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 10, + "page_end": 10, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. \n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-", + "page_start": 22, + "page_end": 22, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", + "target_page": 3, + "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "-0.5 \n) \n1 \n- \nPair Fraction \nL \n\n. \nl \no \nm \n-1 \n( \n0.2 \nx \ne \nv \nf \nβ \n0.1 \n\n-1.5 \n0 1 0.5 \n\n3 \n\n2 \n\n1 \n\n0 \n\n(b) \n3 \n\n2 \n\n1 \n\n0 \n\n4 8 6 10 \nr (Å) \n\nFIG. 3: Effective pair potentials derived for MSA3 and \nBIMSA3. (a) Cation anion (dashed line: without taking the \npair into account), (b) pair cation, (c) pair anion, and (d) pair \npair. The internal potential of the pair β eVint(r) is set equal \nto βV eff ij (r) for distances less than 4 ˚A. \n\n0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. \n\ntrapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, \n\n3i (k) = \nV SR \n33 (k) = \nV SR \ne \ne \nwhere \n\n(k), \nw(k/2) \n1i + V SR \nV SR \n2i \n(cid:3) \n(cid:2) \nw(k/2)2 \n22 + 2V SR \n11 + V SR \nV SR \ne \n12 \n(cid:2) \ni = 1, 2 \n(k) \n\n(2a) \n\n(2b) \n(cid:3) \ne \nw(r) is the pair probability distribution \n\n\n \n \n \n \n [html]\n
TablePatientsTable1.
Parameters.FigureP
PatientsPatientsTableTable
Table=TableTable
\n\nwe have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne \n\nw(k) (1 − δij ) + \nρ3 \nw(k/2) \ng3j \nρj \ng3i + \nρi \nρ3 \ne \ne \ne \ne \n(cid:2) \nw(k/2)]2 \ng33(k) \nρ 2 \n3 [ \ne \ne \ne \ne \ne \ngij(k) \n(k) \ne \n(cid:3) \n\nρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. \n\nmolecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. \n\n] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from \n\nSubtracting \nlong-range Coulombic potential \nV LR \nij (r) (which depends on the dielectric constant of the \nsolvent) from V eff \nij (r), we obtain the short-range contri- \nbution V SR \nij (r) to the effective potentials. These are given \nin Fig. 1 (species 1 and 2 refer to Na+ and Cl− free ions, \nrespectively). All the short-range potentials exhibit os- \ncillations corresponding to the solvent layering between \nthe ions, but this effect is particularly important for the \ncation-anion interaction: a considerable potential barrier \n(& 2kBT ) separates the first two attractive wells. To \nserve as a reference, Monte Carlo (MC) simulations were \nperformed with these effective potentials; a comparison \nbetween MD and MC RDF is also provided in Fig. 1. The \nexcellent agreement between both sets of RDF validates \nthe HNC inversion procedure [17], and allows us to com- \n\nthe", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "ρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to \n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the \n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to \n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term \n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal \n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three- \n\ndimensional models are also discussed in the literature [76, 77]. \n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied \n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", + "target_page": 3, + "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. \n\n**Day 8 tests: general test requirements**\n\n**8.**—(1) For the purposes of regulation 6(12)(b), a day 8 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 9. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which targets a minimum of \ntwo distinguishable SARS-CoV-2 genes other than the S gene and performance reference \ncontrols; \n\n(b) it is, in relation to a Schedule 11 passenger— \n\n(i) a test which requires laboratory processing, and \n(ii) a test which can be self-administered; \n\n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an extracted molecular method, \n(ii) has a specificity and a sensitivity greater than 95% (with a 95% two-sided \nconfidence interval entirely above 90%), and \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2) “validated”, in relation to a device, has the meaning \n\ngiven by paragraph 2(2) of Schedule 10. \n\n**Day 8 tests: private provider requirements**\n\n**9.**—(1) For the purposes of paragraph 8(1)(b)(iii), a private provider complies with this \n\nparagraph where— \n\n(a) they comply with the requirements of paragraph 3(1)(a) and (e) to (h) of Schedule 10 as if \nany reference in those provisions to an appropriate test were a reference to a day 8 test; \n(b) if the provider is a laboratory that conducts diagnostic test evaluation for testing in \naccordance with this Schedule, they have made a declaration to the Department of Health \nand Social Care that they meet the minimum standards for private sector-provided testing \nat https://support-covid-19-testing.dhsc.gov.uk/InternationalTesting; \n\n(c) they have provided the Department of Health and Social Care with a list of all \norganisations that they work with (whether by sub-contract or otherwise) to carry out the \ntesting service or to carry out genomic sequencing, indicating the nature of the service \nthat each organisation is providing and kept that list updated as appropriate; \n\n(d) in relation to a test which requires laboratory processing— \n\n(i) the person responsible for the taking of samples meets the relevant requirements for \naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the \ntaking of samples, and \n\n(ii) the laboratory used by the test provider for the processing of samples meets the \nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard \n17025 in respect of the processing of samples; \n\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f)", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(iii) a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per millilitre, \nand \n\n(iv) uses an established molecular detection method; \n\n(c) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, \n\n(ii) has been validated no more than 18 months before the test is administered or \nprovided to P; \n\n(d) it is not a test provided or administered under the National Health Service Act 2006, the \nNational Health Service (Wales) Act 2006(**a**), the National Health Service (Scotland) Act \n1978(**b**), or the Health and Personal Social Services (Northern Ireland) Order 1972(**c**); \nand \n\n(e) the test provider complies with paragraph 3. \n\n(2) For the purposes of sub-paragraph (1), “validated”, in relation to a device, means confirmed \nas having the required sensitivity and specificity using at least 150 positive clinical samples and \n250 negative clinical samples against a laboratory-based RT-PCR test that is itself within the \nperformance specification of the target product profile published by the Medicines and Healthcare \nProducts Regulatory Agency for laboratory based SARS-CoV-2 PCR tests, by— \n\n(a) the Secretary of State; \n(b) a laboratory which is accredited to ISO standard 15189 or ISO/IEC standard 17025(**d**) \n\nby— \n(i) the United Kingdom Accreditation Service(**e**) (“UKAS”), or \n(ii) an accreditation body that is a signatory to the International Laboratory Accreditation \nCooperation (“ILAC”) Mutual Recognition Arrangement(**f**) or the European co- \noperation for Accreditation (“EA”) Multilateral Agreement(**g**), \n\nother than a laboratory which processes tests provided by the test provider for the \npurposes of this Schedule or is owned by the test provider or the device manufacturer. \n(**h**); or \n\n(c) a laboratory which is accredited by UKAS to ISO standard 15189 or ISO/IEC standard \n17025(**i**), other than a laboratory which processes tests provided by the test provider for \nthe purposes of this Schedule or is owned by the test provider or the device manufacturer. \n\n\n \n \n \n \n [html]\n
Varenbl, Case possiale S6, CB - 1211, Geneva 23, Switzefand. BOREC : 17025 General requirements for the competence of testing and calbration laboratories was published in November 2017.( e )
The United Kingdom Accreditation Service is a company Imited by guarantee incorporated in England and Wales under number 3076 / 98.( f )
ILAC is an international organisation which coordinates the work of its signatory tational accreditation bodies which are themselves involved in the accreditation of conformity assessment bodies, testing laberatories, and medicat( g )
EA is a regional organisation which coordinates the work of its signatury national accreditation bodies. EA is recognised by and works closely with ILAC.( h )
A body comporate established under section 232 of the Health and Social Care Act 2012 ( c. 7 ).( i )
B50 standards are philed in Green by the Intranturials ( Opanisation for Standardisation, and an souble on their rebotin ( vews isosurg ) or at IRIs Comal Secontain. International Opanization for Standardization ( IBU ), I needs Vasophin
", + "page_start": 68, + "page_end": 68, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "you have been traced as a contact of someone who tested positive \n\nFor advice on when you might need \nto do, go \nwww.nhs.uk/conditions/coronavirus-covid-19 and read ‘Self-isolation and treating symptoms’. \n\nto self-isolate and what to \n\n**Form B: positive test result**\n\nYour coronavirus test result is positive. You had the virus when the test was done. \n\nEven if you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day \nafter your test date. Your test sample may be genome sequenced to check whether you have a \nvirus variant of concern or variant under investigation. \n\nPeople you live with or have travelled with should also self-isolate for 10 days from the day after \nyou took a test. \n\nIf you received a positive test result for the test taken you do not need to take any further tests. \nPeople you are travelling with must still take a day 8 test if they have travelled from an amber list \ncountry. \n\nYou may be contacted for contact tracing and to check that you, and those who you live or are \ntravelling with, are self-isolating. \n\nYou must not travel, including to leave the UK, during self-isolation. \n\nContact 111 if you need medical help. In an emergency dial 999. \n\n**Form C: unclear test result**\n\nYour coronavirus test result is unclear. It is not possible to say if you had the virus when the test \nwas done. \n\nYou must take another test or self-isolate for 10 days from the day after your test date. \n\nYou may be contacted to check that you are self-isolating. \n\n(4) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010 applies in \n\nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, \n\nthe regulation applies as if it required the information described in sub-paragraph (5) to be \nincluded in the notification to Public Health England. \n\n(5) The information mentioned in sub-paragraph (4) is— \n\n(a) the date on which P last departed from or transited through a category 2 country or \nterritory; \n\n(b) P’s coach number, flight number or vessel name (as appropriate); \n(c) the country or territory P was travelling from when P arrived in England, and any country \n\nor territory they transited through as part of that journey; \n\n(d) the date on which P undertook the appropriate test; \n(e) whether the test is— \n\n(i) a day 2 test for a category 1 arrival, \n(ii) a day 2 test for a person who is not a category 1 arrival, or \n(iii) a day 8 test.", + "page_start": 65, + "page_end": 65, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
“ passenger information ” has the meaning given in regulation 3 ( 1 );
“ Passenger Locator Form ” means the form published electronically by the Secretury of State for the provision of passenger information ( a );
“ port ”, except where the context otherwise requires, means —
( a ) any port ( including a seaport, airport or heliport ), or
( b ) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tumel Act 1987 / by ;
“ qualifying test ” means a test that is a qualifying test for the purposes of regulation 4 ;
“ relevant service ” means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service ;
“ Schedule 11 passenger ” means a passenger to whom Schedule 11 ( additional measures applicable to arrivals from category 3 countries or territories ) applies ;
“ self - isolate ” has the meaning given in regulation 9 ( 2 ), and “ self - isolation ” and “ self - isolating ” are to be construed accordingly.
“ the Self - Isolation Regulations ” means the Health Protection ( Coronavirus, Restrictions ) ( Self - Isolation ) ( England ) Regulations 20206 ( t )
“ sensitivity ”, in relation to a device, means how often the device correctly generates a positive result ;
“ shuttle service ” has the meaning given in section 1 ( 9 ) of the Channel Tumnel Act 1987 ;
“ specificity ”, in relation to a device, means how often the device correctly generates a negative result ;
“ tunnel system ” has the meaning given in section 1 ( 7 ) of the Channel Tumnel Act 1987.
r2 ) For the purposes of these Regulations, an individual has responsibility for a child if the dividual —
( a ) has custody or charge of the child for the time being, or
( b ) has parental responsibility for the child within the meaning given in section 3 of the Children Act 1989 / d ).
( 3 ) For the purposes of these Regulations, a person (? P ) is not treated as departing from or unsing through a country or tertions, or part of a country or territory, if P artives in and leaves at country, territory of part thereof by air, rail o
( a ) remains on the aircraft or vessel upon which P arrived and no other passenger is permitted to be taken on board ; or
( b ) remains on the train upon which P arrived and no other passenger is permitted to be taken on bourd the carriage in which P is travelling : or
( c ) is kept separated from passengers who did not arrive on the same aircraft, train or vessel as P, and no such passengers are permitted to be taken on board the aircraft, train or vessel on which P leaves that country, termitted to be taken or
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", + "target_page": 19, + "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
“ passenger information ” has the meaning given in regulation 3 ( 1 );
“ Passenger Locator Form ” means the form published electronically by the Secretury of State for the provision of passenger information ( a );
“ port ”, except where the context otherwise requires, means —
( a ) any port ( including a seaport, airport or heliport ), or
( b ) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tumel Act 1987 / by ;
“ qualifying test ” means a test that is a qualifying test for the purposes of regulation 4 ;
“ relevant service ” means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service ;
“ Schedule 11 passenger ” means a passenger to whom Schedule 11 ( additional measures applicable to arrivals from category 3 countries or territories ) applies ;
“ self - isolate ” has the meaning given in regulation 9 ( 2 ), and “ self - isolation ” and “ self - isolating ” are to be construed accordingly.
“ the Self - Isolation Regulations ” means the Health Protection ( Coronavirus, Restrictions ) ( Self - Isolation ) ( England ) Regulations 20206 ( t )
“ sensitivity ”, in relation to a device, means how often the device correctly generates a positive result ;
“ shuttle service ” has the meaning given in section 1 ( 9 ) of the Channel Tumnel Act 1987 ;
“ specificity ”, in relation to a device, means how often the device correctly generates a negative result ;
“ tunnel system ” has the meaning given in section 1 ( 7 ) of the Channel Tumnel Act 1987.
r2 ) For the purposes of these Regulations, an individual has responsibility for a child if the dividual —
( a ) has custody or charge of the child for the time being, or
( b ) has parental responsibility for the child within the meaning given in section 3 of the Children Act 1989 / d ).
( 3 ) For the purposes of these Regulations, a person (? P ) is not treated as departing from or unsing through a country or tertions, or part of a country or territory, if P artives in and leaves at country, territory of part thereof by air, rail o
( a ) remains on the aircraft or vessel upon which P arrived and no other passenger is permitted to be taken on board ; or
( b ) remains on the train upon which P arrived and no other passenger is permitted to be taken on bourd the carriage in which P is travelling : or
( c ) is kept separated from passengers who did not arrive on the same aircraft, train or vessel as P, and no such passengers are permitted to be taken on board the aircraft, train or vessel on which P leaves that country, termitted to be taken or
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "If you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day after \nyour test date. If you have symptoms of coronavirus, you must self-isolate for 10 days from the \nday your symptoms started, if earlier than when you took your test. \n\nYou must, by law, continue self-isolating for the remainder of your self-isolation period as an \ninternational arrival travelling to the UK from an amber-list country, territory or region. You may \nbe contacted to check that you are self-isolating. \n\nIf you want to shorten your self-isolation period you will need to take another test for international \narrivals from amber list countries, territories or regions. For more information, go to \nhttps://www.gov.uk/guidance/coronavirus-covid-19-test-to-release-for-international-travel. \n\n(4) The test provider must, on request, provide a constable or any other person employed in or \nfor the purposes of any police force, with— \n\n(a) P’s passport number, or travel document reference number (as appropriate); \n(b) P’s test result; \n(c) the date on which P undertook the test; \n(d) the date on which the test result was notified or made available to P or X in accordance \n\nwith sub-paragraphs (2) and (3). \n\n(5) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010(**a**) applies in \nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, \n\n(**a**) S.I. 2010/659; regulation 4 was amended by S.I. 2013/235, 2020/1175, 2020/764, 2021/150 and regulation 4A was inserted \nby S.I. 2020/1175.", + "page_start": 72, + "page_end": 72, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "United Kingdom and, if so— \n(i) the location at which they will depart from in the United Kingdom, \n(ii) their final destination country or territory, \n(iii) the operator they are travelling with or through which their booking was made for \n\ntheir onward journey, \n\n(iv) the seat number for their onward journey, \n(v) the flight number or vessel name for their onward journey, \n(vi) the coach number for their onward journey. \n\n**3.**Where the passenger is travelling with a child for whom they have responsibility— \n\n(a) the full name and date of birth of that child; \n(b) the relationship of the passenger to that child. \n\n**4.**Where the passenger is a person required by regulation 9(2) to self-isolate, and intends to \n\nundertake a test in accordance with Schedule 10 (optional tests)— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 4(d) of that Schedule. \n\n**5.**Where regulation 6 (requirement to book and undertake tests) requires a testing package— \n\n(a) the name of the test provider; \n(b) the test reference number provided to them by the test provider in accordance with \nparagraph 10(5) of Schedule 8. \n\nSCHEDULE 7 Regulation 4 \n\nTesting before arrival in England \n\n**Compliant tests**\n\n**1.**A test complies with this paragraph if— \n\n(a) it is a test for the detection of coronavirus undertaken using a device which the \n\nmanufacturer states has—", + "page_start": 55, + "page_end": 55, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "you have been traced as a contact of someone who tested positive \n\nFor advice on when you might need \nto do, go \nwww.nhs.uk/conditions/coronavirus-covid-19 and read ‘Self-isolation and treating symptoms’. \n\nto self-isolate and what to \n\n**Form B: positive test result**\n\nYour coronavirus test result is positive. You had the virus when the test was done. \n\nEven if you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day \nafter your test date. Your test sample may be genome sequenced to check whether you have a \nvirus variant of concern or variant under investigation. \n\nPeople you live with or have travelled with should also self-isolate for 10 days from the day after \nyou took a test. \n\nIf you received a positive test result for the test taken you do not need to take any further tests. \nPeople you are travelling with must still take a day 8 test if they have travelled from an amber list \ncountry. \n\nYou may be contacted for contact tracing and to check that you, and those who you live or are \ntravelling with, are self-isolating. \n\nYou must not travel, including to leave the UK, during self-isolation. \n\nContact 111 if you need medical help. In an emergency dial 999. \n\n**Form C: unclear test result**\n\nYour coronavirus test result is unclear. It is not possible to say if you had the virus when the test \nwas done. \n\nYou must take another test or self-isolate for 10 days from the day after your test date. \n\nYou may be contacted to check that you are self-isolating. \n\n(4) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010 applies in \n\nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, \n\nthe regulation applies as if it required the information described in sub-paragraph (5) to be \nincluded in the notification to Public Health England. \n\n(5) The information mentioned in sub-paragraph (4) is— \n\n(a) the date on which P last departed from or transited through a category 2 country or \nterritory; \n\n(b) P’s coach number, flight number or vessel name (as appropriate); \n(c) the country or territory P was travelling from when P arrived in England, and any country \n\nor territory they transited through as part of that journey; \n\n(d) the date on which P undertook the appropriate test; \n(e) whether the test is— \n\n(i) a day 2 test for a category 1 arrival, \n(ii) a day 2 test for a person who is not a category 1 arrival, or \n(iii) a day 8 test.", + "page_start": 65, + "page_end": 65, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. \n\n**Day 8 tests: general test requirements**\n\n**8.**—(1) For the purposes of regulation 6(12)(b), a day 8 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 9. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which targets a minimum of \ntwo distinguishable SARS-CoV-2 genes other than the S gene and performance reference \ncontrols; \n\n(b) it is, in relation to a Schedule 11 passenger— \n\n(i) a test which requires laboratory processing, and \n(ii) a test which can be self-administered; \n\n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an extracted molecular method, \n(ii) has a specificity and a sensitivity greater than 95% (with a 95% two-sided \nconfidence interval entirely above 90%), and \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2) “validated”, in relation to a device, has the meaning \n\ngiven by paragraph 2(2) of Schedule 10. \n\n**Day 8 tests: private provider requirements**\n\n**9.**—(1) For the purposes of paragraph 8(1)(b)(iii), a private provider complies with this \n\nparagraph where— \n\n(a) they comply with the requirements of paragraph 3(1)(a) and (e) to (h) of Schedule 10 as if \nany reference in those provisions to an appropriate test were a reference to a day 8 test; \n(b) if the provider is a laboratory that conducts diagnostic test evaluation for testing in \naccordance with this Schedule, they have made a declaration to the Department of Health \nand Social Care that they meet the minimum standards for private sector-provided testing \nat https://support-covid-19-testing.dhsc.gov.uk/InternationalTesting; \n\n(c) they have provided the Department of Health and Social Care with a list of all \norganisations that they work with (whether by sub-contract or otherwise) to carry out the \ntesting service or to carry out genomic sequencing, indicating the nature of the service \nthat each organisation is providing and kept that list updated as appropriate; \n\n(d) in relation to a test which requires laboratory processing— \n\n(i) the person responsible for the taking of samples meets the relevant requirements for \naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the \ntaking of samples, and \n\n(ii) the laboratory used by the test provider for the processing of samples meets the \nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard \n17025 in respect of the processing of samples; \n\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f)", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**Requirement to ensure passengers possess notification of negative test result**\n\n**17.**—(1) An operator must ensure that a passenger— \n\n(a) who presents at immigration control at the Channel Tunnel shuttle terminal area in \nFrance, with the intention of boarding a shuttle service destined for the United Kingdom, \nis in possession of a required notification, on so presenting; \n\n(b) who arrives at a port in England on a relevant service is in possession of a required \n\nnotification. \n\n(2) Paragraph (1) does not apply in relation to a passenger— \n\n(a) whom the operator, or a person acting on behalf of the operator, reasonably believes is \nnot required to comply with the requirement to possess notification of a negative test \nresult under regulation 4(1) or has a reasonable excuse for failing to comply with that \nrequirement; \n\n(b) who is a child, travelling without an individual who has responsibility for them; or \n(c) who is a transit passenger who does not have the right to enter the country or territory \n\nfrom which the relevant service departs. \n\n(3) In this regulation— \n\n“required notification” means notification of the result of a test for the detection of \ncoronavirus which includes, in English, French or Spanish, the following information— \n(a) the name of the person from whom the test sample was taken, \n(b) that person’s date of birth or age, \n(c) the negative result of that test, \n(d) the date the test sample was collected or received by the test provider, \n(e) the name of the test provider and information sufficient to contact that provider, \n(f) a statement— \n\n(i) that the test was a polymerase chain reaction test, or \n(ii) of the name of the device that was used for the test; \n\n“transit passenger” means a person who has arrived in the country or territory from which the \nrelevant service departs with the intention of passing through to England without entering that \ncountry or territory. \n\n**Requirement to ensure that certain passengers arrive only at designated ports**\n\n**18.**—(1) An operator must take all reasonable steps to ensure that no Schedule 11 passenger \n\narrives on a relevant transport service at a port in England which is not a designated port. \n\n(2) Paragraph (1) does not apply where, in the case of an aircraft— \n\n(a) it is necessary for the pilot in command of the aircraft by means of which the transport \nservice is provided to land the aircraft at a place in England other than a designated port \nto secure— \n(i) the safety or security of the aircraft, or \n(ii) the safety of any person aboard the aircraft; \n\n(b) the aircraft is an air ambulance and it is landing otherwise than at a designated port for the \n\npurposes of transporting a person for medical treatment; \n\n(c) the pilot in command of the aircraft is instructed by an authorised person to land the \naircraft at a place in England which is not a designated port. \n\n\n \n \n \n \n [html]\n
England.TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable2010
", + "page_start": 21, + "page_end": 21, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", + "target_page": 31, + "target_passage": "These Regulations expire at the end of 16th May 2022.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", + "page_start": 30, + "page_end": 30, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "https://www.gov.uk/provide-journey-contact-details-before-travel-uk \n\nhttps://www.gov.uk/uk-border-control \n\nhttps://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-advice \n\nhttps://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/ \n\nhttps://gov.wales/arriving-wales-overseas \n\nSCHEDULE 13 Regulation 18(3) \n\nProhibition on the arrival of aircraft and vessels into England \n\n**Interpretation of this Schedule**\n\n**1.**—(1) In this Schedule— \n\n“controller” means— \n(a) in relation to a commercially operated aircraft or vessel, the person who has management \ncontrol over the aircraft or vessel when it arrives in England, \n\n(b) in relation to any other aircraft or vessel, the person who has physical control over the \n\naircraft or vessel when it arrives in England; \n\n“passenger” means a person carried in or on an aircraft or vessel other than a member of the \naircraft or vessel’s crew; \n“port” has the same meaning as in the Merchant Shipping Act 1995(**a**). \n(2) In the definition of “controller” in sub-paragraph (1) “arrives” means— \n\n(a) in relation to an aircraft, lands; \n(b) in relation to a vessel, moors at a port. \n\n**Prohibition on arrival of aircraft into England**\n\n**2.**—(1) A controller must not cause or permit an aircraft whose last point of departure was in a \n\ncountry or territory listed in paragraph 4 to land in England unless— \n\n(a) landing in England is reasonably necessary to secure the safety of the aircraft or the \n\nhealth and safety of any person aboard it; \n\n(b) the landing is only for the purpose of refuelling, or aircraft maintenance, and no \npassengers are permitted to board, or disembark from, the aircraft; or \n\n(c) the aircraft is an air ambulance and landing for the purpose of transporting a person for \n\nmedical treatment. \n\n(2) This paragraph does not apply in relation to— \n\n(a) a commercially operated aircraft carrying no passengers; \n(b) an aircraft operated by or in support of Her Majesty’s Government in the United \nKingdom; \n\n(c) an aircraft operated by or in support of a foreign country or territory where, prior to its \narrival in England, a United Kingdom Government Department has provided written \nconfirmation to the operator that the aircraft is carrying passengers who are travelling to \nconduct official business with the United Kingdom.", + "page_start": 83, + "page_end": 83, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
“ passenger information ” has the meaning given in regulation 3 ( 1 );
“ Passenger Locator Form ” means the form published electronically by the Secretury of State for the provision of passenger information ( a );
“ port ”, except where the context otherwise requires, means —
( a ) any port ( including a seaport, airport or heliport ), or
( b ) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tumel Act 1987 / by ;
“ qualifying test ” means a test that is a qualifying test for the purposes of regulation 4 ;
“ relevant service ” means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service ;
“ Schedule 11 passenger ” means a passenger to whom Schedule 11 ( additional measures applicable to arrivals from category 3 countries or territories ) applies ;
“ self - isolate ” has the meaning given in regulation 9 ( 2 ), and “ self - isolation ” and “ self - isolating ” are to be construed accordingly.
“ the Self - Isolation Regulations ” means the Health Protection ( Coronavirus, Restrictions ) ( Self - Isolation ) ( England ) Regulations 20206 ( t )
“ sensitivity ”, in relation to a device, means how often the device correctly generates a positive result ;
“ shuttle service ” has the meaning given in section 1 ( 9 ) of the Channel Tumnel Act 1987 ;
“ specificity ”, in relation to a device, means how often the device correctly generates a negative result ;
“ tunnel system ” has the meaning given in section 1 ( 7 ) of the Channel Tumnel Act 1987.
r2 ) For the purposes of these Regulations, an individual has responsibility for a child if the dividual —
( a ) has custody or charge of the child for the time being, or
( b ) has parental responsibility for the child within the meaning given in section 3 of the Children Act 1989 / d ).
( 3 ) For the purposes of these Regulations, a person (? P ) is not treated as departing from or unsing through a country or tertions, or part of a country or territory, if P artives in and leaves at country, territory of part thereof by air, rail o
( a ) remains on the aircraft or vessel upon which P arrived and no other passenger is permitted to be taken on board ; or
( b ) remains on the train upon which P arrived and no other passenger is permitted to be taken on bourd the carriage in which P is travelling : or
( c ) is kept separated from passengers who did not arrive on the same aircraft, train or vessel as P, and no such passengers are permitted to be taken on board the aircraft, train or vessel on which P leaves that country, termitted to be taken or
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "England: https://www.gov.uk/uk-border-control \n\nNorthern Ireland: https://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel- \nadvice \n\nScotland: https://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/ \n\nWales: https://gov.wales/arriving-wales-overseas \n\nThe symptoms of coronavirus are a new continuous cough, a high temperature or a loss of, or \nchange in, normal sense of taste or smell. If you experience any of these symptoms, however mild, \nyou are advised to make yourself known to the crew. \n\nPART 3 \n\nRelevant websites \n\n**1.**The following are “the relevant websites” for the purposes of regulation 14— \n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk- \nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules \n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in- \nengland \n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england \n\nhttp://www.gov.uk/travel-quarantine-and-testing \n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england", + "page_start": 82, + "page_end": 82, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "If you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day after \nyour test date. If you have symptoms of coronavirus, you must self-isolate for 10 days from the \nday your symptoms started, if earlier than when you took your test. \n\nYou must, by law, continue self-isolating for the remainder of your self-isolation period as an \ninternational arrival travelling to the UK from an amber-list country, territory or region. You may \nbe contacted to check that you are self-isolating. \n\nIf you want to shorten your self-isolation period you will need to take another test for international \narrivals from amber list countries, territories or regions. For more information, go to \nhttps://www.gov.uk/guidance/coronavirus-covid-19-test-to-release-for-international-travel. \n\n(4) The test provider must, on request, provide a constable or any other person employed in or \nfor the purposes of any police force, with— \n\n(a) P’s passport number, or travel document reference number (as appropriate); \n(b) P’s test result; \n(c) the date on which P undertook the test; \n(d) the date on which the test result was notified or made available to P or X in accordance \n\nwith sub-paragraphs (2) and (3). \n\n(5) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010(**a**) applies in \nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, \n\n(**a**) S.I. 2010/659; regulation 4 was amended by S.I. 2013/235, 2020/1175, 2020/764, 2021/150 and regulation 4A was inserted \nby S.I. 2020/1175.", + "page_start": 72, + "page_end": 72, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", + "target_page": 1, + "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "from a variety of unconscious and otherwise autonomous networks in the brain and then broadcasts them \nto unconscious networks (represented in the metaphor by a broad, unlit \"audience\").[140] The theory has \nsince been expanded upon by other scientists including cognitive neuroscientist Stanislas Dehaene.[141] \n\nIn his original paper outlining the hard problem of consciousness, Chalmers discussed GWT as a theory \nthat only targets one of the \"easy problems\" of consciousness.[1] In particular, he said GWT provided a \npromising account of how information in the brain could become globally accessible, but argued that \n\"now the question arises in a different form: why should global accessibility give rise to conscious \nexperience? As always, this bridging question is unanswered.\"[1] J. W. Dalton similarly criticized GWT \non the grounds that it provides, at best, an account of the cognitive*function*of consciousness, and fails to \nexplain its experiential aspect.[142] By contrast, A. C. Elitzur argued: \"While [GWT] does not address the \n'hard problem', namely, the very nature of consciousness, it constrains any theory that attempts to do so \nand provides important insights into the relation between consciousness and cognition.\"[143] \n\nFor his part, Baars writes (along with two colleagues) that there is no hard problem of explaining qualia \nover and above the problem of explaining causal functions, because qualia are entailed by neural activity \nand themselves causal.[21] Dehaene, in his 2014 book*Consciousness and the Brain*, rejected the concept \nof qualia and argued that Chalmers' \"easy problems\" of consciousness are actually the hard problems.[20] \nHe further stated that the \"hard problem\" is based only upon ill-defined intuitions that are continually \nshifting as understanding evolves:[20] \n\nOnce our intuitions are educated by cognitive neuroscience and computer simulations, \nChalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental \nexperience, detached from any information-processing role, will be viewed as a peculiar idea \nof the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science \nof consciousness will keep eating away at the hard problem of consciousness until it \nvanishes.", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Steven Novella has dismissed it as \"the hard non-problem\".[24] According to a 2020 PhilPapers survey, a \nmajority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine \nproblem, while 29.72% said that it does not exist.[25] \n\nThere are a number of other potential philosophical problems that are related to the Hard Problem. Ned \nBlock believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different \nphysical and functional neurological systems potentially having phenomenal overlap.[12] Another \npotential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed \n\"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular \npersonal identity, as opposed to existing as someone else.[26] \n\n**Overview**\n\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the \nproblem of consciousness\" (1995)[1] and expanded upon it in*The Conscious Mind*(1996). His works \nprovoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers \nfor his argumentative rigour and \"impeccable clarity\".[27] Pinker later said, in 2018, \"In the end I still \nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a \nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether \nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with \nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a \nconceptual problem, or, more accurately, a problem with our concepts.\"[28] Daniel Dennett and Patricia \nChurchland, among others, believe that the hard problem is best seen as a collection of easy problems that \nwill be solved through further analysis of the brain and behaviour.[29][30] \n\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] \n\n**Chalmers' formulation**\n\n. . .even when we have explained the performance of all the cognitive and behavioral functions \nin the vicinity of experience—perceptual discrimination, categorization, internal access, verbal \nreport—there may still remain a further unanswered question:*Why is the performance of these*\n*functions accompanied by experience?*\n\n— David Chalmers, Facing up to the problem of consciousness \n\nThe problems of consciousness, Chalmers argues, are of two kinds: the*easy problems*and the*hard*\n*problem*. \n\n**Easy problems**\n\nThe easy problems are amenable to reductive inquiry. They are a logical consequence of lower-level facts \nabout the world, similar to how a clock's ability to tell time is a logical consequence of its clockwork and \nstructure, or a hurricane being a logical consequence of the structures and functions of certain weather", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
1.1 ( 1.1 )
TableStatement of completely intervention
Tablewith the
\n\n\n\nProponents of the hard problem argue that it is categorically different from the easy problems since no \nmechanistic or behavioral explanation could explain the character of an experience, not even in principle. \nEven after all the relevant functional facts are explicated, they argue, there will still remain a further \nquestion: \"why is the performance of these functions accompanied by experience?\"[1] To bolster their \ncase, proponents of the hard problem frequently turn to various philosophical thought experiments, \ninvolving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed \nineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such \nas the experience of being a bat. \n\nThe terms \"hard problem\" and \"easy problems\" were \ncoined by the philosopher David Chalmers in a 1994 talk \ngiven at The Science of Consciousness conference held in \nTucson, Arizona.[4] The following year, the main talking \npoints of Chalmers' talk were published in*The Journal of*\n*Consciousness*\ngained \nsignificant attention from consciousness researchers and \nbecame the subject of a special volume of the journal,[5][6] \nwhich was later published into a book.[7] In 1996, \nChalmers published*The Conscious Mind*, a book-length \ntreatment of the hard problem, in which he elaborated on \nhis core arguments and responded to counterarguments. His \nuse of the word*easy*is \"tongue-in-cheek\".[8] As the \ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they \nwould probably crack it in this century.\"[9] \n\n*Studies*.[1] The publication \n\nChalmers on stage for an Alan Turing Year \nevent at De La Salle University, Manila, 27 \nMarch 2012 \n\nThe existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as \nJoseph Levine,[10] Colin McGinn,[11] and Ned Block[12] and cognitive neuroscientists such as Francisco \nVarela,[13] Giulio Tononi,[14][15] and Christof Koch.[14][15] On the other hand, its existence is denied by \nother philosophers of mind, such as Daniel Dennett,[16] Massimo Pigliucci,[17] Thomas Metzinger, \nPatricia Churchland,[18] and Keith Frankish,[19] and by cognitive neuroscientists such as Stanislas \nDehaene,[20] Bernard Baars,[21] Anil Seth,[22] and Antonio Damasio.[23] Clinical neurologist and skeptic", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia2.pdf" + }, + { + "text": "g%7CHard) \n\n5. JCS vol. 4, pp. 3-46, 1997 \n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\".*Journal of*\n\n*Consciousness Studies*.**4**(1): 3–46. \n\n7. Shear, Jonathan (1997).*Explaining Consciousness: The Hard Problem*. MIT Press. \n\nISBN 978-0262692212. \n\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas \n\nt.com/panpsycast2/episode83-1).*The Panpsycast Philosophy Podcast*. 19 July 2020. \nRetrieved 2020-09-05. \n\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten \nt.time.com/time/magazine/article/0,9171,1580394-1,00.html).*Time*. Retrieved 19 December \n2018. \n\n10. Levine, Joseph (2009-01-15). \"The Explanatory Gap\" (https://www.oxfordhandbooks.com/vi \new/10.1093/oxfordhb/9780199262618.001.0001/oxfordhb-9780199262618-e-17).*The*\n*Oxford Handbook of Philosophy of Mind*: 281–291. \ndoi:10.1093/oxfordhb/9780199262618.003.0017 (https://doi.org/10.1093%2Foxfordhb%2F9 \n780199262618.003.0017). ISBN 978-0199262618. \n\n11. McGinn, Colin (20 February 2012). \"All machine and no ghost?\" (http://www.newstatesman. \ncom/ideas/2012/02/consciousness-mind-brain).*New Statesman*. Retrieved 27 March 2012. \n12. Block, Ned (2002). \"The Harder Problem of Consciousness\" (https://philpapers.org/rec/BLO \nTHP).*The Journal of Philosophy*.**99**(8): 391–425. doi:10.2307/3655621 (https://doi.org/10. \n2307%2F3655621). JSTOR 3655621 (https://www.jstor.org/stable/3655621). \nS2CID 111383062 (https://api.semanticscholar.org/CorpusID:111383062). \n\n13. Varela, F.J. (1 April 1996). \"Neurophenomenology: a methodological remedy for the hard \n\nproblem\" (https://www.ingentaconnect.com/content/imp/jcs/1996/00000003/00000004/718). \n*Journal of Consciousness Studies*.**3**(4): 330–349.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia2.pdf" + }, + { + "text": "34. Chalmers, David (2020). \"Is the hard problem of consciousness universal?\" (http://consc.ne \n\nt/papers/universal.pdf) (PDF).*Journal of Consciousness Studies*.**27**(5–6): 227–257. \nRetrieved 22 February 2022. \n\n35. Locke, John (1722).*The works of John Locke: in three volumes*. Vol. 1. London: Printed for \n\nA. Churchill, and A. Manship, and sold by W. Taylor in Pater-noster-Row. p. 293 (https://book \ns.google.com/books?id=0BfmAAAAMAAJ&pg=PA293). \n\n36. Leibniz,*Monadology,*17, as quoted by Aranyosi, Istvan (2004). \"Chalmers's zombie \n\narguments\" (http://www.personal.ceu.hu/students/03/Istvan_Aranyosi/Chapter%20IV.pdf) \n(PDF) (draft ed.). Central European University Personal Pages. \n\n37. Mill, John Stuart.*A System of Logic*(1843), Book V, Chapter V, section 3 \n38. Huxley, Thomas Henry; Youmans, William Jay (1868).*The elements of physiology and*\n*hygiene: a text-book for educational institutions*. New York: D. Appleton and company. \np. 178 (https://books.google.com/books?id=aVUAAAAAYAAJ&pg=PA178). \n\n39. Arnold, Dan (2021). \"Philosophy of Mind's \"Hard Problem\" in Light of Buddhist Idealism\". In \nEmmanuel, Steven M. (ed.).*Philosophy's Big Questions: Comparing Buddhist and Western*\n*Approaches*. New York: Columbia University Press. pp. 97–128. ISBN 978-0231174879. \n40. Bryan Van Norden,*Buddhism Comes to China*(https://www.youtube.com/watch?v=Q1xv3H \n\nmUddY), 17 March 2021, retrieved 2021-12-29 \n\n41. Tiwald, Justin; Van Norden, Bryan W. eds. (2005),*Readings in Later Chinese Philosophy,*p. \n\n101. Hackett Publishing. \n\n42. Levine, J. 1983. “Materialism and qualia: the explanatory gap”.*Pacific Philosophical*\n\n*Quarterly*, 64: 354–361. \n\n43. Weisberg, Josh. \"The Hard Problem of Consciousness\" (https://www.iep.utm.edu/hard-con/). \n\n*Internet Encyclopedia of Philosophy*. \n\n44. Seager, William. \"Are Zombies Logically Possible?\" (https://www.utsc.utoronto.ca/~seager/z", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia2.pdf" + }, + { + "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the \nexistence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive \nif one already assumes that \"consciousness must be independent of the structure and function of mental \nstates, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that \n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we \nshould let our theories of consciousness guide our conclusions from the thought experiments.\"[64] \n\nThe philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a \n\"category mistake\".[17] He said: \"Of course an explanation isn't the same as an experience, but that's \nbecause the two are completely independent categories, like colors and triangles. It is obvious that I \ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and \nwhy it is possible to be you.\"[17] \n\nIn 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of \nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted \nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that \nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the \n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a*philosophical mistake*: \nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\"[65] \n\nThe philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly \nwidespread view in biology which was not so much solved as abandoned.[66] Brian Jonathan Garrett has \nalso argued that the hard problem suffers from flaws analogous to those of vitalism.[67] \n\nThe philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness \ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms.[68] He \nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the \nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion \nin the conceptual scheme.\"[68] Hacker's critique extends beyond Chalmers and the hard problem, being \ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the \nneuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly \ndualistic in its conceptualizations and is predicated on the*mereological fallacy*of ascribing psychological \nconcepts to the brain that can properly be ascribed only to the person as a whole.[69] Hacker further states \nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception \nof consciousness which they have is incoherent\".[68] \n\n**Eliminative materialism / Illusionism**\n\nEliminative materialism or eliminativism is the view that many or all of the mental states used in folk \npsychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination, \ncorrespond to real brain mechanisms.[59] According the 2020 PhilPapers survey, 4.51% of philosophers \nsurveyed subscribe to eliminativism.[25] \n\nWhile Patricia Churchland and Paul Churchland have famously applied eliminative materialism to \npropositional attitudes, philosophers including Daniel Dennett, Georges Rey, and Keith Frankish have \napplied it to qualia or phenomenal consciousness (i.e., conscious experience).[59] On their view, it is \nmistaken not only to believe there is a hard problem of consciousness, but to believe phenomenal \nconsciousness exists at all.[19][61]", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia2.pdf" + }, + { + "text": "In other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation \nof our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs \nabout consciousness, in the same way that explaining beliefs about god in evolutionary terms may \nprovide arguments against theism itself.[144] \n\n**In popular culture**\n\nTom Stoppard's play*The Hard Problem*, first produced in 2015, is named after the hard problem of \nconsciousness, which Stoppard defines as having \"subjective First Person experiences\".[145] \n\n**See also**\n\n\n \n \n \n \n [html]\n
• Animal consciousness• Binding problem •
• Blindsight • Chinese room• Cogito_ergo_sum • Cognition
• Free will • Ideasthesia • Introspection
\n\n**Notes**\n\n1. \"But, without any delusive representations of images or phantasms, I am most certain that I \nam, and that I know and delight in this. In respect to these truths I am not at all afraid of the \narguments of the Academians, who say, What if you are deceived? For if I am deceived, I \nam. For he who is not, cannot be deceived...\" \n\n2. There has been debate over how best to characterize James' position. The*Stanford*\n*Encyclopedia of Philosophy*states: \"James’s commitment to panpsychism remains \nsomewhat controversial, since he also advanced a cogent set of objections against a \nversion of the view, which he labelled the 'mind dust' theory, in chapter six of The Principles \nof Psychology ([1890] 1981). These objections are the inspiration for the so-called \n'combination problem', around which much of the twenty first century literature on \npanpsychism focuses.\"", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia2.pdf" + }, + { + "text": "patterns. A clock, a hurricane, and the easy problems, are all the sum of their parts (as are most \nthings).[27] \n\nThe easy problems relevant to consciousness concern mechanistic analysis of the neural processes that \naccompany behaviour. Examples of these include how sensory systems work, how sensory data is \nprocessed in the brain, how that data influences behaviour or verbal reports, the neural basis of thought \nand emotion, and so on. They are problems that can be analyzed through \"structures and functions\".[27] \n\n**Hard problem**\n\nThe hard problem, in contrast, is the problem of*why*and*how*those processes are accompanied by \nexperience.[1] It may further include the question of why these processes are accompanied by this or that \nparticular experience, rather than some other kind of experience. In other words, the hard problem is the \nproblem of explaining why certain mechanisms are accompanied by conscious experience.[27] For \nexample, why should neural processing in the brain lead to the felt sensations of, say, feelings of hunger? \nAnd why should those neural firings lead to feelings of hunger rather than some other feeling (such as, \nfor example, feelings of thirst)? \n\nChalmers argues that it is conceivable that the relevant behaviours associated with hunger, or any other \nfeeling, could occur even in the absence of that feeling. This suggests that experience is irreducible to \nphysical systems such as the brain. This is the topic of the next section. \n\n**How the easy and hard problems are related**\n\nChalmers believes that the hard problem is irreducible to the easy problems: solving the easy problems \nwill not lead to a solution to the hard problems. This is because the easy problems pertain to the causal \nstructure of the world while the hard problem pertains to consciousness, and facts about consciousness \ninclude facts that go beyond mere causal or structural description.[32] \n\nFor example, suppose someone were to stub their foot and yelp. In this scenario, the easy problems are \nmechanistic explanations that involve the activity of the nervous system and brain and its relation to the \nenvironment (such as the propagation of nerve signals from the toe to the brain, the processing of that \ninformation and how it leads to yelping, and so on). The hard problem is the question of why these \nmechanisms are accompanied by*the feeling of pain*, or why these feelings of pain feel the particular way \nthat they do. Chalmers argues that facts about the neural mechanisms of pain, and pain behaviours, do not \nlead to facts about conscious experience. Facts about conscious experience are, instead, further facts, not \nderivable from facts about the brain.[27][32] \n\nAn explanation for all of the relevant physical facts about neural processing would leave unexplained \nfacts about what it is like to feel pain. This is in part because functions and physical structures of any sort \ncould conceivably exist in the absence of experience. Alternatively, they could exist alongside a different \nset of experiences. For example, it is logically possible for a perfect replica of Chalmers to have no \nexperience at all, or for it to have a different set of experiences (such as an inverted visible spectrum, so \nthat the blue-yellow red-green axes of its visual field are flipped).[32] \n\nThe same cannot be said about clocks, hurricanes, or other physical things. In those cases, a structural or \nfunctional description is a complete description. A perfect replica of a clock is a clock, a perfect replica of \na hurricane is a hurricane, and so on. The difference is that physical things are nothing more than their", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Finding a provably correct or optimal solution is intractable for many important problems.[15] Soft \ncomputing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are \ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in \nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with \nneural networks. \n\n**Narrow vs. general AI**\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and \nsuperintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these \nsolutions will lead indirectly to the field's long-term goals.[378][379] General intelligence is difficult to \ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific \nproblems with specific solutions. The sub-field of artificial general intelligence studies this area \nexclusively. \n\n**Machine consciousness, sentience, and mind**\n\nThe philosophy of mind does not know whether a machine can have a mind, consciousness and mental \nstates, in the same sense that human beings do. This issue considers the internal experiences of the \nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because \nit does not affect the goals of the field: to build machines that can solve problems using intelligence. \nRussell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way \nhumans are is not one that we are equipped to take on.\"[380] However, the question has become central to \nthe philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction. \n\n**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] \n\n**Computationalism and functionalism**\n\nComputationalism is the position in the philosophy of mind that the human mind is an information \nprocessing system and that thinking is a form of computing. Computationalism argues that the \nrelationship between mind and body is similar or identical to the relationship between software and \nhardware and thus may be a solution to the mind–body problem. This philosophical position was inspired \nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by \nphilosophers Jerry Fodor and Hilary Putnam.[383] \n\nPhilosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed \ncomputer with the right inputs and outputs would thereby have a mind in exactly the same sense human \nbeings have minds.\"[ac] Searle challenges this claim with his Chinese room argument, which attempts to", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "66. Harris, Sam. \"Making Sense #96\" (https://samharris.org/subscriber-extras/96-nature-conscio \nusness/).*SamHarris.org*. Sam Harris. Retrieved 27 August 2020. \"(25.45) TM:I think it will \nnot be a mystery. Life is not a mystery anymore, but a hundred and fifty years ago many \npeople thought that this is an irreducible mystery. (25:57) Harris:So you're not a fan \nanymore, if you ever were, of the framing by David Chalmers of the Hard Problem of \nConsciousness? Metzinger: No, that's so boring. I mean, that's last century. I mean, you \nknow, we all respect Dave [Chalmers], and we know he is very smart and has got a very fast \nmind, no debate about that. But conceivability arguments are just very, very weak. If you \nhave an ill-defined folk psychological umbrella term like \"consciousness\", then you can pull \noff all kinds of scenarios and zombie thought experiments. It doesn't really… It helped to \nclarify some issues in the mid 90's, but the consciousness community has listened to this \nand just moved on. I mean nobody of the serious researchers in the field thinks about this \nanymore, but it has taken on like a folkloristic life of its own. A lot of people talk about the \nHard Problem who wouldn't be able to state what it consists in now.\" \n\n67. Garrett, Brian Jonathan (May 2006). \"What the History of Vitalism Teaches Us About \n\nConsciousness and the 'Hard Problem' \".*Philosophy and Phenomenological Research*.**72**\n(3): 576–588. doi:10.1111/j.1933-1592.2006.tb00584.x (https://doi.org/10.1111%2Fj.1933-1 \n592.2006.tb00584.x). \n\n68. Hacker, Peter (2010). \"Hacker's challenge\" (http://philpapers.org/rec/HACHC).*The*\n\n*Philosophers' Magazine*.**51**(51): 23–32. doi:10.5840/tpm2010517 (https://doi.org/10.5840% \n2Ftpm2010517). \n\n69. Schaal, David W. (2005). \"Naming Our Concerns About Neuroscience: A Review of Bennett \nand Hacker's*Philosophical Foundations of Neuroscience*\" (https://www.ncbi.nlm.nih.gov/pm \nc/articles/PMC1389787).*Journal of the Experimental Analysis of Behavior*.**84**(3): 683–692. \ndoi:10.1901/jeab.2005.83-05 (https://doi.org/10.1901%2Fjeab.2005.83-05). PMC 1389787 \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1389787). PMID 16596986 (https://pubmed. \nncbi.nlm.nih.gov/16596986). \n\n70. Dennett, Daniel C. (1979). \"On the Absence of Phenomenology\". In Gustafson, Donald F.; \nTapscott, Bangs L. (eds.).*Body, Mind, and Method*. Kluwer Academic Publishers. pp. 93– \n113. \n\n71. Dennett, Daniel C. (1991).*Consciousness Explained*. Penguin Books. \n72. Dennett, Daniel C. (2003). \"Explaining the 'magic' of consciousness\".*Journal of Cultural and*\n*Evolutionary Psychology*.**1**(1): 7–19. doi:10.1556/jcep.1.2003.1.2 (https://doi.org/10.1556% \n2Fjcep.1.2003.1.2). S2CID 144560246 (https://api.semanticscholar.org/CorpusID:14456024 \n6). \n\n73. Dennett, Daniel C. (1991).*Consciousness explained*(https://archive.org/details/consciousne \n\nssexp00denn). Boston: Little, Brown and Company. ISBN 978-0316180658. \n\n74. Anthis, Jacy (2022). \"Consciousness Semanticism: A Precise Eliminativist Theory of \nConsciousness\" (https://philarchive.org/rec/ANTCSA).*Biologically Inspired Cognitive*\n*Architectures 2021*. Studies in Computational Intelligence. Vol. 1032. pp. 20–41. \ndoi:10.1007/978-3-030-96993-6_3 (https://doi.org/10.1007%2F978-3-030-96993-6_3). \nISBN 978-3-030-96992-9. Retrieved 7 August 2022. \n\n75. Irvine, Elizabeth (2013).*Consciousness as a scientific concept: a philosophy of science*\n\n*perspective*. Studies in brain and mind. Vol. 5. Dordrecht; New York: Springer-Verlag. p. 167 \n(https://books.google.com/books?id=jO4HNB7OoUgC&pg=PA167). ISBN 9789400751729. \n76. Chalmers, David (2018). \"The Meta-Problem of Consciousness\" (http://consc.net/papers/me \n\ntaproblem.pdf) (PDF).*Journal of Consciousness Studies*.**25**(9–10): 6–61. Retrieved \n6 February 2019. \n\n77. Graziano, Michael (2013).*Consciousness and the social brain*. Oxford; New York: Oxford \n\nUniversity Press. ISBN 978-0190263195.", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is David Chalmer's definition of \"consciousness\" ?", + "target_page": 2, + "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "Today there is a strong tendency to simply*equate*consciousness with the qualia. Yet there is \nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of \npain\" are qualities we are conscious*of*. So philosophy of mind tends to treat consciousness as \nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it \nreally is precisely*consciousness*of contents, the very givenness of whatever is subjectively \ngiven. And therefore the problem of consciousness does not pertain so much to some alleged \n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective \nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind \nastonishingly little is said about the latter).[129] \n\n**Relationship to scientific frameworks**\n\n\n \n \n \n \n [html]\n
SpecimensTablePatientsTableTableTableDevelopmentTableTableSinceState
\n\n\n \n \n \n \n [html]\n
Solved.StatesticsTableTableTableMaximumTemperature ( mm )TableSince 15DataAdjustedSpecies
\n\nOne can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] \n\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard \nproblem, but rather one of the so-called easy problems to which the hard problem is contrasted.[133] \nKandel went on to note Crick and Koch's suggestion that once the binding problem—understanding what \naccounts for the unity of experience—is solved, it will be possible to solve the hard problem \nempirically.[133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is \na distraction from what he calls the \"real problem\": understanding the neurobiology underlying", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia2.pdf" + }, + { + "text": "g%7CHard) \n\n5. JCS vol. 4, pp. 3-46, 1997 \n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\".*Journal of*\n\n*Consciousness Studies*.**4**(1): 3–46. \n\n7. Shear, Jonathan (1997).*Explaining Consciousness: The Hard Problem*. MIT Press. \n\nISBN 978-0262692212. \n\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas \n\nt.com/panpsycast2/episode83-1).*The Panpsycast Philosophy Podcast*. 19 July 2020. \nRetrieved 2020-09-05. \n\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten \nt.time.com/time/magazine/article/0,9171,1580394-1,00.html).*Time*. Retrieved 19 December \n2018. \n\n10. Levine, Joseph (2009-01-15). \"The Explanatory Gap\" (https://www.oxfordhandbooks.com/vi \new/10.1093/oxfordhb/9780199262618.001.0001/oxfordhb-9780199262618-e-17).*The*\n*Oxford Handbook of Philosophy of Mind*: 281–291. \ndoi:10.1093/oxfordhb/9780199262618.003.0017 (https://doi.org/10.1093%2Foxfordhb%2F9 \n780199262618.003.0017). ISBN 978-0199262618. \n\n11. McGinn, Colin (20 February 2012). \"All machine and no ghost?\" (http://www.newstatesman. \ncom/ideas/2012/02/consciousness-mind-brain).*New Statesman*. Retrieved 27 March 2012. \n12. Block, Ned (2002). \"The Harder Problem of Consciousness\" (https://philpapers.org/rec/BLO \nTHP).*The Journal of Philosophy*.**99**(8): 391–425. doi:10.2307/3655621 (https://doi.org/10. \n2307%2F3655621). JSTOR 3655621 (https://www.jstor.org/stable/3655621). \nS2CID 111383062 (https://api.semanticscholar.org/CorpusID:111383062). \n\n13. Varela, F.J. (1 April 1996). \"Neurophenomenology: a methodological remedy for the hard \n\nproblem\" (https://www.ingentaconnect.com/content/imp/jcs/1996/00000003/00000004/718). \n*Journal of Consciousness Studies*.**3**(4): 330–349.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
1.1 ( 1.1 )
TableStatement of completely intervention
Tablewith the
\n\n\n\nProponents of the hard problem argue that it is categorically different from the easy problems since no \nmechanistic or behavioral explanation could explain the character of an experience, not even in principle. \nEven after all the relevant functional facts are explicated, they argue, there will still remain a further \nquestion: \"why is the performance of these functions accompanied by experience?\"[1] To bolster their \ncase, proponents of the hard problem frequently turn to various philosophical thought experiments, \ninvolving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed \nineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such \nas the experience of being a bat. \n\nThe terms \"hard problem\" and \"easy problems\" were \ncoined by the philosopher David Chalmers in a 1994 talk \ngiven at The Science of Consciousness conference held in \nTucson, Arizona.[4] The following year, the main talking \npoints of Chalmers' talk were published in*The Journal of*\n*Consciousness*\ngained \nsignificant attention from consciousness researchers and \nbecame the subject of a special volume of the journal,[5][6] \nwhich was later published into a book.[7] In 1996, \nChalmers published*The Conscious Mind*, a book-length \ntreatment of the hard problem, in which he elaborated on \nhis core arguments and responded to counterarguments. His \nuse of the word*easy*is \"tongue-in-cheek\".[8] As the \ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they \nwould probably crack it in this century.\"[9] \n\n*Studies*.[1] The publication \n\nChalmers on stage for an Alan Turing Year \nevent at De La Salle University, Manila, 27 \nMarch 2012 \n\nThe existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as \nJoseph Levine,[10] Colin McGinn,[11] and Ned Block[12] and cognitive neuroscientists such as Francisco \nVarela,[13] Giulio Tononi,[14][15] and Christof Koch.[14][15] On the other hand, its existence is denied by \nother philosophers of mind, such as Daniel Dennett,[16] Massimo Pigliucci,[17] Thomas Metzinger, \nPatricia Churchland,[18] and Keith Frankish,[19] and by cognitive neuroscientists such as Stanislas \nDehaene,[20] Bernard Baars,[21] Anil Seth,[22] and Antonio Damasio.[23] Clinical neurologist and skeptic", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
13. Churchland, Paticia ( LSR6 ). “ The Humswogde Problem ” ( http :// loelvelseco. netheraching / 22.9. 0 / homoxygolegenetis pdf ) ( PDF ). aloumair of Concoussess Studies. 3 ( 5 – 62 – 438. Retireved 13 ). alonary 2012.
13 Frankish, Keith ( 2026 ), “ Busionism as a Theory of Consciousness ”, “ Ititps :// thorievere juggter. org / pightubMITTLM, articleofibratitimate / Frankish_BlusionsmismN2DelAST / thery / ASTbPs ( Ri20corposumes_eprinty of ) ( FrLR
Z0. Dehaene. Stanislas ( 2014 ). Consciousness and the brain : deciphering how the brain codes our thoughts : Viking Adult. po. 259 – 259, ( https :// books. goode : com / books / he / CWw2AAAAQ BALIIapp + PT289 ). HST0EES426.
22. Edelman, Gariali, Gally, Janesph, Baan, Benanan, Benana ( DLL ), TBiology of Consciousness ”, ( Pittps :// www. tcb, nfm, right / glycletyl / glycletyl / glycletyl / glycletyl / glycletyl / glycletol / glycletolidy
22. Seth, Ank ( November 2010 ). “ The real problem ” ( https :// aeon. colessaythe hard - problem - of - consossss - ss - distraction - from - the - real - sme ). Aeron. Retrieved 22 April 2013.
22. Sear Carrill [ 23 ] April 2012b \" Sear Carroll \" s Mindocape \" [ https :// www. preperspecteroussiverse. competization20. EDEAG / 296p0044 - 4 - 4 - 4 - 4 - 4 - 8 - 8 - 8 - 8 - 89000 - blath800 - 0 - 9 - freelingly? Rhoight - self - this - eitis bind - thy -
24 ‘ Psychological Scales. The Hard Problem of Consciousness ’ ( Mtps :// Secales. arabroychology. jug. mir202 / LUTB ( Psychology / colletth < 30 % consciousness ≤ 7 ) andpsyctology. com. Retreved 2025 - 103
25. Bourget, David, Chalmers, David J. ( 2020 ), “ Phloophers on Phlosophy, The 2020 PhlPapers Survey ” ( https :// survey2020. phlpeople. org ), Philosophers ’ Imprint.
25. Robetts, Tim S, < underline > Self - tember 2007 ) “ Per, Ever Hander Peyblem of Consciousness by Roberts, Tim S, < underline > ( Time , < underline > Time , < underline >, < underline > Time
27. Chalmers, David ( 2396 ), The Corocious Mind. New York : Oxford University Press. pp. xilii, 95 – 156, backcover.
28. Pinker, Steven ( 2015 ). Enlightent Now. Viking, p. 481. ISBN 9780525427575.
29. Denmett, Danket commentary on T. Moody, O. Fianagan and T. Polger, \" The Unimagined Prepostenosa of Zombies ( Totps :/ lase. tufts. edu / cogotud / dennettityaspero / uncombie. ftml \", Journal of Consousness Stadies vol. 2, m. 4, < undes
30. Churthlored, Paticia Smith ( 2505 ). “ Invurophilosophical skinton consciousness research ” Contitude Fundon : A View from the Tradamus, Progress in Ensin Research. Vols. Jids po 290 – 293 dsc ( 500 / 500 / 9 ) at LLD ( 500 / 64005 - 2 ( 998 – 61
21. Negel, Thomes ( October 2574 ), \" What is it like to be a bat?\". The Philicosphrical Reviews 83 ( 4 ), 440 – 450.801 ( 231 / 23004 ) ( Rttps :// dtsorglitis org / 10.2007 ) hsa - 212.13002.6 ), 551.91.2002.4 ( Mtps :// www. ( 000.002.6574.4 ), 52.
22. “ Hard Problem of Consciousness ” ( Intest / ilep. utm. edu / hard - problem - of - concisumess )). Internet Encyclopedia of Philosophy Retrieved 202.20103.
33. Chaliness, Devid ( January 12957 ). “ Moving forward on the problem of corsococcassress ”, 19th ss3tiphilopers. singles / CHAMFQ1. Journal of Corsociousness Studies. 4 ( 1 ): 3 - 46.
", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia2.pdf" + }, + { + "text": "consciousness, namely the neural correlates of various conscious processes.[22] This more modest goal is \nthe focus of most scientists working on consciousness.[133] Psychologist Susan Blackmore believes, by \ncontrast, that the search for the neural correlates of consciousness is futile and itself predicated on an \nerroneous belief in the hard problem of consciousness.[134] \n\n**Computational cognition**\n\nA functionalist view in cognitive science holds that the mind is an information processing system, and \nthat cognition and consciousness together are a form of computation. Cognition, distinct from \nconsciousness, is explained by neural computation in the computational theory of cognition. The \ncomputational theory of mind asserts that not only cognition, but also phenomenal consciousness or \nqualia, are computational. While the computation system is realized by neurons rather than electronics, in \ntheory it would be possible for artificial intelligence to be conscious. \n\n**Integrated information theory**\n\nIntegrated information theory (IIT), developed by the neuroscientist and psychiatrist Giulio Tononi in \n2004 and more recently also advocated by Koch, is one of the most discussed models of consciousness in \nneuroscience and elsewhere.[135][136] The theory proposes an identity between consciousness and \nintegrated information, with the latter item (denoted as Φ) defined mathematically and thus in principle \nmeasurable.[136][137] The hard problem of consciousness, write Tononi and Koch, may indeed be \nintractable when working from matter to consciousness.[15] However, because IIT inverts this relationship \nand works from phenomenological axioms to matter, they say it could be able to solve the hard \nproblem.[15] In this vein, proponents have said the theory goes beyond identifying human neural \ncorrelates and can be extrapolated to all physical systems. Tononi wrote (along with two colleagues): \n\nWhile identifying the \"neural correlates of consciousness\" is undoubtedly important, it is \nhard to see how it could ever lead to a satisfactory explanation of what consciousness is and \nhow it comes about. As will be illustrated below, IIT offers a way to analyze systems of \nmechanisms to determine if they are properly structured to give rise to consciousness, how \nmuch of it, and of which kind.[138] \n\nAs part of a broader critique of IIT, Michael Cerullo suggested that the theory's proposed explanation is in \nfact for what he dubs (following Scott Aaronson) the \"Pretty Hard Problem\" of methodically inferring \nwhich physical systems are conscious—but would not solve Chalmers' hard problem.[136] \"Even if IIT is \ncorrect,\" he argues, \"it does not explain why integrated information generates (or is) consciousness.\"[136] \nChalmers agrees that IIT, if correct, would solve the \"Pretty Hard Problem\" rather than the hard \nproblem.[139] \n\n**Global workspace theory**\n\n\n \n \n \n \n [html]\n
theater,Conscious processes represented Dy airStaffing ( stage. 5 ± 75 )Inis meater integrates inputsTableTableStateStatisticsTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 15, + "page_end": 15, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Steven Novella has dismissed it as \"the hard non-problem\".[24] According to a 2020 PhilPapers survey, a \nmajority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine \nproblem, while 29.72% said that it does not exist.[25] \n\nThere are a number of other potential philosophical problems that are related to the Hard Problem. Ned \nBlock believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different \nphysical and functional neurological systems potentially having phenomenal overlap.[12] Another \npotential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed \n\"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular \npersonal identity, as opposed to existing as someone else.[26] \n\n**Overview**\n\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the \nproblem of consciousness\" (1995)[1] and expanded upon it in*The Conscious Mind*(1996). His works \nprovoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers \nfor his argumentative rigour and \"impeccable clarity\".[27] Pinker later said, in 2018, \"In the end I still \nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a \nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether \nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with \nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a \nconceptual problem, or, more accurately, a problem with our concepts.\"[28] Daniel Dennett and Patricia \nChurchland, among others, believe that the hard problem is best seen as a collection of easy problems that \nwill be solved through further analysis of the brain and behaviour.[29][30] \n\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] \n\n**Chalmers' formulation**\n\n. . .even when we have explained the performance of all the cognitive and behavioral functions \nin the vicinity of experience—perceptual discrimination, categorization, internal access, verbal \nreport—there may still remain a further unanswered question:*Why is the performance of these*\n*functions accompanied by experience?*\n\n— David Chalmers, Facing up to the problem of consciousness \n\nThe problems of consciousness, Chalmers argues, are of two kinds: the*easy problems*and the*hard*\n*problem*. \n\n**Easy problems**\n\nThe easy problems are amenable to reductive inquiry. They are a logical consequence of lower-level facts \nabout the world, similar to how a clock's ability to tell time is a logical consequence of its clockwork and \nstructure, or a hurricane being a logical consequence of the structures and functions of certain weather", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
rec ( SCAUAA - 2 ). Journal of the American Philosophical Association B [ 1 ]. 52 – 71. doit LEL1L1L1L1L1L1L1H27 / ispa - 203347 ( Potpa :// doicorga ' s31.1117962F : spaa. 2033.47 ). S2CO3 Z286727.29 ( Mpr5.57api. semanticschrobiat. organg
80. Augustine of Hippo. \" Book 11, Chapter 26 \". City of God.
81. Descartes, Rene ( 1637 ). \" 4 \". Discourse on the Method.
82. Descartes, Rene ( 1641 ), \" Second Meditation \". Meditations on First Philosophy.
83. Chalmers, David ( 2020 ), “ Debunking Argumerts for Illusionion ” ( https :// philpapers. org / ec / CHADAF - 2 ), Journal of Concousness Studies. If ( 5 – 6 ): 258 – 261.
84 Chalmers, David ( 2002 ), \" Debunking Arguments for Illusionion \" [ https :// philpapers. org / ec / CHADAF - 2 ), Journal of Corocousness Studies. ZY ( 5 – 6 )]. ZSI - 201.
85. Strawson, C - ( 20124 ), “ The Consciousness Deniers ” [ https :// www. mybooks. com / daily / 2018 / 03.3 / 39e - consciousness - demiers $). The New York Review of Books.
86. Koch, Christof ( 20159 ). The Feeling of Life itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 2
87. Koch, Christal ( 20159 ). The Feeling of Life Itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 3.
88. Balmer, A ( 2020 ), “ Soft - Wired Illusionism vs. the Meta - Problem of Consciousness ”,( https :// ohjlpapers. org / rec / BanLSIV ). Journal of Consoousness Studies : zf ( p - 6 ). 26 – 37.
89. Chalmers, David ( 2020 ), ' Is the Hard Problem of Consciousness Universal?\". Journal of Contoossness Studies : Zf ( 5 – 6 ): 221 – 257.
90.91 Papineau, D ( 20159, “ Response to Chalmers ” The Meta - Problem of Consciousness ” ( https :// philgapers. org / res :/ PPTC -( 5 ). Journal of Consciousness Studies : 86 ( 0 – 10 ): 170 – 121.
92... ILevine, \" Conceivability, Identity, and the Explanatory Gap \" in Stuart R. Hameroff, Affed W. Kazaniak and David Chalmers ( eds.). Towards a Science of Corsciousness III : The Third Tucson Discussions and Debates, The MIT Peess, 24
92. Gennaro, Rocco. 3 “ Consciousness ” ( https :// www. ep. utm. edu / consciou ). Internet Encyclopedia of Philosophy.
ISE, Brick, Next ’, Stabilitaker, Publishti, CDERS, Conceptual Anglobiological, Qualitary, and the Ecytopatory Color ’, PrtqcHewernyu edu / goacildeptibilitie / faculty / brock - bropers / EcoplanatoryGag adily ( PSF ), The Phitosps
94 Stallgar, Dariel ( 2005 ), “ Physicalesm and Phenomenal Concepter ”, Mind & Languager, 20 ( 5 ). 490 – 494 ( 00 : 111111111111111111110259 : 3394.33055.0029Ex ( Pitprc / l9bri. orga10.1111111942F ), 02939 :. 0094.2 : 00296.4 ).
55. Chalmers, Devid ( 2006 ), \" Phenomenal Concepts and the Explanatory Ctg /\" ( http :// corocc. ne
\n\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on \n\nDavid Chalmers\".*Journal of Consciousness Studies*.**26**(9–10): 257–269. \n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of \n\nConsciousness\".*Journal of Consciousness Studies*.**26**(9–10): 136–147. \n\n98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland \nlock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g).*YouTube*. 9 July 2022. \n\n99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia2.pdf" + }, + { + "text": "from a variety of unconscious and otherwise autonomous networks in the brain and then broadcasts them \nto unconscious networks (represented in the metaphor by a broad, unlit \"audience\").[140] The theory has \nsince been expanded upon by other scientists including cognitive neuroscientist Stanislas Dehaene.[141] \n\nIn his original paper outlining the hard problem of consciousness, Chalmers discussed GWT as a theory \nthat only targets one of the \"easy problems\" of consciousness.[1] In particular, he said GWT provided a \npromising account of how information in the brain could become globally accessible, but argued that \n\"now the question arises in a different form: why should global accessibility give rise to conscious \nexperience? As always, this bridging question is unanswered.\"[1] J. W. Dalton similarly criticized GWT \non the grounds that it provides, at best, an account of the cognitive*function*of consciousness, and fails to \nexplain its experiential aspect.[142] By contrast, A. C. Elitzur argued: \"While [GWT] does not address the \n'hard problem', namely, the very nature of consciousness, it constrains any theory that attempts to do so \nand provides important insights into the relation between consciousness and cognition.\"[143] \n\nFor his part, Baars writes (along with two colleagues) that there is no hard problem of explaining qualia \nover and above the problem of explaining causal functions, because qualia are entailed by neural activity \nand themselves causal.[21] Dehaene, in his 2014 book*Consciousness and the Brain*, rejected the concept \nof qualia and argued that Chalmers' \"easy problems\" of consciousness are actually the hard problems.[20] \nHe further stated that the \"hard problem\" is based only upon ill-defined intuitions that are continually \nshifting as understanding evolves:[20] \n\nOnce our intuitions are educated by cognitive neuroscience and computer simulations, \nChalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental \nexperience, detached from any information-processing role, will be viewed as a peculiar idea \nof the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science \nof consciousness will keep eating away at the hard problem of consciousness until it \nvanishes.", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Chalmers, David (1995). \"Facing up to the problem of consciousness\" (http://www.imprint.co.uk/ \n\nchalmers.html).*Journal of Consciousness Studies*.**2**(3): 200–219. \nCiteSeerX 10.1.1.103.8362 (https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103. \n8362). Archived (https://web.archive.org/web/20050308163649/http://www.imprint.co.uk/chal \nmers.html) from the original on 8 March 2005. Retrieved 11 October 2018. \n\nChalla, Subhash; Moreland, Mark R.; Mušicki, Darko; Evans, Robin J. (2011).*Fundamentals of*\n*Object Tracking*. Cambridge University Press. doi:10.1017/CBO9780511975837 (https://doi. \norg/10.1017%2FCBO9780511975837). ISBN 978-0-5218-7628-5. \n\nChristian, Brian (2020).*The Alignment Problem: Machine learning and human values*. W. W. \n\nNorton & Company. ISBN 978-0-3938-6833-3. OCLC 1233266753 (https://search.worldcat.o \nrg/oclc/1233266753). \n\nCiresan, D.; Meier, U.; Schmidhuber, J. (2012). \"Multi-column deep neural networks for image \nclassification\".*2012 IEEE Conference on Computer Vision and Pattern Recognition*. \npp. 3642–3649. arXiv:1202.2745 (https://arxiv.org/abs/1202.2745). \ndoi:10.1109/cvpr.2012.6248110 (https://doi.org/10.1109%2Fcvpr.2012.6248110). ISBN 978- \n1-4673-1228-8. S2CID 2161592 (https://api.semanticscholar.org/CorpusID:2161592). \n\nClark, Jack (2015b). \"Why 2015 Was a Breakthrough Year in Artificial Intelligence\" (https://www. \nbloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artificial-int \nelligence).*Bloomberg.com*. Archived (https://web.archive.org/web/20161123053855/https:// \nwww.bloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artific \nial-intelligence) from the original on 23 November 2016. Retrieved 23 November 2016. \n\nCNA (12 January 2019). \"Commentary: Bad news. Artificial intelligence is biased\" (https://www.c \nhannelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loans-key- \nchallenge-11097374).*CNA*. Archived (https://web.archive.org/web/20190112104421/https:// \nwww.channelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loan \ns-key-challenge-11097374) from the original on 12 January 2019. Retrieved 19 June 2020. \n\nCybenko, G. (1988). Continuous valued neural networks with two hidden layers are sufficient \n\n(Report). Department of Computer Science, Tufts University. \n\nDeng, L.; Yu, D. (2014). \"Deep Learning: Methods and Applications\" (http://research.microsoft.c \nom/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF).*Foundations and*\n*Trends in Signal Processing*.**7**(3–4): 197–387. doi:10.1561/2000000039 (https://doi.org/10. \n1561%2F2000000039). Archived (https://web.archive.org/web/20160314152112/http://resea \nrch.microsoft.com/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF) \nfrom the original on 14 March 2016. Retrieved 18 October 2014. \n\nDennett, Daniel (1991).*Consciousness Explained*. The Penguin Press. ISBN 978-0-7139-9037- \n\n9. \n\nDiFeliciantonio, Chase (3 April 2023). \"AI has already changed the world. This report shows \n\nhow\" (https://www.sfchronicle.com/tech/article/ai-artificial-intelligence-report-stanford-17869 \n558.php).*San Francisco Chronicle*. Archived (https://web.archive.org/web/2023061901530 \n9/https://www.sfchronicle.com/tech/article/ai-artificial-intelligence-report-stanford-17869558. \nphp) from the original on 19 June 2023. Retrieved 19 June 2023. \n\nDickson, Ben (2 May 2022). \"Machine learning: What is the transformer architecture?\" (https://b \ndtechtalks.com/2022/05/02/what-is-the-transformer).*TechTalks*. Archived (https://web.archiv \ne.org/web/20231122142948/https://bdtechtalks.com/2022/05/02/what-is-the-transformer/) \nfrom the original on 22 November 2023. Retrieved 22 November 2023. \n\nDockrill, Peter (27 June 2022), \"Robots With Flawed AI Make Sexist And Racist Decisions,", + "page_start": 54, + "page_end": 54, + "source_file": "wikipedia3.pdf" + }, + { + "text": "66. Harris, Sam. \"Making Sense #96\" (https://samharris.org/subscriber-extras/96-nature-conscio \nusness/).*SamHarris.org*. Sam Harris. Retrieved 27 August 2020. \"(25.45) TM:I think it will \nnot be a mystery. Life is not a mystery anymore, but a hundred and fifty years ago many \npeople thought that this is an irreducible mystery. (25:57) Harris:So you're not a fan \nanymore, if you ever were, of the framing by David Chalmers of the Hard Problem of \nConsciousness? Metzinger: No, that's so boring. I mean, that's last century. I mean, you \nknow, we all respect Dave [Chalmers], and we know he is very smart and has got a very fast \nmind, no debate about that. But conceivability arguments are just very, very weak. If you \nhave an ill-defined folk psychological umbrella term like \"consciousness\", then you can pull \noff all kinds of scenarios and zombie thought experiments. It doesn't really… It helped to \nclarify some issues in the mid 90's, but the consciousness community has listened to this \nand just moved on. I mean nobody of the serious researchers in the field thinks about this \nanymore, but it has taken on like a folkloristic life of its own. A lot of people talk about the \nHard Problem who wouldn't be able to state what it consists in now.\" \n\n67. Garrett, Brian Jonathan (May 2006). \"What the History of Vitalism Teaches Us About \n\nConsciousness and the 'Hard Problem' \".*Philosophy and Phenomenological Research*.**72**\n(3): 576–588. doi:10.1111/j.1933-1592.2006.tb00584.x (https://doi.org/10.1111%2Fj.1933-1 \n592.2006.tb00584.x). \n\n68. Hacker, Peter (2010). \"Hacker's challenge\" (http://philpapers.org/rec/HACHC).*The*\n\n*Philosophers' Magazine*.**51**(51): 23–32. doi:10.5840/tpm2010517 (https://doi.org/10.5840% \n2Ftpm2010517). \n\n69. Schaal, David W. (2005). \"Naming Our Concerns About Neuroscience: A Review of Bennett \nand Hacker's*Philosophical Foundations of Neuroscience*\" (https://www.ncbi.nlm.nih.gov/pm \nc/articles/PMC1389787).*Journal of the Experimental Analysis of Behavior*.**84**(3): 683–692. \ndoi:10.1901/jeab.2005.83-05 (https://doi.org/10.1901%2Fjeab.2005.83-05). PMC 1389787 \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1389787). PMID 16596986 (https://pubmed. \nncbi.nlm.nih.gov/16596986). \n\n70. Dennett, Daniel C. (1979). \"On the Absence of Phenomenology\". In Gustafson, Donald F.; \nTapscott, Bangs L. (eds.).*Body, Mind, and Method*. Kluwer Academic Publishers. pp. 93– \n113. \n\n71. Dennett, Daniel C. (1991).*Consciousness Explained*. Penguin Books. \n72. Dennett, Daniel C. (2003). \"Explaining the 'magic' of consciousness\".*Journal of Cultural and*\n*Evolutionary Psychology*.**1**(1): 7–19. doi:10.1556/jcep.1.2003.1.2 (https://doi.org/10.1556% \n2Fjcep.1.2003.1.2). S2CID 144560246 (https://api.semanticscholar.org/CorpusID:14456024 \n6). \n\n73. Dennett, Daniel C. (1991).*Consciousness explained*(https://archive.org/details/consciousne \n\nssexp00denn). Boston: Little, Brown and Company. ISBN 978-0316180658. \n\n74. Anthis, Jacy (2022). \"Consciousness Semanticism: A Precise Eliminativist Theory of \nConsciousness\" (https://philarchive.org/rec/ANTCSA).*Biologically Inspired Cognitive*\n*Architectures 2021*. Studies in Computational Intelligence. Vol. 1032. pp. 20–41. \ndoi:10.1007/978-3-030-96993-6_3 (https://doi.org/10.1007%2F978-3-030-96993-6_3). \nISBN 978-3-030-96992-9. Retrieved 7 August 2022. \n\n75. Irvine, Elizabeth (2013).*Consciousness as a scientific concept: a philosophy of science*\n\n*perspective*. Studies in brain and mind. Vol. 5. Dordrecht; New York: Springer-Verlag. p. 167 \n(https://books.google.com/books?id=jO4HNB7OoUgC&pg=PA167). ISBN 9789400751729. \n76. Chalmers, David (2018). \"The Meta-Problem of Consciousness\" (http://consc.net/papers/me \n\ntaproblem.pdf) (PDF).*Journal of Consciousness Studies*.**25**(9–10): 6–61. Retrieved \n6 February 2019. \n\n77. Graziano, Michael (2013).*Consciousness and the social brain*. Oxford; New York: Oxford \n\nUniversity Press. ISBN 978-0190263195.", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is the role of the PhilPapers organization ?", + "target_page": 6, + "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "' s role is to assist the Board onsibilities associated with the ounts, its external financial tiemal control structure, riskannual declaration of their independence to the Audit Committee.", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Paulson, Lawrence C. (February 2018). \"Computational Logic: Its Origins and Applications\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832843).*Proceedings of the Royal Society*\n*A: Mathematical, Physical and Engineering Sciences*.**474**(2210): 1–14. arXiv:1712.04375 \n(https://arxiv.org/abs/1712.04375). Bibcode:2018RSPSA.47470872P (https://ui.adsabs.harv \nard.edu/abs/2018RSPSA.47470872P). doi:10.1098/rspa.2017.0872 (https://doi.org/10.109 \n8%2Frspa.2017.0872). PMC 5832843 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832 \n843). PMID 29507522 (https://pubmed.ncbi.nlm.nih.gov/29507522). S2CID 3805901 (http \ns://api.semanticscholar.org/CorpusID:3805901). \nPedemonte, Bettina (25 June 2018). \"Strategic vs Definitory Rules: Their Role in Abductive \nArgumentation and their Relationship with Deductive Proof\" (https://www.ejmste.com/article/ \nstrategic-vs-definitory-rules-their-role-in-abductive-argumentation-and-their-relationship-with \n-5539).*Eurasia Journal of Mathematics, Science and Technology Education*.**14**(9): 1–17. \ndoi:10.29333/ejmste/92562 (https://doi.org/10.29333%2Fejmste%2F92562). ISSN 1305- \n8215 (https://search.worldcat.org/issn/1305-8215). S2CID 126245285 (https://api.semantics \ncholar.org/CorpusID:126245285). Archived (https://web.archive.org/web/20211207195246/h \nttps://www.ejmste.com/article/strategic-vs-definitory-rules-their-role-in-abductive-argumentati \non-and-their-relationship-with-5539) from the original on 7 December 2021. Retrieved \n8 January 2022. \nPickel, Bryan (1 July 2020). \"Structured Propositions and Trivial Composition\" (https://doi.or \ng/10.1007%2Fs11229-018-1853-1).*Synthese*.**197**(7): 2991–3006. doi:10.1007/s11229- \n018-1853-1 (https://doi.org/10.1007%2Fs11229-018-1853-1). hdl:20.500.11820/3427c028- \nf2cb-4216-a199-9679a49ce71c (https://hdl.handle.net/20.500.11820%2F3427c028-f2cb-42 \n16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964). \nS2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020). \nPietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri \nes/logical-form/#pat).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta \nnford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved \n4 December 2021. \nPlanty-Bonjour, Guy (2012).*The Categories of Dialectical Materialism: Contemporary Soviet*\n*Ontology*. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0. \nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. \norg/rec/POSCAW-4).*Informal Logic*.**36**(4): 563–593. doi:10.22329/il.v36i4.4527 (https://do \ni.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht \ntps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved \n8 January 2022. \nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan \nford.edu/entries/logic-paraconsistent/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021. \nPépin, Jean (2004). \"Logos\".*Encyclopedia of Religion*(https://www.encyclopedia.com/philo \nsophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02- \n865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi \na.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the \noriginal on 29 December 2021. Retrieved 29 December 2021. \nPutnam, H. (1969). \"Is Logic Empirical?\".*Boston Studies in the Philosophy of Science*. \nVol. 5. pp. 216–241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94- \n010-3381-7_5). ISBN 978-94-010-3383-1. \nQuine, Willard Van Orman (1981).*Mathematical Logic*. Harvard University Press. p. 1. \nISBN 978-0-674-55451-1.", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Shermer, Michael (25 October 2022).*Conspiracy: Why the Rational Believe the Irrational*. \nJHU Press. ISBN 978-1-4214-4445-1. \nSider, Theodore (2010).*Logic for Philosophy*. Oxford University Press. ISBN 978-0-19- \n957558-9. \nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt \nps://philpapers.org/rec/SIEENA).*Argumentation*.**11**(3): 277–292. \ndoi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). \nS2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// \nweb.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original \non 28 February 2022. Retrieved 4 January 2022. \nSimpson, R. L. (2008).*Essentials of Symbolic Logic*(3rd ed.). Broadview Press. p. 14. \nISBN 978-1-77048-495-5. \nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e \ndu/entries/ockham/#SummLogi).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. \nSpriggs, John (2012).*GSN – The Goal Structuring Notation: A Structured Approach to*\n*Presenting Arguments*. Springer Science & Business Media. pp. 20–22. ISBN 978-1-4471- \n2312-5. \nStairs, Allen (2017).*A Thinker's Guide to the Philosophy of Religion*. Routledge. p. 343. \nISBN 978-1-351-21981-5. \nSternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought).*Encyclopædia*\n*Britannica*. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c \nom/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021. \nStolyar, Abram Aronovich (1 January 1984).*Introduction to Elementary Mathematical Logic*. \nCourier Corporation. ISBN 978-0-486-64561-2. \nStone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https:// \nphilpapers.org/rec/STODTA).*Informal Logic*.**32**(3): 327–356. doi:10.22329/il.v32i3.3681 (ht \ntps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812 \n3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved \n8 January 2022. \nStump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical).*encyclopedia.com*. Archived (https://web. \narchive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021. \nRetrieved 20 March 2021. \nTalbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo \nlogy-bayesian/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta \nnford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved \n6 March 2021. \nTarski, Alfred (1994).*Introduction to Logic and to the Methodology of the Deductive*\n*Sciences*. Oxford University Press. p. 40. ISBN 978-0-19-802139-1. \nTondl, L. (2012).*Problems of Semantics: A Contribution to the Analysis of the Language*\n*Science*. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9. \nVelleman, Daniel J. (2006).*How to Prove It: A Structured Approach*. Cambridge University \nPress. p. 8, 103. ISBN 978-0-521-67599-4. \nVickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ \nay/document/obo-9780195396577/obo-9780195396577-0171.xml).*Oxford Bibliographies*. \nOxford University Press. Retrieved 18 January 2023.", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Wolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR \nL).*Philosophia*.**7**(2): 327–340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02 \n378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796). \nArchived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR \nL) from the original on 16 December 2021. Retrieved 4 January 2022. \nZegarelli, Mark (2010).*Logic For Dummies*. John Wiley & Sons. p. 30. ISBN 978-1-118- \n05307-2.", + "page_start": 37, + "page_end": 37, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Blair, J. Anthony; Johnson, Ralph H. (2000). \"Informal Logic: An Overview\" (https://philpaper \ns.org/rec/BLAILA-3).*Informal Logic*.**20**(2): 93–107. doi:10.22329/il.v20i2.2262 (https://doi.o \nrg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http \ns://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved \n29 December 2021. \nBlair, J. Anthony (20 October 2011).*Groundwork in the Theory of Argumentation: Selected*\n*Papers of J. Anthony Blair*. Springer Science & Business Media. p. 47. ISBN 978-94-007- \n2363-4. \nBobzien, Susanne (2020). \"Ancient Logic: 2. Aristotle\" (https://plato.stanford.edu/entries/logi \nc-ancient/#Ari).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20180828102117/https://plato.sta \nnford.edu/entries/logic-ancient/#Ari) from the original on 28 August 2018. Retrieved \n3 January 2022. \nBorchert, Donald, ed. (2006a). \"Computability Theory\".*Macmillan Encyclopedia of*\n*Philosophy Volume 2*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 372– \n390. ISBN 978-0-02-865782-0. \nBorchert, Donald (2006b). \"Induction\".*Macmillan Encyclopedia of Philosophy Volume 4*(htt \nps://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 635–648. ISBN 978-0-02- \n865784-4. Archived (https://web.archive.org/web/20210112065913/https://philpapers.org/re \nc/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBorchert, Donald (2006c). \"Logic, Non-Classical\".*Macmillan Encyclopedia of Philosophy*\n*Volume 5*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 485–492. \nISBN 978-0-02-865785-1. Archived (https://web.archive.org/web/20210112065913/https://ph \nilpapers.org/rec/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBoris, Kulik; Alexander, Fridman (30 November 2017).*N-ary Relations for Logical Analysis*\n*of Data and Knowledge*. IGI Global. p. 74. ISBN 978-1-5225-2783-1. \nBridges, Douglas; Ishihara, Hajime; Rathjen, Michael; Schwichtenberg, Helmut (30 April \n2023).*Handbook of Constructive Mathematics*. Cambridge University Press. pp. 73–4. \nISBN 978-1-316-51086-5. \nBrody, Boruch A. (2006).*Encyclopedia of Philosophy*. Vol. 5. Donald M. Borchert (2nd ed.). \nThomson Gale/Macmillan Reference US. pp. 535–536. ISBN 978-0-02-865780-6. \nOCLC 61151356 (https://search.worldcat.org/oclc/61151356). \"The two most important \ntypes of logical calculi are propositional (or sentential) calculi and functional (or predicate) \ncalculi. A propositional calculus is a system containing propositional variables and \nconnectives (some also contain propositional constants) but not individual or functional \nvariables or constants. In the extended propositional calculus, quantifiers whose operator \nvariables are propositional variables are added.\" \nBunnin, Nicholas; Yu, Jiyuan (27 January 2009).*The Blackwell Dictionary of Western*\n*Philosophy*. John Wiley & Sons. p. 179. ISBN 978-1-4051-9112-8. \nBurgess, John P. (2009). \"1. Classical logic\".*Philosophical Logic*(https://philpapers.org/rec/ \nBURPL-3). Princeton, NJ: Princeton University Press. pp. 1–12. ISBN 978-0-691-15633-0. \nArchived (https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL- \n3) from the original on 16 December 2021. Retrieved 4 January 2022. \nBäck, Allan T. (2016).*Aristotle's Theory of Predication*. Brill. p. 317. ISBN 978-90-04-32109- \n0. \nCalderbank, Robert; Sloane, Neil J. A. (April 2001). \"Claude Shannon (1916–2001)\" (https:// \ndoi.org/10.1038%2F35071223).*Nature*.**410**(6830): 768. doi:10.1038/35071223 (https://doi. \norg/10.1038%2F35071223). ISSN 1476-4687 (https://search.worldcat.org/issn/1476-4687). \nPMID 11298432 (https://pubmed.ncbi.nlm.nih.gov/11298432). S2CID 4402158 (https://api.s \nemanticscholar.org/CorpusID:4402158). \nCarnielli, Walter; Pizzi, Claudio (2008).*Modalities and Multimodalities*. Springer Science &", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia1.pdf" + }, + { + "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation’s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above.", + "page_start": 16, + "page_end": 16, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Iqbal, Mohammad (2013). \"The Spirit of Muslim Culture\".*The Reconstruction of Religious*\n*Thought in Islam*(http://www.allamaiqbal.com/works/prose/english/reconstruction/). Stanford \nUniversity Press. pp. 99–115. ISBN 978-0-8047-8686-7. \nIrvine, Andrew David (2022). \"Bertrand Russell\" (https://plato.stanford.edu/entries/russell/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 29 September 2022. \nJacquette, Dale (2006). \"Introduction: Philosophy of logic today\".*Philosophy of Logic*(http \ns://philpapers.org/rec/JACPOL). North Holland. pp. 1–12. ISBN 978-0-444-51541-4. \nArchived (https://web.archive.org/web/20211207184932/https://philpapers.org/rec/JACPOL) \nfrom the original on 7 December 2021. Retrieved 29 December 2021. \nJago, Mark (2014).*The Impossible: An Essay on Hyperintensionality*. OUP Oxford. p. 41. \nISBN 978-0-19-101915-9. \nJanssen, Theo M. V.; Zimmermann, Thomas Ede (2021). \"Montague Semantics\" (https://plat \no.stanford.edu/entries/montague-semantics/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. pp. 3–4. Retrieved 10 March 2023. \nJohnson, Ralph H. (1999). \"The Relation Between Formal and Informal Logic\" (https://philpa \npers.org/rec/JOHTRB-2).*Argumentation*.**13**(3): 265–274. doi:10.1023/A:1007789101256 \n(https://doi.org/10.1023%2FA%3A1007789101256). S2CID 141283158 (https://api.semantic \nscholar.org/CorpusID:141283158). Archived (https://web.archive.org/web/20211207184706/ \nhttps://philpapers.org/rec/JOHTRB-2) from the original on 7 December 2021. Retrieved \n2 January 2022. \nJohnson, Ralph H. (15 July 2014).*The Rise of Informal Logic: Essays on Argumentation,*\n*Critical Thinking, Reasoning and Politics*. University of Windsor. ISBN 978-0-920233-71-9. \nKetland, Jeffrey (2005). \"Second Order Logic\".*Macmillan Encyclopedia of Philosophy*\n*Volume 8*(https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-a \nnd-maps/second-order-logic). Macmillan Reference USA. pp. 707–708. ISBN 978-0-02- \n865788-2. Archived (https://web.archive.org/web/20211207184921/https://www.encyclopedi \na.com/humanities/encyclopedias-almanacs-transcripts-and-maps/second-order-logic) from \nthe original on 7 December 2021. Retrieved 4 January 2022. \nKing, Jeffrey C. (2 September 2009). \"Formal Semantics\".*The Oxford Handbook of*\n*Philosophy of Language*. pp. 557–8. doi:10.1093/oxfordhb/9780199552238.003.0023 (http \ns://doi.org/10.1093%2Foxfordhb%2F9780199552238.003.0023). ISBN 978-0-19-955223-8. \nKing, Jeffrey C. (2019). \"Structured Propositions\" (https://plato.stanford.edu/entries/propositi \nons-structured/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211025211706/https://plato.sta \nnford.edu/entries/propositions-structured/) from the original on 25 October 2021. Retrieved \n4 December 2021. \nKlement, Kevin C. (1995b). \"Propositional Logic\" (https://iep.utm.edu/prop-log/).*Internet*\n*Encyclopedia of Philosophy*. ISSN 2161-0002 (https://search.worldcat.org/issn/2161-0002). \nRetrieved 23 September 2022. \nKline, Morris (1972).*Mathematical Thought From Ancient to Modern Times*. Oxford \nUniversity Press. ISBN 978-0-19-506135-2. \nKneale, William; Kneale, Martha (1962).*The Development of Logic*. Clarendon Press. \nISBN 978-0-19-824773-9. \nKnuuttila, Simo (1980).*Reforging the Great Chain of Being: Studies of the History of Modal*\n*Theories*. Springer Science & Business Media. p. 71. ISBN 978-90-277-1125-0. \nKorb, Kevin (2004). \"Bayesian Informal Logic and Fallacy\" (https://philpapers.org/rec/KORBI \nL).*Informal Logic*.**24**(1): 41–70. doi:10.22329/il.v24i1.2132 (https://doi.org/10.22329%2Fil. \nv24i1.2132). Archived (https://web.archive.org/web/20211110075255/https://philpapers.org/r \nec/KORBIL) from the original on 10 November 2021. Retrieved 2 January 2022.", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
rec ( SCAUAA - 2 ). Journal of the American Philosophical Association B [ 1 ]. 52 – 71. doit LEL1L1L1L1L1L1L1H27 / ispa - 203347 ( Potpa :// doicorga ' s31.1117962F : spaa. 2033.47 ). S2CO3 Z286727.29 ( Mpr5.57api. semanticschrobiat. organg
80. Augustine of Hippo. \" Book 11, Chapter 26 \". City of God.
81. Descartes, Rene ( 1637 ). \" 4 \". Discourse on the Method.
82. Descartes, Rene ( 1641 ), \" Second Meditation \". Meditations on First Philosophy.
83. Chalmers, David ( 2020 ), “ Debunking Argumerts for Illusionion ” ( https :// philpapers. org / ec / CHADAF - 2 ), Journal of Concousness Studies. If ( 5 – 6 ): 258 – 261.
84 Chalmers, David ( 2002 ), \" Debunking Arguments for Illusionion \" [ https :// philpapers. org / ec / CHADAF - 2 ), Journal of Corocousness Studies. ZY ( 5 – 6 )]. ZSI - 201.
85. Strawson, C - ( 20124 ), “ The Consciousness Deniers ” [ https :// www. mybooks. com / daily / 2018 / 03.3 / 39e - consciousness - demiers $). The New York Review of Books.
86. Koch, Christof ( 20159 ). The Feeling of Life itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 2
87. Koch, Christal ( 20159 ). The Feeling of Life Itself : Why Consciousness is Everywhere But Can ’ t be Computed MIT Press. p. 3.
88. Balmer, A ( 2020 ), “ Soft - Wired Illusionism vs. the Meta - Problem of Consciousness ”,( https :// ohjlpapers. org / rec / BanLSIV ). Journal of Consoousness Studies : zf ( p - 6 ). 26 – 37.
89. Chalmers, David ( 2020 ), ' Is the Hard Problem of Consciousness Universal?\". Journal of Contoossness Studies : Zf ( 5 – 6 ): 221 – 257.
90.91 Papineau, D ( 20159, “ Response to Chalmers ” The Meta - Problem of Consciousness ” ( https :// philgapers. org / res :/ PPTC -( 5 ). Journal of Consciousness Studies : 86 ( 0 – 10 ): 170 – 121.
92... ILevine, \" Conceivability, Identity, and the Explanatory Gap \" in Stuart R. Hameroff, Affed W. Kazaniak and David Chalmers ( eds.). Towards a Science of Corsciousness III : The Third Tucson Discussions and Debates, The MIT Peess, 24
92. Gennaro, Rocco. 3 “ Consciousness ” ( https :// www. ep. utm. edu / consciou ). Internet Encyclopedia of Philosophy.
ISE, Brick, Next ’, Stabilitaker, Publishti, CDERS, Conceptual Anglobiological, Qualitary, and the Ecytopatory Color ’, PrtqcHewernyu edu / goacildeptibilitie / faculty / brock - bropers / EcoplanatoryGag adily ( PSF ), The Phitosps
94 Stallgar, Dariel ( 2005 ), “ Physicalesm and Phenomenal Concepter ”, Mind & Languager, 20 ( 5 ). 490 – 494 ( 00 : 111111111111111111110259 : 3394.33055.0029Ex ( Pitprc / l9bri. orga10.1111111942F ), 02939 :. 0094.2 : 00296.4 ).
55. Chalmers, Devid ( 2006 ), \" Phenomenal Concepts and the Explanatory Ctg /\" ( http :// corocc. ne
\n\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on \n\nDavid Chalmers\".*Journal of Consciousness Studies*.**26**(9–10): 257–269. \n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of \n\nConsciousness\".*Journal of Consciousness Studies*.**26**(9–10): 136–147. \n\n98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland \nlock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g).*YouTube*. 9 July 2022. \n\n99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia2.pdf" + }, + { + "text": "paragraph. Whatever one may think about nuclear power, Fukushima remembered how important \n\ntotal transparency and accountability are in the management and maintenance of*all*power sources, \n\nand in the decision-making processes that create the corresponding public policies. \n\nFor the meantime, we'll note how all these events seem to hint that structural need and bottom-up \n\ndemand for Open Data are mounting everywhere, even in cultural contexts very different than those \n\nin which Open Data was born, and even if sometimes they are not mentioned explicitly or \n\nconsciously. Even in Western Countries, the high-level*motivations*, for the transparency and \n\ngovernance models that inspire Open Data, from positions different than those from which the \n\nmovement started, are increasing. In 1931 Pope Pio XI wrote, in the Encyclical Quadragesimo anno \n\nthat: \n\n*80. The supreme authority of the State ought, therefore, to let subordinate groups*\n*handle matters and concerns of lesser importance, which would otherwise dissipate its*\n*efforts greatly. Thereby the State will more freely, powerfully, and effectively do all*\n*those things that belong to it alone because it alone can do them: directing, watching,*\n*urging, restraining, as occasion requires and necessity demands. Therefore, those in*\n*power should be sure that the more perfectly a graduated order is kept among the*\n*various associations, in observance of the principle of \"subsidiary function,\" the*\n*stronger social authority and effectiveness will be the happier and more prosperous the*\n*condition of the State.*\n\nThis is the principle of subsidiarity, often summarized in a way that may sound familiar to many \n\nOpen Data advocates:*\"What men can do by themselves with their own resources can't be taken*\n\n*away from them and assigned as a task to society\"*. In March 2011, journalist Guido Gentili made \n\njust this connection. After noting that the principle was also introduced in the Italian Constitution by \n\nthe 2001 reform of article 118, he concluded that subsidiarity as a strategy for development*isn't an*\n\n*English invention and the \"Big Society\" vision (a proposal in which Open data is key) would do*\n\n*good to Italy too\"*. \n\nAt a more practical and economical level, digital information continues to increase. In spite of \n\nmounting cost pressures, large public and private organizations have to maintain massive amounts \n\nof structured and unstructured data, that keep growing, both for their own internal needs and to \n\nsimply*comply with government regulations*. At the same time, signals that traditional public \n\nservices and the whole welfare state won't remain sustainable for long with traditional means, \n\ncontinue to arrive, therefore strengthening the search for radical, innovative and cost-effective \n\nsolutions. \n\nBesides costs, another practical driver and justification for Open Data that is becoming more and", + "page_start": 3, + "page_end": 3, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", + "target_page": 5, + "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\n\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "Benard instability,” Phys. Rev. Lett. 88, 164501 (2002). \n\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, “Spontaneous formation of nanoparticle stripe \n\n\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "[20] C. Tomlinson, “On the motion of certain liquids on the surface of water,” Phil. Mag. Ser. 4 39, 32–48 \n\n(1870). \n\n[21] C. G. Marangoni, “Ueber die Ausbreitung der Tropfen einer Fl¨ussigkeit auf der Oberfl¨ache einer \n\nanderen,” Ann. Phys. (Poggendorf) 143, 337–354 (1871). \n\n\n \n \n \n \n [html]\n
( 22 ) O. Karthaes, L. Grasjii, N. Manyama, and M. Shimomura, “ Formation of ordered mesoscopic polymer arrays by deverting.” Chaos 9.300 – 314 ( 1999 ).[ 23 ] X. Gu. D. Raghavaa, J. F. Doglas, and A. Karim, “ Hole - growth instability in the develting of evaporating polymer solution films,” J. Polym. Sci. Pt. B - Polym. Phys, 48.2025 – 2832 ( 2002 ).
[ 24 ] S. W. Hong. I. F. Xia, and Z. Q. Lin. “ Spontaneous formation of mesoscale polymer patterns in an evaporating bound solution.” Adv. Mater. Ifh J. 013 – 1417 ( 2007 ).[ 25 ] O. Lia. C : H. Ehange, I. Zhan, and V. X. Zhus, “ Study of the morphology of the three - phase contact line and in evolution by membrological examination after droplet experation of aqueous polymer solutions ” Langmin ( 24.702 – 700 ) ( 2800
[ 38 ] M. Merig. U. Thirde. I. Bradi, G. Leibiger, W. Ponge, and H. Wendrodic “ Scaning force microscopy and geometrical analysis of two - dimensional collagen network formation.” Sarface and hterface Asalysis 25.1097 ).[ 27 ] M. Merig. U. Thirde, J. Braft, D. Kenm, and W. Ponper “ Drovetting of thin collagenous precursor films,” App. Phys. A 66, S565 – S568 ( 1998 ).
[ 28 ] U. Thicke, M. Merig, and W. Pompe.; Thewetting of an exaporating thin liquid film : Heterogeneous micleation and surface instability.’ Phys. Rev. Let. 88.2609 – 2872 ( 1998 ).[ 29 ] H. Marda, ‘ An atomic force microscopy study of outered molecular assemblies and concentric ting patterns from evaporating droplets of collagen solutions,’ Langmair IE, 8505 – 8513 ( 1999 ).
[ 30 ] 1.1 Smalled, 4.5. V. 22bb, 1. C. Batler, 0.12 Laventovich, and G. C. L. Wong, “ Structure and physamics of liquid crystalline pattern formation in drying droplets of DNA.” Phys. Rev. Lett Men ( 177801 ). 2006.[ 31 ] L. Zhang, S. Mahesbwari, H. C. Chang, and Y. X. Zhu, “ Evaprative self - usembly from complex DNA - colloid suspensions,” Langmuir 24.3911 – 2917 ( 2018 ).
[ 12 ] M. Maillarid, L. Motte, A. T. Nigo, and M. P. Pileni, ‘ Rings and heragons made of nanocrystals : A. Marangoni effect.’ 1. Phys. Chem. B 184.11871 - 11877 ( 2000 ).[ 33 ] G L Ge and L. Bres, “ Evidence for spinodal phase separation in two - dimensional nanocrystal self - assembly.” 1. Phys. Chem. B 184.9573 – 9575 ( 200 ).
", + "page_start": 26, + "page_end": 26, + "source_file": "1001.2669.pdf" + }, + { + "text": "[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, “Polymers on nanope- \n\nriodic, heterogeneous surfaces,” Phys. Rev. Lett. 82, 2602–2605 (1999). \n\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, “Pattern-directed dewetting of \n\nultrathin polymer films,” Langmuir 18, 7041–7048 (2002). \n\n[112] M. Geoghegan and G. Krausch, “Wetting at polymer surfaces and interfaces,” Prog. Polym. Sci. 28, \n\n261–302 (2003). \n\n[113] P. Lenz and R. Lipowsky, “Morphological transitions of wetting layers on structured surfaces,” Phys. \n\nRev. Lett. 80, 1920–1923 (1998). \n\n[114] C. Bauer, S. Dietrich, and A. O. Parry, “Morphological phase transitions of thin fluid films on chem- \n\nically structured substrates,” Europhys. Lett. 47, 474–480 (1999). \n\n[115] R. Konnur, K. Kargupta, and A. Sharma, “Instability and morphology of thin liquid films on chemi- \n\ncally heterogeneous substrates,” Phys. Rev. Lett. 84, 931–934 (2000). \n\n[116] M. Brinkmann and R. Lipowsky, “Wetting morphologies on substrates with striped surface domains,” \n\nJ. Appl. Phys. 92, 4296–4306 (2002). \n\n[117] L. Brusch, H. K¨uhne, U. Thiele, and M. B¨ar, “Dewetting of thin films on heterogeneous substrates: \n\nPinning vs. coarsening,” Phys. Rev. E 66, 011602 (2002). \n\n[118] U. Thiele, L. Brusch, M. Bestehorn, and M. B¨ar, “Modelling thin-film dewetting on structured sub- \n\nstrates and templates: Bifurcation analysis and numerical simulations,” Eur. Phys. J. E 11, 255–271 \n\n(2003). \n\n[119] U. Thiele, “Open questions and promising new fields in dewetting,” Eur. Phys. J. E 12, 409–416 \n\n(2003). \n\n[120] D. M. Anderson, G. B. McFadden, and A. A. Wheeler, “Diffuse-interface methods in fluid mechan- \n\nics,” Ann. Rev. Fluid Mech. 30, 139–165 (1998). \n\n[121] U. Thiele, S. Madruga, and L. Frastia, “Decomposition driven interface evolution for layers of binary \n\nmixtures: I. Model derivation and stratified base states,” Phys. Fluids 19, 122106 (2007). \n\n[122] O. A. Frolovskaya, A. A. Nepomnyashchy, A. Oron, and A. A. Golovin, “Stability of a two-layer \n\nbinary-fluid system with a diffuse interface,” Phys. Fluids 20, 112105 (2008). \n\n[123] S. Madruga and U. Thiele, “Decomposition driven interface evolution for layers of binary mixtures:", + "page_start": 32, + "page_end": 32, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. \n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-", + "page_start": 22, + "page_end": 22, + "source_file": "1001.2669.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "[97] U. Thiele, M. G. Velarde, K. Neuffer, and Y. Pomeau, “Film rupture in the diffuse interface model \n\ncoupled to hydrodynamics,” Phys. Rev. E 64, 031602 (2001). \n\n[98] J. Heier, J. Groenewold, F. A. Castro, F. Nueesch, and R. Hany, “Enlarged bilayer interfaces from \n\nliquid-liquid dewetting for photovoltaic applications,” P Soc Photo-Opt Instrum Eng 6999, J9991– \n\nJ9991 (2008). \n\n[99] M. D. Haw, M. Gillie, and W. C. K. Poon, “Effects of phase behavior on the drying of colloidal \n\nsuspensions,” Langmuir 18, 1626–1633 (2002). \n\n[100] L. V. Govor, J. Parisi, G. H. Bauer, and G. Reiter, “Instability and droplet formation in evaporating \n\nthin films of a binary solution,” Phys. Rev. E 71, 051603 (2005). \n\n[101] L. V. Govor, G. Reiter, G. H. Bauer, and J. Parisi, “Self-assembled treelike patterns from an evapo- \n\nrating binary solution,” Phys. Rev. E 74, 061603 (2006). \n\n[102] M. Yamamura, T. Nishio, T. Kajiwara, and K. Adachi, “Evaporation-induced pattern formation in \n\npolymer films via secondary phase separation,” Chem. Eng. Sci. 57, 2901–2905 (2002). \n\n[103] P. M¨uller-Buschbaum, E. Bauer, S. Pfister, S. V. Roth, M. Burghammer, C. Riekel, C. David, and \n\nU. Thiele, “Creation of multi-scale stripe-like patterns in thin polymer blend films,” Europhys. Lett. \n\n73, 35–41 (2006). \n\n[104] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, and O. Gengelman, “Meso- \n\nscopic patterning in evaporated polymer solutions: New experimental data and physical mecha- \n\nnisms,” Langmuir 21, 9604–9609 (2005). \n\n[105] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, V. Z. Gaisin, R. Cohen, and \n\nO. V. Gendelman, “Mesoscopic patterning in thin polymer films formed under the fast dip-coating \n\nprocess,” Macromol. Mater. Eng. 290, 114–121 (2005). \n\n[106] J. B. Gibson, K. Zhang, K. Chen, S. Chynoweth, and C. W. Manke, “Simulation of colloid-polymer \n\nsystems using dissipative particle dynamics,” Mol. Simul. 23, 1–41 (1999). \n\n[107] K. Stratford and I. Pagonabarraga, “Parallel simulation of particle suspensions with the lattice Boltz- \n\nmann method,” Comput. Math. Appl. 55, 1585–1593 (2008). \n\n[108] G. Drazer, B. Khusid, J. Koplik, and A. Acrivos, “Wetting and particle adsorption in nanoflows,” \n\nPhys. Fluids 17, 017102 (2005). \n\n[109] J. Kromkamp, D. van den Ende, D. Kandhai, R. van der Sman, and R. Boom, “Lattice Boltzmann \n\nsimulation of 2d and 3d non-Brownian suspensions in Couette flow,” Chem. Eng. Sci. 61, 858–873 \n\n(2006).", + "page_start": 31, + "page_end": 31, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 7: (Colour online) A sequence of profiles during a dewetting process with competing evaporation and \n\nconvection that leads to the dried-in ring structure of nanoparticles displayed in Fig. 6(b). Profiles are at (a) \n\nbefore pinning (t = 0.08T ), (b) at self-pinning (t = 0.13T ), and (c) after depinning (t = 0.29T ), where \n\nT = 3 × 1010τ with τ = η0γH/κ2 (T is of order of 1s). The film thickness profiles h are the bold solid \n\nlines, the nanoparticle concentrations φ are the dotted lines and the nanoparticle layer height hp = hφ are \n\nthe dashed lines. The remaining parameters and scalings are as in Fig. 6(b). \n\n(i) in Fig. 8). The concentration increases further and when it approaches random close packing \n\nφc, the viscosity diverges and the front pins itself. When pinned, further retraction only occurs \n\nthrough evaporation (Fig. 7(b) and regime (ii) in Fig. 8). The front eventually depins and starts \n\nto move again, leaving a nanoparticle ring behind (Fig. 7(c) and regime (iii) in Fig. 8). However, \n\nthe velocity is not as large as at the beginning, owing to the fact that the mean concentration of \n\nparticles has increased. The remaining particles are transported to the centre and are deposited \n\n\n \n \n \n \n [html]\n
DECE WIESIThe simple model used here shows, ( i ) that the contact line stops due to self - piming by the de -posited particles and ( ii ) the Marangoni effect is not necessary for the ring formation. The modelcan easily be refined to account for solutal and / or thermal Marangoni effects [ 88 ] but self - pining
", + "page_start": 21, + "page_end": 21, + "source_file": "1001.2669.pdf" + }, + { + "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting \n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17–19]. We note in \n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly \n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] \n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water. \n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How- \n\never, these systems have not yet been investigated in any great depth. Such systems are compli- \n\ncated because their behaviour is determined by the interplay between the various solute (or colloid) \n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one \n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number \n\nof experiments have been performed employing (colloidal) solutions of polymers [22–25], macro- \n\nmolecules like collagen and DNA [26–31] and nanoparticles [32–40]. The latter are sometimes \n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on \n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi- \n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from \n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’ \n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when \n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", + "page_start": 17, + "page_end": 17, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "Where are located the magnetic ions in the lattice of the studied layers ?", + "target_page": 2, + "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "*J*\n*J* *1*\n*2*\n*z*\n\n*y*\n*J*\n*0*\n\n*x*\n\nFIG. 1: (colors online) (a): body-centered tetragonal (BCT) \nlattice with J0 in-plane coupling constant, and out-of-plane \nJ1, and J2 competing interactions. \n\n~Si are classical planar unit vectors representing the di- \nrection of the total angular momentum of the magnetic \nions, whose magnitude \nj(j + 1) (j = 8 for Holmium \nions) is already encompassed within the definition of the \ninteraction constants J0,1,2. As sketched in Fig. 1, the \nmagnetic ions are located on the sites of a body-centered \ntetragonal (BCT) lattice; the first sum appearing in the \nHamiltonian describes the in-plane (xy) nearest neigh- \nbor (NN) interaction, which is taken ferromagnetic (FM), \nwith exchange strength J0 > 0; the second sum rep- \nresents the coupling, of exchange strength J1, between \nspins belonging to nearest neighbor (NN) planes along \nthe z-direction (which we will assume to coincide with \nthe film growth direction); finally, the third sum takes \ninto account the interaction, of exchange strength J2, be- \ntween spins lying on next-nearest neighbor (NNN) planes \nalong z. In order to have frustration, giving rise to non- \ncollinear order along z in the bulk, NN interaction J1 \ncan be taken both ferro- or antiferromagnetic, but NNN \ncoupling J2 has necessarily to be antiferromagnetic, and \nthe condition |J2| > |J1|/4 must be fulfilled. Such simpli- \nfied Hamiltonian was already employed to simulate he- \nlical ordering in bulk systems by Diep1,17 and Loison18. \nIn the bulk limit, the state of minimal energy of a sys- \ntem described by Eq.(1) corresponds to a helical arrange- \nment of spins. The ground state energy per spin is equal \nto eg(Qz) = [−4J0 − 2J1 (4 cos (Qzc′) + δ cos (2Qzc′))] \nis the distance between NN layers, δ = J2 \nwhere c′ \nJ1 , \nand Qzc′ = arccos \nis the angle between spins ly- \ning on adjacent planes along the z-direction. The ob- \nserved helical arrangement in bulk holmium corresponds \nto Qzc′ ≃ 30.5◦10: \nsuch value can be obtained from \nthe formula above with the set of coupling constants \nJ0=67.2 K, J1=20.9 K, and J2 = −24.2 K, that we have \nemployed in our simulations. The given values for the ex- \nchange constants are the same already used by Weschke \net al. \nin Ref. 13 to interpret experimental data on \nHolmium films on the basis of a J1 − J2 model, after \na proper scaling by the numbers of NN and NNN on \nneighboring layers of a BCT lattice. \n\np \n\nbe achieved with different number of interacting layers: \nnotably, nearest and next-nearest layers competitive in- \nteractions are enough to get a helical structure with a \nwhatever pitch wavevector. Such observation gives us a \npossible way to solve the conundrum previously emerged, \nas we have the possibility of varying the range of inter- \nactions without modifying the helical pitch, thus decou- \npling the two relevant length scales along the film growth \ndirection, and making accessible a range of n of the or- \nder of, or smaller than, the helical pitch, but still large \nenough that a substantial number of layers can behave \nas “bulk” layers. Therefore, while in the previous papers \nwe have studied the properties of ultrathin magnetic films \nof Ho assuming a model with six interlayer exchange in- \nteractions, here we investigate by MC simulations the \nproperties of the same system by making use of the sim- \nplest model Hamiltonian able to describe the onset of a \nhelical magnetic order in Holmium, i.e. we consider only \ntwo inter-layer coupling constants, as previously done in \nRef. 11.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "F. Cinti(1,2,3), A. Rettori(2,3), and A. Cuccoli(2) \n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1 \n(2)CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and \n(3)CNR-INFM S3 National Research Center, I-41100 Modena, Italy \n(Dated: June 8, 2022) \n\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo \nsimulations. The employed model assumes classical planar spins in a body-centered tetragonal \nlattice, where the helical arrangement along the film growth direction has been modeled by nearest \nneighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical \norder. We obtain that, while the in-plane transition temperatures remain essentially unchanged with \nrespect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature \nwhen the film thickness, n, decreases; in the ordered phase, increasing the temperature, a softening \nof the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data \naround both transition temperatures lead us to exclude the presence of a first order transition for all \nanalyzed sizes. Finally, by comparing the results of the present work with those obtained for other \nmodels previously adopted in literature, we can get a deeper insight about the entwined role played \nby the number (range) of interlayer interactions and surface effects in non-collinear thin films. \n\nteractions by including six different exchange constants \nalong the c crystallographic axis, and gives a helix pitch \nwave-vector Qz such that Qzc′ ≃ 30◦, where c′ = c/2 is \nthe distance between nearest neighboring spin layers par- \nallel to the ab crystallographic planes, henceforth denoted \nalso as x − y planes, while z will be taken parallel to c. \nFor n > 16, n being the number of spin layers in the film, \na correct bulk limit is reached, while for lower n the film \nproperties are clearly affected by the strong competition \namong the helical pitch and the surface effects, which in- \nvolve the majority of the spin layers. \nIn the thickness \nrange n = 9 − 16, i.e. right for thickness values com- \nparable with the helical pitch, three different magnetic \nphases emerged, with the high-temperature, disordered, \nparamagnetic phase and the low-temperature, long-range \nordered one separated by an intriguing, \nintermediate- \ntemperature block phase, where outer ordered layers co- \nexist with some inner disordered ones, the phase tran- \nsition of the latter eventually displaying the signatures \nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film \ncollapses once and for all to a quasi-collinear order. \n\nI. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "20 \n**(a)***n =*6 \n15 \n\n10 \n\n) \n. \ng \ne \nd \n( \n\n5 \n\n0 \n0 \n*l*\nϕ \n∆ 5 \n\n**(b)***n =*5 \n4 \n\n3 \n\n2 \n\n1 \n\n0 \n0 1 2 \n*l*\n\n140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. \n\nangle of the magnetization between nearest planes: \n\nl+1 + M y l M y \nM x \nl M x ∆ϕl = ϕl+1 − ϕl = arccos (10) \nl+1 \n(cid:2) (cid:3) \n\nFIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. \n\nAlthough the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). \n\nA possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "The study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n. \n\nThe complex phase diagram unveiled by such MC sim- \nulations awaken however a further intriguing question: \nto what extent the observed behavior may be considered \na simple consequence of the competition between helical \norder and surface effects? I.e., is it just a matter of hav- \ning such a competition or does the range of interactions \nalso play a relevant role? Indeed, when the range of the \ninteractions is large enough we have a greater number of \nplanes which can be thought of as ”surface planes”, i.e. \nfor which the number of interacting neighbors are sig- \nnificantly reduced with respect to the bulk layers; there- \nfore, we expect that the larger the interaction range, the \nstronger should be the surface effects. But, at the same \ntime, the same modulation of the magnetic order can \n\ni \n\nFor these rare-earth elements, the development of new \nand sophisticated experimental methods11 has allowed to \nobtain ultra-thin films where the non-collinear modula- \ntion is comparable with the film thickness. Under such \nconditions the lack of translational invariance due to the \npresence of surfaces results decisive in order to observe \na drastic change of the magnetic structures12. Recent \nexperimental data on ultra-thin Holmium films13 have \nbeen lately interpreted and discussed14,15 on the basis \nof detailed classical Monte Carlo (MC) simulations of a \nspin Hamiltonian, which is believed to give a realistic \nmodeling of bulk Holmium. Such Hamiltonian, proposed \nby Bohr et al.16, allows for competitive middle-range in-", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", + "target_page": 1, + "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "F. Cinti(1,2,3), A. Rettori(2,3), and A. Cuccoli(2) \n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1 \n(2)CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and \n(3)CNR-INFM S3 National Research Center, I-41100 Modena, Italy \n(Dated: June 8, 2022) \n\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo \nsimulations. The employed model assumes classical planar spins in a body-centered tetragonal \nlattice, where the helical arrangement along the film growth direction has been modeled by nearest \nneighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical \norder. We obtain that, while the in-plane transition temperatures remain essentially unchanged with \nrespect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature \nwhen the film thickness, n, decreases; in the ordered phase, increasing the temperature, a softening \nof the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data \naround both transition temperatures lead us to exclude the presence of a first order transition for all \nanalyzed sizes. Finally, by comparing the results of the present work with those obtained for other \nmodels previously adopted in literature, we can get a deeper insight about the entwined role played \nby the number (range) of interlayer interactions and surface effects in non-collinear thin films. \n\nteractions by including six different exchange constants \nalong the c crystallographic axis, and gives a helix pitch \nwave-vector Qz such that Qzc′ ≃ 30◦, where c′ = c/2 is \nthe distance between nearest neighboring spin layers par- \nallel to the ab crystallographic planes, henceforth denoted \nalso as x − y planes, while z will be taken parallel to c. \nFor n > 16, n being the number of spin layers in the film, \na correct bulk limit is reached, while for lower n the film \nproperties are clearly affected by the strong competition \namong the helical pitch and the surface effects, which in- \nvolve the majority of the spin layers. \nIn the thickness \nrange n = 9 − 16, i.e. right for thickness values com- \nparable with the helical pitch, three different magnetic \nphases emerged, with the high-temperature, disordered, \nparamagnetic phase and the low-temperature, long-range \nordered one separated by an intriguing, \nintermediate- \ntemperature block phase, where outer ordered layers co- \nexist with some inner disordered ones, the phase tran- \nsition of the latter eventually displaying the signatures \nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film \ncollapses once and for all to a quasi-collinear order. \n\nI. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "K. Olejnik,1, 2 P. Wadley,3 J. Haigh,3 K. W. Edmonds,3 R. P. Campion,3 A. W. Rushforth,3 B. L. Gallagher,3 \nC. T. Foxon,3 T. Jungwirth,2, 3 J. Wunderlich,1, 2 S. S. Dhesi,4 S. Cavill,4 G. van der Laan,4 and E. Arenholz5 \n1Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom \n2Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic \n3School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom \n4Diamond Light Source, Harwell Science and Innovation Campus, \nDidcot, Oxfordshire, OX11 0DE, United Kingdom \n5Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA \n(Dated: August 24, 2018) \n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin \noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic \ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface \nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized \nat room temperature. \n\nwhich may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. \n\n] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "20 \n**(a)***n =*6 \n15 \n\n10 \n\n) \n. \ng \ne \nd \n( \n\n5 \n\n0 \n0 \n*l*\nϕ \n∆ 5 \n\n**(b)***n =*5 \n4 \n\n3 \n\n2 \n\n1 \n\n0 \n0 1 2 \n*l*\n\n140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. \n\nangle of the magnetization between nearest planes: \n\nl+1 + M y l M y \nM x \nl M x ∆ϕl = ϕl+1 − ϕl = arccos (10) \nl+1 \n(cid:2) (cid:3) \n\nFIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. \n\nAlthough the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). \n\nA possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain \n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally \n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding \n\nexcess thiol one can also vary the properties of the solvent [40]. \n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin- \n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the \n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds \n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo- \n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For \n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin- \n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing \n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by \n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced \n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the \n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find \n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched \n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a \n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the \n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold \n\ncores. For short chains (C5 and C8) no formation of branched structures is observed. At similar \n\nconcentrations, well-developed branched structures are formed for longer chains (C10 and C12). \n\nFor even longer chains (C14), however, one again finds less branching. It also depends on the \n\namount of excess thiol in the solvent (for details see Ref. [40]). \n\nWhen following the evolution of the branched patterns in situ (see the complementary video \n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght \n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. \n\nThe macroscopic front can be transversely unstable resulting in large-scale (> 100µm) strongly \n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc- \n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be- \n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 6: Profiles of the final dried-in nanoparticle layer for the dewetting of a suspension of nanoparticles \n\nin a volatile solvent that partially wets the substrate for (a) high (Ω = 10−3), (b) medium (Ω = 2 × 10−6) \n\nand (c) low (Ω = 0.78 × 10−8) evaporation rates, for the case when χ = H/l0 = 1.09, the lateral length \nscale is (cid:96) = (cid:112)γ/κH with κ = (Sp/l0) exp(d0/l0)H being an energy scale related to wettability and the \nvertical length scale is H = (cid:112)2SLW /κd0. The remaining dimensionless parameters are the evaporation \nnumber Ω = Qeη0(cid:96)2/H 3, the diffusion number Γ = D(0)η0/Hκ = 10−4 and the dimensionless chemical \n\npotential M = Hµ/κ = −0.0035. The system size is L = 19500(cid:96). Film thickness and hp in the plots are \n\ncircular throughout the dewetting and evaporation process. In this case one should interprete the \n\ncoordinate x as the distance from the centre of the circular film. \n\nWe start with a film of height h0 of finite length sitting on a precursor film and assume that the film \n\ncontains nanoparticles at constant concentration φ0. The chosen parameter values ensure that the \n\nfilm of thickness h0 is linearly stable. As we do not incorporate noise, no nucleation of additional \n\nholes can occur (even with noise the probability would be extremely low). Without evaporation the \n\nfilm dewets ‘classically’ by a retraction of the initially step-like front. After a short time, surface \n\ntension smoothes the profile of the receding front and a capillary rim forms that collects all the", + "page_start": 19, + "page_end": 19, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "What the rough sales amount of the nordstrom.com website ?", + "target_page": 3, + "target_passage": "$2 billion in nordstrom.com sales", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "Nordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter \nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise \nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack. \n\nGross Profit \nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased \nmarkdowns at Nordstrom Rack. \n\nRetail Selling, General, and Administrative Expenses \nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology \nand fulfillment expenses. \n\nCredit Expenses \nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by \nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also \nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses \nin the prior year. \n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated \nFinancial Statements in Item 8: Financial Statements and Supplementary Data. \n\n**2015 Outlook**\nOur expectations for 2015 are as follows: \n\n\n \n \n \n \n [html]\n
Net Sales7 percent to 9 percent increase
Comparable sales2 percent to 4 percent increase
Earnings per diluted share1$ 3.65 to $ 3.80
\n\n1 This outlook does not include the impact of any future share repurchases. \n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The \nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through \nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our \nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and \nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by \napproximately 6.1%.", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Information ( at year - end )Nordstrom full - line stores - U. S.116117117117115Nordstrom Rack and other stores †17614312310889Total square footage27.061.00026.017.00025.290.00024.745.000", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**COMPETITIVE CONDITIONS**\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry \nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific \ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer \nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience, \ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations. \n\n**INVENTORY**\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and \nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and \nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December). \nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of \nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying \nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business. \nWe pay for our merchandise purchases under the terms established with our vendors. \n\nIn order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and \nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We \nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters \nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com. \n\n**EMPLOYEES**\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, \nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. \nWe believe our relationship with our employees is good. \n\n**CAUTIONARY STATEMENT**\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private \nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the \nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new \nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current \nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ \nmaterially from historical results or current expectations depending upon factors including, but not limited to:", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "’10 ’11 ’12 ’13 ’14 \n\n**NET SALES PERCENTAGE INCREASE**\n’10 ’11 ’12 ’13 ’14 \n12.7 12.7 12.1 3.4 7.8 \n\n’10 ’11 ’12 ’13 ’14 \n\n**COMPARABLE SALES PERCENTAGE INCREASE**\n’10 ’11 ’12 ’13 ’14 \n8.1 7.2 7.3 2.5 4.0 \n\n4-Wall Sales Per Square Foot \nSales Per Square Foot \n\n**CASH FLOW** **RETURN ON ASSETS**\n**FROM OPERATIONS ($)** **AND RETURN ON INVESTED**\n**CAPITAL (ROIC) (%)** ***\n\n1,320 \n**1,220**\n1,177 1,177 \n1,110 \n13.9 \n13.6 13.6 \n13.3 \n**12.6**\n\n8.9 \n8.7 8.7 8.6 \n**8.1**\n\nDollars in millions except per share and per square foot amounts. \n\n*4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, \nour Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage. \n**Inventory Turn is calculated as annual cost of sales and related buying and occupancy costs (for all segments) divided by 4-quarter average inventory. Our inventory turnover rate \ndecreased in 2012, 2013 and 2014 primarily due to increasing our investment in pack and hold inventory beginning in 2012, which helped fuel the growth of Nordstrom Rack. \n***See Return on Invested Capital (ROIC) Non-GAAP financial measure on page 26 for additional information and reconciliation to the most directly comparable GAAP financial measure. \n\nnordstrom.com/companyreview", + "page_start": 94, + "page_end": 94, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
We have been most successful when we we we we were were were were were were were were than their their eves. In today ’ s rapidly changing retaildesire an experience that ' s both personalized and convenient, we continue to make investments that further integrate our
landscape, this approach has never been more important, so our strategy remains squarely focused on serving.store and online experience to enable our customers to shop seamlessly any way they choose.
\n\nA RECORD \n\n**$13.1**\n**billion**\n\n**IN TOTAL COMPANY SALES.**\nWITH SALES GROWTH OF 7.8% AND \nCOMPARABLE SALES INCREASE OF 4%, \nWE BEAT OUR OWN EXPECTATIONS. \n\n**4 million**\n\nNEARLY \n\n**NEW CUSTOMERS**SHOPPED AT \nNORDSTROM RACK—THAT’S MORE THAN \nAT ANY OTHER CHANNEL. \n\n**27**\n\n**NEW NORDSTROM RACK STORES.**\nPLUS, RACK SALES INCREASED 17% AND \nRACK COMPARABLE SALES GAINED 3.8%. \n\n\n\nMORE THAN \n\n**1 million**\n\n**STORE VISITS**FROM CUSTOMERS \nRETURNING THEIR HAUTELOOK AND \nNORDSTROMRACK.COM PURCHASES \nTO NORDSTROM RACK.", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. \n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label \ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in \nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster \ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition, \nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards. \n\n**Fiscal Year**\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31st. References to 2014 and all years within this \ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year. \n\n**Principles of Consolidation**\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and \nbalances are eliminated in consolidation. \n\n**Use of Estimates**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make \nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets \nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial \nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates \ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes. \n\n**Net Sales**\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from \nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized \nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales \nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. \n\nAs of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. \n\nOur**Credit**segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card, \ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits \nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also \ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment \nwould incur if our customers used third-party cards. \n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial \nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many employees did Nordstrom count in 2014 ?", + "target_page": 17, + "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**COMPETITIVE CONDITIONS**\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry \nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific \ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer \nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience, \ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations. \n\n**INVENTORY**\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and \nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and \nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December). \nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of \nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying \nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business. \nWe pay for our merchandise purchases under the terms established with our vendors. \n\nIn order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and \nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We \nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters \nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com. \n\n**EMPLOYEES**\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, \nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. \nWe believe our relationship with our employees is good. \n\n**CAUTIONARY STATEMENT**\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private \nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the \nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new \nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current \nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ \nmaterially from historical results or current expectations depending upon factors including, but not limited to:", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Robert B. Sari,**58 \nExecutive Vice President, \nGeneral Counsel and Secretary \n\n**Michael Sato,**48 \nExecutive Vice President, \nSupply Chain \n\n**Tricia D. Smith,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nDesigner, Women’s and Kids’ \nApparel \n\n**Geevy S. K. Thomas,**50 \nExecutive Vice President and \nPresident, Nordstrom Rack \n\n**Paige L. Thomas,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nNordstrom Rack \n\n**Mark J. Tritton,**51 \nExecutive Vice President and \nPresident, Nordstrom Product Group \n\n**David M. Witman,**56 \nExecutive Vice President and \nGeneral Merchandise Manager, \nMen’s Apparel \n\n**Kenneth J. Worzel,**50 \nExecutive Vice President, \nStrategy and Development \n\n**Executive Officers**\n\n**Teri Bariquit,**49 \nExecutive Vice President, \nNordstrom Merchandising Group \n\n**Kirk Beardsley,**46 \nExecutive Vice President, \nOnline Merchandising \n\n**Terence Boyle,**42 \nExecutive Vice President, \nNordstromrack.com|HauteLook \n\n**Brian K. Dennehy,**49 \nExecutive Vice President and \nChief Marketing Officer \n\n**James A. Howell,**49 \nExecutive Vice President, \nFinance and Treasurer \n\n**Michael G. Koppel,**58 \nExecutive Vice President and \nChief Financial Officer \n\n**Gemma Lionello,**49 \nExecutive Vice President and \nGeneral Merchandise Manager, \nCosmetics Division \n\n**Daniel F. Little,**53 \nExecutive Vice President and \nChief Information Officer \n\n**Lisa Luther,**46 \nExecutive Vice President of \nFinance and Operations, \nNordstrom.com \n\n**Steven C. Mattics,**46 \nExecutive Vice President; \nChairman and Chief Executive Officer of \nNordstrom fsb, \nPresident of Nordstrom Credit, Inc. \n\n**Scott A. Meden,**52 \nExecutive Vice President and \nGeneral Merchandise Manager, \nShoe Division \n\n**Robert J. Middlemas,**58 \nExecutive Vice President and \nRegional Manager, \nSouthern California \n\n**Margaret Myers,**68 \nExecutive Vice President and \nGeneral Merchandise Manager, \nAccessories and Women’s \nSpecialized Divisions \n\n**Blake W. Nordstrom,**54 \nPresident \n\n**Erik B. Nordstrom,**51 \nExecutive Vice President and \nPresident, Nordstrom.com \n\n**James F. Nordstrom, Jr.,**42 \nExecutive Vice President and \nPresident, Stores \n\n**Peter E. Nordstrom,**53 \nExecutive Vice President and \nPresident, Merchandising \n\n**Brian Saltzman,**47 \nExecutive Vice President, \nUser Experience and Optimization", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. \n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label \ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in \nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster \ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition, \nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards. \n\n**Fiscal Year**\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31st. References to 2014 and all years within this \ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year. \n\n**Principles of Consolidation**\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and \nbalances are eliminated in consolidation. \n\n**Use of Estimates**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make \nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets \nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial \nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates \ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes. \n\n**Net Sales**\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from \nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized \nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales \nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. \n\nAs of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. \n\nOur**Credit**segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card, \ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits \nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also \ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment \nwould incur if our customers used third-party cards. \n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial \nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Our online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. \n\nOur credit business, through our Nordstrom Rewards program, continues to play an important role in attracting new customers and \ndeepening our engagement with existing customers. The program contributes to our overall results, with members shopping more frequently \nand spending more on average than non-members. For the third consecutive year, we opened over one million new accounts. With over four \nmillion active members, 2014 sales from members represented approximately 40% of our sales. \n\nWe are confident in our ability to execute our customer strategy as we evolve with customers and continue to leverage capabilities across all \nchannels to serve customers on their terms. To enhance the customer experience, we continue to make investments in our stores in new \nmarkets such as Canada, Puerto Rico and Manhattan, in our ecommerce and fulfillment capabilities and in technology to support growth \nacross all channels. We believe these investments in our customer strategy will help us achieve long-term top-quartile shareholder returns \nthrough high single-digit total sales growth and mid-teens Return on Invested Capital.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Nordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter \nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise \nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack. \n\nGross Profit \nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased \nmarkdowns at Nordstrom Rack. \n\nRetail Selling, General, and Administrative Expenses \nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology \nand fulfillment expenses. \n\nCredit Expenses \nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by \nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also \nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses \nin the prior year. \n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated \nFinancial Statements in Item 8: Financial Statements and Supplementary Data. \n\n**2015 Outlook**\nOur expectations for 2015 are as follows: \n\n\n \n \n \n \n [html]\n
Net Sales7 percent to 9 percent increase
Comparable sales2 percent to 4 percent increase
Earnings per diluted share1$ 3.65 to $ 3.80
\n\n1 This outlook does not include the impact of any future share repurchases. \n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The \nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through \nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our \nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and \nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by \napproximately 6.1%.", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "To date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the \nopening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and \nWauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, \nNevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; \nSt. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, \nCalifornia; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount \nPleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New \nJersey). \n\nWe also own six merchandise distribution centers (Portland, Oregon; Dubuque, Iowa; Ontario, California; Newark, California; Upper \nMarlboro, Maryland; and Gainesville, Florida) and we own one fulfillment center on leased land (Cedar Rapids, Iowa), all of which are utilized \nby our Retail segment. Trunk Club and HauteLook, which are included in our Retail segment, lease three administrative offices (Chicago, \nIllinois; Los Angeles, California and New York City, New York) and one fulfillment center (San Bernardino, California). We plan to open a third, \nowned fulfillment center (Elizabethtown, Pennsylvania) in the second half of 2015. We lease office buildings in Centennial, Colorado and \nScottsdale, Arizona, both for use by our Credit segment. Our administrative offices in Seattle, Washington are a combination of leased and \nowned space. We also lease a data center in Centennial, Colorado.", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many stores did Nordstrom posses at the end of 2014 ?", + "target_page": 22, + "target_passage": "Number of stores, end of year : 292", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "To date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the \nopening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and \nWauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, \nNevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; \nSt. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, \nCalifornia; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount \nPleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New \nJersey). \n\nWe also own six merchandise distribution centers (Portland, Oregon; Dubuque, Iowa; Ontario, California; Newark, California; Upper \nMarlboro, Maryland; and Gainesville, Florida) and we own one fulfillment center on leased land (Cedar Rapids, Iowa), all of which are utilized \nby our Retail segment. Trunk Club and HauteLook, which are included in our Retail segment, lease three administrative offices (Chicago, \nIllinois; Los Angeles, California and New York City, New York) and one fulfillment center (San Bernardino, California). We plan to open a third, \nowned fulfillment center (Elizabethtown, Pennsylvania) in the second half of 2015. We lease office buildings in Centennial, Colorado and \nScottsdale, Arizona, both for use by our Credit segment. Our administrative offices in Seattle, Washington are a combination of leased and \nowned space. We also lease a data center in Centennial, Colorado.", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. \n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. \n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. \n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. \n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. \n\nAs of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. \n\nOur**Credit**segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card, \ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits \nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also \ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment \nwould incur if our customers used third-party cards. \n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial \nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. \n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label \ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in \nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster \ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition, \nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards. \n\n**Fiscal Year**\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31st. References to 2014 and all years within this \ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year. \n\n**Principles of Consolidation**\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and \nbalances are eliminated in consolidation. \n\n**Use of Estimates**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make \nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets \nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial \nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates \ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes. \n\n**Net Sales**\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from \nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized \nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales \nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Information ( at year - end )Nordstrom full - line stores - U. S.116117117117115Nordstrom Rack and other stores †17614312310889Total square footage27.061.00026.017.00025.290.00024.745.000", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**COMPETITIVE CONDITIONS**\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry \nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific \ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer \nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience, \ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations. \n\n**INVENTORY**\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and \nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and \nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December). \nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of \nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying \nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business. \nWe pay for our merchandise purchases under the terms established with our vendors. \n\nIn order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and \nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We \nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters \nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com. \n\n**EMPLOYEES**\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, \nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. \nWe believe our relationship with our employees is good. \n\n**CAUTIONARY STATEMENT**\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private \nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the \nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new \nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current \nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ \nmaterially from historical results or current expectations depending upon factors including, but not limited to:", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Robert B. Sari,**58 \nExecutive Vice President, \nGeneral Counsel and Secretary \n\n**Michael Sato,**48 \nExecutive Vice President, \nSupply Chain \n\n**Tricia D. Smith,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nDesigner, Women’s and Kids’ \nApparel \n\n**Geevy S. K. Thomas,**50 \nExecutive Vice President and \nPresident, Nordstrom Rack \n\n**Paige L. Thomas,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nNordstrom Rack \n\n**Mark J. Tritton,**51 \nExecutive Vice President and \nPresident, Nordstrom Product Group \n\n**David M. Witman,**56 \nExecutive Vice President and \nGeneral Merchandise Manager, \nMen’s Apparel \n\n**Kenneth J. Worzel,**50 \nExecutive Vice President, \nStrategy and Development \n\n**Executive Officers**\n\n**Teri Bariquit,**49 \nExecutive Vice President, \nNordstrom Merchandising Group \n\n**Kirk Beardsley,**46 \nExecutive Vice President, \nOnline Merchandising \n\n**Terence Boyle,**42 \nExecutive Vice President, \nNordstromrack.com|HauteLook \n\n**Brian K. Dennehy,**49 \nExecutive Vice President and \nChief Marketing Officer \n\n**James A. Howell,**49 \nExecutive Vice President, \nFinance and Treasurer \n\n**Michael G. Koppel,**58 \nExecutive Vice President and \nChief Financial Officer \n\n**Gemma Lionello,**49 \nExecutive Vice President and \nGeneral Merchandise Manager, \nCosmetics Division \n\n**Daniel F. Little,**53 \nExecutive Vice President and \nChief Information Officer \n\n**Lisa Luther,**46 \nExecutive Vice President of \nFinance and Operations, \nNordstrom.com \n\n**Steven C. Mattics,**46 \nExecutive Vice President; \nChairman and Chief Executive Officer of \nNordstrom fsb, \nPresident of Nordstrom Credit, Inc. \n\n**Scott A. Meden,**52 \nExecutive Vice President and \nGeneral Merchandise Manager, \nShoe Division \n\n**Robert J. Middlemas,**58 \nExecutive Vice President and \nRegional Manager, \nSouthern California \n\n**Margaret Myers,**68 \nExecutive Vice President and \nGeneral Merchandise Manager, \nAccessories and Women’s \nSpecialized Divisions \n\n**Blake W. Nordstrom,**54 \nPresident \n\n**Erik B. Nordstrom,**51 \nExecutive Vice President and \nPresident, Nordstrom.com \n\n**James F. Nordstrom, Jr.,**42 \nExecutive Vice President and \nPresident, Stores \n\n**Peter E. Nordstrom,**53 \nExecutive Vice President and \nPresident, Merchandising \n\n**Brian Saltzman,**47 \nExecutive Vice President, \nUser Experience and Optimization", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Our online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. \n\nOur credit business, through our Nordstrom Rewards program, continues to play an important role in attracting new customers and \ndeepening our engagement with existing customers. The program contributes to our overall results, with members shopping more frequently \nand spending more on average than non-members. For the third consecutive year, we opened over one million new accounts. With over four \nmillion active members, 2014 sales from members represented approximately 40% of our sales. \n\nWe are confident in our ability to execute our customer strategy as we evolve with customers and continue to leverage capabilities across all \nchannels to serve customers on their terms. To enhance the customer experience, we continue to make investments in our stores in new \nmarkets such as Canada, Puerto Rico and Manhattan, in our ecommerce and fulfillment capabilities and in technology to support growth \nacross all channels. We believe these investments in our customer strategy will help us achieve long-term top-quartile shareholder returns \nthrough high single-digit total sales growth and mid-teens Return on Invested Capital.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. \n\nNordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What type of nanostructured material works notably well to build gas nanosensors ?", + "target_page": 1, + "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "To estimate the effect of adsorbates on the electrical con- \nductance of doped CNTs, we first consider the change in con- \nductance when a single molecule is adsorbed on a metal site of \nan otherwise pristine CNT. In Fig. 2(b) we show the calculated \nchange in conductance relative to the metal site with no ad- \nsorbate. In contrast to the binding energies, there are no clear \ntrends in the conductances. The sensitivity of the conductance \nis perhaps most clearly demonstrated by the absence of cor- \nrelation between different types of vacancies, i.e. between the \nthree panels in Fig. 2(b). Close to the Fermi level, the conduc- \ntance of a perfect armchair CNT equals 2G0. The presence \nof the metal dopant leads to several dips in the transmission \nfunction known as Fano antiresonances [20]. The position \nand shape of these dips depend on the d-levels of the transi- \ntion metal atom, the character of its bonding to the CNT, and \nis further affected by the presence of the adsorbate molecule. \nThe coupling of all these factors is very complex and makes \nit difficult to estimate or rationalize the value of the conduc- \ntance. For the spin polarized cases, we use the spin-averaged \n\nWe now return to the discussion of the validity of Eq. (7). \nAs mentioned, the series coupling of individual scatterers \nshould be valid when lφ < d. However, even for lφ > d \nand assuming that the Anderson localization length, lloc in \nthe system exceeds lφ, Eq. (7) remains valid if one replaces \nthe actual resistance R by the sample averaged resistance (cid:104)R(cid:105) \n[29]. At room temperature under ambient conditions, interac- \ntions with external degrees of freedom such as internal CNT \nphonons and vibrational modes of the adsorbed molecules \nwould rapidly randomize the phase of the electrons. There- \nfore Eq. (7) should certainly be valid in the limit of low dop- \ning concentrations. On the other hand, the total number of \ndopants, N , should be large enough for the statistical treat- \nment of the coverage to hold. Finally, we stress that Eq. (7) \nrepresents a conservative estimate of the change in resistance. \nIn fact, in the regime where lφ > lloc, i.e. in the Anderson \nlocalization regime, the resistance would be highly sensitive \nto changes in the fractional coverage of active sites. Calcula- \ntion of the actual resistance of the CNT in this regime would, \nhowever, involve a full transport calculation in the presence of \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. 89, \n\n248303 (2002). \n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of \n\nnanoparticles,” Nature 426, 271–274 (2003). \n\n\n \n \n \n \n [html]\n
1.95 ( 1.1, 950 ), 1.950.1, 950.1, 950.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.10.11.10.11.10.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.11.110[ 37 ] C : P. Martin, M. O. Blunt, and P. Moriary, ‘ Nanoparticle networks on silicox : Self - organized or disorganized ’? ‘ Nan - Lett. 4.2389 – 2392 ( 2084 ).
[ 38 ] C : P : Maritin, M. O. Bluer, E. Paulus : Vasjour, A. Stamard, P. Moriary, L. Vancra, and U. Thirefer, Controlling patern formation in nanoparticle assembles via directed solvent developing ;” Phys, Rev, Lent 99.18101 ( 2807 ).[ 39 ] A. Stannard, C. P. Marini, E. Panliao Vasjour, F. Moriary, and U. Thele, Thual - scale pattern formation in nanoparticle assemblies, 1. Chem. Phys, C 141.15195 - 15203 - 2D08 ).
[ 40 ] E. Paniliae Vasijour, A. Stamard, C. P. Maritin, M. O. Blunt, L. Notingber, P. J. Moriary, I. Vancea, and U. Thiele, “ Fingering instabilities in dewerting nanofluids,” Phys. Rev. Lett. M80.176102 ( 2008 ).[ 41 ] 1. Vancea, U. Thele, E. Pauliac - Vasjour, A. Stannard, C. P. Marin. M. O. Blunt, and P. I Moriary, “ Fromt instabilities in evaperatively deverting nanofluids.” Phys. Rev. E. TR ( 001601 ( 2006 ).
[ 42 ] U. Thirde, Entoryzang son Gollageoglimer, Ph. D. thesis, Technische Universitial Dresden ( 1998 ), [ 43 ] H. Yabs and M. Shimomura, “ Preparation of self - organized mesocale polymer patterns on a sosubstrate : Continuous pattern formation from a receding meniscos.” Adv. Funct. Mater. IE 5.575 – 581 c2885.
[ 44 ] R D. Deepara O. Bakajin, T. F. Dapont. G. Huber, S. R. Nugel, and T. A. Witten, “ Capillary flow as the cause of ring stains from dried liquid drops,” Nature 309.827 – 829 ( 1997 ).[ 45 ] E. Adacki, A. S. Dimittov, and K. Nagayama, “ Sittipe patterns formed on a glusosurface during droplet exaporation,” Langmuir II, 1057 – 1060 ( 1995 ).
[ 46 ] R. D. Deegan, “ Pattern formation in drying drops.” Phys. Rev. E. 61.475 – 485 ( 2000 ).[ 47 ] R. D. Deegan. O. Bukajin, T. F. Depont. G. Hober, S. R. Negel, and T. A. Witen. “ Contact line deposits in an evaporating drop.” Phys. Rev. E. 62.756 – 785 ( 200 ).
[ 40 ] L. Shmuylovich, A. Q. Shen, and H. A. Stone, “ Surface morphology of drying lates thins : Multiple ring formation ;” Langmuir IR, 3441 – 3445 ( 2002 ).[ 49 ] V, X. Ngayen and K. J. Sktbe,? Patterning of small particles by a surfactate exhanced Marangonia -
", + "page_start": 27, + "page_end": 27, + "source_file": "1001.2669.pdf" + }, + { + "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain \n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally \n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding \n\nexcess thiol one can also vary the properties of the solvent [40]. \n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin- \n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the \n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds \n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo- \n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For \n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin- \n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing \n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by \n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced \n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the \n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find \n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched \n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a \n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the \n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold \n\ncores. For short chains (C5 and C8) no formation of branched structures is observed. At similar \n\nconcentrations, well-developed branched structures are formed for longer chains (C10 and C12). \n\nFor even longer chains (C14), however, one again finds less branching. It also depends on the \n\namount of excess thiol in the solvent (for details see Ref. [40]). \n\nWhen following the evolution of the branched patterns in situ (see the complementary video \n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght \n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. \n\nThe macroscopic front can be transversely unstable resulting in large-scale (> 100µm) strongly \n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc- \n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be- \n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", + "target_page": 4, + "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. \n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. \n\nIn summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. \n\nThe authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. \n\n∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang,", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. \n\nEform[VC] = E[VC] + nE[C] − E[NT], (2) \n\nwhere E[VC] is the total energy of the nanotube with a va- \ncancy of n atoms. \n\nis the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. \n\nThe calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. \n\nIn thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "All total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) \n\nwhere E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT]", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "3 \n\nconductances, i.e. G = (G↑ + G↓)/2. \n\nNext, we estimate the resistance of a CNT containing sev- \neral impurities (a specific metal dopant with different molecu- \nlar adsorbates). Under the assumption that the electron phase- \ncoherence length, lφ, is smaller than the average distance be- \ntween the dopants, d, we may neglect quantum interference \nand obtain the total resistance by adding the scattering resis- \ntances due to each impurity separately. The scattering resis- \ntance due to a single impurity is given by \n\nRs(X) = 1/G(X) − 1/(2G0), (6) \n\nwhere G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. \n\nFor a given background composition we may thus estimate \nthe fractional coverages for each available adsorbate for a \ngiven type of doping. As an example, Fig. 3(a)-(c) shows the \nfractional coverage of a Ni atom occupying a monovacancy, \ndivacancy I, and divacancy II, versus CO concentration in a \nbackground of air at room temperature and 1 bar of pressure. \nDue to the relatively small binding energy of N2 and H2O as \ncompared to O2 and CO, all Ni sites will be either empty or \noccupied by O2 or CO. In particular, Ni in a monovacancy \n(top panel of Fig. 3) will be completely oxidized for all rel- \nevant CO concentrations. For the Ni occupied divacancy II \nstructures we find the coverage of CO changes significantly \naround toxic concentrations (∼10 ppm). \nIn Fig. 3(d) we show the change in resistance calculated \nfrom Eq. (7) as a function of CO concentration for Ni occu- \npying the three types of vacancies. The background reference \nconcentration of CO is taken to be C0 = 0.1 ppm. For the \nmonovacancy there is very little change in resistivity. This is \nbecause most active sites are blocked by O2 at relevant CO \nconcentrations, as shown in the upper panel of Fig. 3. For Ni \nin the divacancies there is, however, a change in resistance on \nthe order of 1Ω per site. For concentrations above ∼1 ppm, \nthe CO coverage of Ni in the divacancy II increases dramati- \ncally and this leads to a significant increase in resistance.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "To estimate the effect of adsorbates on the electrical con- \nductance of doped CNTs, we first consider the change in con- \nductance when a single molecule is adsorbed on a metal site of \nan otherwise pristine CNT. In Fig. 2(b) we show the calculated \nchange in conductance relative to the metal site with no ad- \nsorbate. In contrast to the binding energies, there are no clear \ntrends in the conductances. The sensitivity of the conductance \nis perhaps most clearly demonstrated by the absence of cor- \nrelation between different types of vacancies, i.e. between the \nthree panels in Fig. 2(b). Close to the Fermi level, the conduc- \ntance of a perfect armchair CNT equals 2G0. The presence \nof the metal dopant leads to several dips in the transmission \nfunction known as Fano antiresonances [20]. The position \nand shape of these dips depend on the d-levels of the transi- \ntion metal atom, the character of its bonding to the CNT, and \nis further affected by the presence of the adsorbate molecule. \nThe coupling of all these factors is very complex and makes \nit difficult to estimate or rationalize the value of the conduc- \ntance. For the spin polarized cases, we use the spin-averaged \n\nWe now return to the discussion of the validity of Eq. (7). \nAs mentioned, the series coupling of individual scatterers \nshould be valid when lφ < d. However, even for lφ > d \nand assuming that the Anderson localization length, lloc in \nthe system exceeds lφ, Eq. (7) remains valid if one replaces \nthe actual resistance R by the sample averaged resistance (cid:104)R(cid:105) \n[29]. At room temperature under ambient conditions, interac- \ntions with external degrees of freedom such as internal CNT \nphonons and vibrational modes of the adsorbed molecules \nwould rapidly randomize the phase of the electrons. There- \nfore Eq. (7) should certainly be valid in the limit of low dop- \ning concentrations. On the other hand, the total number of \ndopants, N , should be large enough for the statistical treat- \nment of the coverage to hold. Finally, we stress that Eq. (7) \nrepresents a conservative estimate of the change in resistance. \nIn fact, in the regime where lφ > lloc, i.e. in the Anderson \nlocalization regime, the resistance would be highly sensitive \nto changes in the fractional coverage of active sites. Calcula- \ntion of the actual resistance of the CNT in this regime would, \nhowever, involve a full transport calculation in the presence of \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. \n\n\n \n \n \n \n [html]\n
Cancertectors ofCases
both for i [ 9 ]____________Patients
CasesPTistin errorStates
Post - rate (%)Controlits, electri
Tabletive for sthe
tionalizatPatientssidewall 1
________________________________________________________________________________________________________________________________________________________________________________________________________hP_115Pd_1Patients
the selectCancer1.10 ( 0.01 )
\n\nchange in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain \n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally \n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding \n\nexcess thiol one can also vary the properties of the solvent [40]. \n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin- \n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the \n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds \n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo- \n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For \n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin- \n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing \n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by \n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced \n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the \n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find \n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched \n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a \n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the \n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold \n\ncores. For short chains (C5 and C8) no formation of branched structures is observed. At similar \n\nconcentrations, well-developed branched structures are formed for longer chains (C10 and C12). \n\nFor even longer chains (C14), however, one again finds less branching. It also depends on the \n\namount of excess thiol in the solvent (for details see Ref. [40]). \n\nWhen following the evolution of the branched patterns in situ (see the complementary video \n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght \n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. \n\nThe macroscopic front can be transversely unstable resulting in large-scale (> 100µm) strongly \n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc- \n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be- \n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 2: Typical KMC results for the final dried-in nanoparticle structures resulting from the evaporative \n\ndewetting processes of nanoparticle solutions (nanofluids) in the case of (a) a spinodal-like process at µ = \n\n−2.55, (b) nucleation and growth of holes at µ = −2.3, (c) unstable fronts at µ = −2.3 and low mobility \n\nM = 5, and (d) unstable fronts at µ = −2.3 and medium mobility M = 10. The starting configuration in \n\n(a) and (b) is a homogeneous liquid film with uniformly distributed particles whereas in (c) and (d) a hole \n\nat the center is nucleated ‘by hand’. The remaining parameters are (a,b) M = 50, (cid:15)nl = 2.0, (cid:15)nn = 1.5, \n\nn = 0.2, kT = 0.3, MC steps= 500, domain size 1200 × 1200; (c,d) εnn = 2.0, (cid:15)nl = 1.5, ρav \nρav n = 0.2, \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 10, + "page_end": 10, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How many employees did HON Industries count in 2003 ?", + "target_page": 15, + "target_passage": "Members (employees) at year-end : 8,926", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the \n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. \n\n\nStan A. Askren \n\n\nAbbie J. Smith \n\n\nDennis J. Martin \n\n\nGary M. Christensen \n\n Richard H. Stanley \n\n\nJack D. Michaels \n\n\nCheryl A. Francis \n\n\nBrian E. Stern \n\n\nJoseph Scalzo \n\n\n\n\n\nRobert L. Katz", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a \n\nreasonable basis for our opinion. The financial statements of the Company as of December 29, 2001, and for the fiscal year then ended, prior to the \n\nadjustments discussed in the Goodwill and Other Intangible Assets note, were audited by other independent accountants who have ceased opera- \n\ntions. Those independent accountants expressed an unqualified opinion on those financial statements in their report dated February 1, 2002. \n\nAs disclosed in the Goodwill and Other Intangible Assets note, the Company changed the manner in which it accounts for goodwill and \n\nother intangible assets upon adoption of the accounting guidance of Statement of Financial Accounting Standards No. 142, Goodwill and Other \n\nIntangible Assets, on December 30, 2001. \n\nAs discussed above, the financial statements of HON INDUSTRIES Inc., as of December 29, 2001, and for the period then ended, were \n\naudited by other independent accountants who have ceased operations. As described in the Goodwill and Other Intangible Assets note, these \n\nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial Accounting Standards (Statement) \n\nNo. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of December 30, 2001. We audited the transitional disclo- \n\nsures described in the Goodwill and Other Intangible Assets note. In our opinion, the transitional disclosures for 2001 in the Goodwill and Other \n\nIntangible Assets note are appropriate. However, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements \n\nof the Company other than with respect to such disclosures, and, accordingly, we do not express an opinion or any other form of assurance on the \n\n2001 financial statements taken as a whole.", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. \n\n**W E W I L L P U R S U E P R O F I T A B L E G R O W T H .**\n\nWe pursue profitable growth on a global basis in order to provide continued job opportunities for members and finan- \n\ncial success for all stakeholders. \n\n**W E W I L L B E A S U P P L I E R O F Q U A L I T Y P R O D U C T S A N D S E R V I C E S .**\n\nWe provide reliable products and services of high quality and brand value to our end-users. Our products and services \n\nexceed our customers’ expectations and enable our distributors and our company to make a fair profit. \n\n**W E W I L L B E A G R E A T P L A C E T O W O R K .**\n\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active \n\ninvolvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that \n\nattracts and retains the most capable people who work safely, are motivated, and are devoted to making our company \n\nand our members successful. \n\n**W E W I L L B E A R E S P O N S I B L E C O R P O R A T E C I T I Z E N .**\n\nWe conduct our business in a way that sustains the well-being of society, our environment, and the economy in which \n\nwe live and work. We follow ethical and legal business practices. Our company supports our volunteer efforts and \n\nprovides charitable contributions so that we can actively participate in the civic, cultural, educational, environmental, \n\nand governmental affairs of our society. \n\n**T O O U R S T A K E H O L D E R S :**\n\nWhen our company is appreciated by its*members,*favored by its*customers,*supported by its*suppliers,*respected by \n\n*the public,*and admired by its*shareholders,*this Vision is fulfilled. \n\n**H O N I N D U S T R I E S I n c . ( H N I )**\n\n**414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071**\n\n**www.honi.com**", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing \n\n\n\nment process and allows us to embrace change. As we continue on our heritage while remaining true to our culture and values. \n\nto add and develop talent to support our growth strategies, we The new name will serve to better align the corporate identity \n\nbecome more diverse in our perspectives, strengthening our with the direction of the company, as a strategic manager of \n\nability to understand and meet the needs of our customers and multiple, distinct, and independent brands. \n\nend-users. We thank our member-owners for their continued \n\ndedication, and look forward to the challenges and opportuni- \n\nOn January 5, 2004, we completed the acquisition of ties of 2004. \n\nPaoli Inc., a leading provider of wood case goods and seating. \n\nThe acquisition reflects our commitment to achieving profit- \n\nable growth. With annual sales in excess of $80 million, Paoli \n\nhas well-known brands, a broad product offering, and strong \n\nJack D. Michaels independent representative sales and dealer networks. This \n\nacquisition supports our operating philosophy to work through C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\n\n\nautonomous, decentralized businesses with strong brands \n\nfocused on distinct markets. \n\nImportant to our company’s success, is a strong Board \n\nof Directors who bring their individual skills, knowledge, and \n\nStan A. Askren experience to our company. Their involvement, independence, \n\nand integrity provide the ongoing foundation for effective gov- P R E S I D E N T \n\nernance and corporate oversight for you, our shareholders. \n\nThis year we recognize retiring directors Lorne R. \n\nWaxlax, Robert W. Cox, and M. Farooq Kathwari. We thank \n\nthem for their dedication. We are also pleased to welcome \n\nJoseph Scalzo, President, Personal Care Products, The Gillette \n\nCompany, to our board. \n\nOur CEO succession process is progressing smoothly. \n\nThe appointment of Stan Askren as President of HON \n\nINDUSTRIES and as a member of the Board of Directors,", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "L E F T : St an A . A skren, P R E S I D E N T \n\nR I G H T : Jack D. Michaels, C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\nAs we celebrate our 60th year, HON INDUSTRIES has seen leaner, more focused, and have more clearly defined brands \n\nmuch change. The industry has changed. The world has than ever before. Our challenge is to grow, aggressively and \n\nchanged. Our business has changed. What has not changed profitably, through market-driven solutions while maintain- \n\nare the culture and values on which we were founded: integ- ing focus on what we do best — operational excellence. Our \n\n\n \n \n \n \n [html]\n
Sigue and powerfulBUILDING BRA
Sort - every memberWe are investing significantly in our brands and increasing our
Accuracy testing the businessunderstanding of our diverse range of end - users aind the solutions pheughous ways bond - toose thoughout
Pregnancy of complex andinitiatives : focused selling models ; clear brand identity ; tar -
Strong brands,geted advertising ; expanded channel presence ; and aggressive
Per value to our end -products and solutions development. We are strengthening our
Proposed margins, a directability to be the “ perfect match ” with end - users in every seg -
Controlled processedment we serve.
ComponentsDemonstrated
MaximumACH1EV1NG BES1 TOTAL UUS1 AND
Components of completesLEAN ENTERPRIS
Proportion of phi -“ Best total cost ” means more than being a low - cost manufae -
us to continue toturer. It requires us to think about the entire value stream —
Age to succeed in awhere and how to manufacture, ship, install, outsource,
Continuous trans -assemble, service, procure, and sell – all to provide the best
Total, Total, Absencetotal value to our end - users. We implemented lean initiatives,
", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**ITEM 1. BUSINESS**\n\n**Company Overview**\n\nWe are a leading provider of services in the domestic non-hazardous solid waste industry. We provide \nnon-hazardous solid waste collection services for commercial, industrial, municipal and residential customers \nthrough 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid waste \nlandÑlls and 35 recycling facilities. \n\nAs of December 31, 2004, our operations were organized into Ñve regions whose boundaries may change \nfrom time to time: Eastern, Central, Southern, Southwestern and Western. Each region is organized into \nseveral operating areas and each area contains a group of operating locations. Each of our regions and \nsubstantially all our areas provide collection, transfer, recycling and disposal services. We believe that this \norganizational structure facilitates the integration of our operations within each region, which is a critical \ncomponent of our operating strategy. See Note 10 of the Notes to Consolidated Financial Statements for \nfurther discussion of operating segments. \n\nWe had revenue of $2,708.1 million and $2,517.8 million and operating income of $452.3 million and \n$412.7 million for the years ended December 31, 2004 and 2003, respectively. The $190.3 million, or 7.6%, \nincrease in revenue from 2003 to 2004 is primarily attributable to the successful execution of our operating and \ngrowth strategies described below. The $39.6 million, or 9.6%, increase in operating income from 2003 to 2004 \nis partially due to higher self-insurance expense during 2003 related to existing claims and was attributable to \nthe expansion of our operations and various changes in estimates as a result of continued negative trends \nthrough the 2003 policy year. The remaining increase in operating income is due to the successful execution of \nour operating and growth strategies described below. \n\nOur presence in high growth markets throughout the Sunbelt, including California, Florida, Georgia, \nNevada, North Carolina, South Carolina and Texas, and in other domestic markets that have experienced \nhigher than average population growth during the past several years, supports our internal growth strategy. We \nbelieve that our presence in these markets positions our company to experience growth at rates that are \ngenerally higher than the industry's overall growth rate. \n\nWe continue to focus on enhancing stockholder value by implementing our Ñnancial, operating and \ngrowth strategies as described below. \n\n**Industry Overview**\n\nBased on analysts' reports and industry trade publications, we believe that the United States non- \nhazardous solid waste services industry generates annual revenue of approximately $44.0 billion, of which \napproximately 50% is generated by publicly-owned waste companies, 21% is generated by privately-held waste \ncompanies, and 29% is generated by municipal and other local governmental authorities. Three companies \ngenerate the substantial majority of the publicly-owned companies' total revenue. However, according to \nindustry data, the domestic non-hazardous waste industry remains highly fragmented as privately-held \ncompanies and municipal and other local governmental authorities generate approximately 50% of total \nindustry revenue. In general, growth in the solid waste industry is linked to growth in the overall economy, \nincluding the level of new household and business formation. \n\nThe solid waste industry experienced a period of rapid consolidation in the late 1990's. During that time \nwe were able to grow signiÑcantly through acquisitions. However, acquisitions in the industry have slowed \nconsiderably since late 1999. Despite this, we believe that the opportunity to grow through acquisitions still \nexists, albeit at a slower pace than experienced in previous years, as a result of the following factors:", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "The truth is, The HON Company, “practical \n\nand professional” is only one part of who you \n\nare. When it comes to partnering with small to \n\nmid-sized businesses as we are, you are the \n\nchampion of the hardworking office: sensible, \n\nhonest, and unpretentious, yet strong, well \n\nbuilt, and totally committed to quality. You \n\nhelp us to be more productive by keeping us \n\ncomfortable and relieving our stress. Your \n\nfiles, desks, panel systems, and other products \n\nare as contemporary, intelligent, and adapt- \n\nable as we are! So call us*both*practical and \n\nprofessional; call us a perfect match. \n\n\n\nP E R F E C T M A T C H # 3 \n\n\n\n T H E S M A L L T O \n\nM I D - S I Z E D B U S I N E S S \n\nA N D T H E H O N C O M P A N Y", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
\n\n**F O R W A R D - L O O K I N G S T A T E M E N T S**\n\nStatements in this report that are not strictly historical, including statements as to **•**changes in demand and order patterns from the Company’s customers, par- \n\nplans, objectives, and future financial performance, are “forward-looking” state- ticularly its top ten customers, which represented approximately 36% of net sales \n\nments that are made pursuant to the safe harbor provisions of the Private Securities in 2003; \n\nLitigation Reform Act of 1995. Forward-looking statements involve known and **•** issues associated with acquisitions and integration of acquisitions; \n\nunknown risks, which may cause the Company’s actual results in the future to dif- **•**the ability of the Company to realize cost savings and productivity improve- \n\nfer materially from expected results. These risks include, among others: ments from its cost containment and business simplification initiatives; \n\n**•**competition within the office furniture and fireplace industries, including **•**the ability of the Company to realize financial benefits from investments in new \n\ncompetition from imported products and competitive pricing; products; \n\n**•** increases in the cost of raw materials, including steel, which is the Company’s **•**the ability of the Company’s distributors and dealers to successfully market \n\nK \nR \nO \nY \n\nW \nE \nN \n,", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "1,981,104 \n4,537,787 \n4,196,667 81,794 \n3,808,250 \n3,392,676 51,109 \n1,305,116 \n1,249,110 7,622 \n1,046,753 \n996,529 2,121,629 ¥(2,121,629) \n(2,121,629) \n(2,119,865) \n\n10,697,906 \n9,834,982 \n862,924 56,006 ¥ 50,224 ¥ \n\nGeographical areas \n\nThe geographical segment information for the Company and its consolidated subsidiaries for the years ended March 31, 2005, 2004 and 2003 \nis as follows: \nFiscal year 2004*(For the year ended Mar. 31, 2005)*\n\nOther foreign \ncountries \n*Millions of yen*\nJapan North America Europe \n\nSales to third parties .......................................... ¥2,556,683 ¥3,726,456 ¥1,254,007 ¥1,039,131 ¥ 8,576,277 ¥ \n— ¥8,576,277 \nInter-area sales and transfers .................... \n— \nTotal sales................................................................... \n8,576,277 \nOperating expenses ........................................... \n7,715,117 \nOperating income................................................. ¥ 341,120 ¥ 415,574 ¥ \n¥(1,764) ¥ 861,160 \nTotal assets ............................................................... ¥5,590,397 ¥4,714,272 ¥ 799,778 ¥ 637,065 ¥11,741,512 ¥(1,892,989) ¥9,848,523 \n\n*Thousands of U.S. dollars*\n\n$9,711,503 $ 80,152,121 $ \n\n18,514,991 \n42,409,225 \n39,221,187 764,430 \n35,591,122 \n31,707,252 71,234 \n9,782,737 \n9,313,355 19,828,309 \n99,980,430 \n91,915,719 (19,828,309) \n(19,828,309) \n(19,811,822) \n\n\n \n \n \n \n [html]Fiscal year 2003 ( For the year ended Mer. 31.2004 )Eliminations\n
JapanNorth AmericaEuropeOther foreign countriesTotalConsolidated
Millions of yen
Sales to third parties --------------------------------------------¥ 2.559.806¥ 3.278.966¥ 1.164.032¥ 426.415¥ 7.429.219¥¥ 7.429.219
Inter - area sales and transfers -------------------------------------1.725.49135.38431.6904.6631.797.228( 1.797.228 )Tofal sales ------------------------------------------
4.285.2973.314.3501.195.722431.0789.226.447( 1.797.228 )7.429.219Operating expenses →— ‐– ‐– ‐–––––––––––––3.932.835
2.914.5291.146.549412.9388.406.851( 1.802.487 )6.604.364Operating income --------------------------------------------------------¥ 352.462Y
399.821¥ __49.173¥_18.140¥_819.596Y5.259¥ 824.855Tofal assets -----------------------------------------------¥ 4.805.718
¥fi64.382¥ 607.926¥ 219.109¥ 9.297.135¥( 1.437.279 )¥ 7.859.856
\n\na) As described in Note 2(b), effective April 1, 2003, Nissan Motor Manufacturing (UK) Ltd., a consolidated subsidiary, implemented early \nadoption of a new accounting standard for retirement benefits in the United Kingdom. The effect of this change was to decrease operating \nincome in the “Europe” segment by ¥1,686 million for the year ended March 31, 2004 as compared with the corresponding amount which \nwould have been recorded if the previous method had been followed.", + "page_start": 102, + "page_end": 102, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", + "target_page": 8, + "target_passage": "none of the incorrect output text elements reached life-threatening risk", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. \n\n**Models**\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred \nto as LLM 1)43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter \nreferred to as LLM 2) 7B44 for abstractive summarization. Further information about the models and \ntechnology specifications is provided in detail in eAppendix 1 in Supplement 1. \n\n**Data Processing**\nAs LLM 2 only has a context size of 4096 tokens,44 we used 2 steps to process the EM notes to both \nshorten the input size while maintaining content salience. First, we adopted a number of heuristic \n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) \n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1–based saliency \n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP \n\nhandoff notes. \n\n**Model Training and Inference**\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We \n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional \n\ninformation about the model training and inference process is provided in eAppendix 1 in \n\nSupplement 1. \n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of \n\nheuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "We evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] \nand GPT-4o [2], denoted as “ours-1”, “ours-2”, “Gemini”, and “GPT”. \n\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference \nbetween attacking LLMs and attacking LLM routers. \n\nD Perplexity issues \n\nIn Section 5 we present perplexity as one of the metrics we use for evaluating the effect of our attack over the quality of \nthe generated response. However, perplexity is intended to measure the naturalness of text, and as such it is ill-suited for \ncomparing the quality of multiple natural texts. This results with the perplexity values of the responses of both the weak \nand the strong model being close and withing the margin of error. Figure 7 shows the distribution of perplexity values of \nthe clean responses generated by both models, and the ROCAUC score computed on these two sets of values. As can be \nseen, the perplexity values are quite similar between both models, with ROCAUC scores ranging between 0.38 to 0.47. \n\n24", + "page_start": 23, + "page_end": 23, + "source_file": "arxiv1.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsuperior performance. However, while the manual clinical evaluation demonstrated the majority of \n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on \n\naverage, inferior to the clinician-written notes. \n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and \n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst- \n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician \n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance \nand expertise.49 As such, none of the incorrect output text elements reached life-threatening risk. \nHowever, incompleteness and faulty logic identified in the automated summaries were not always \n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to \n\ncreate significant patient safety risk compared with the physician-written summaries. These critical \n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further \n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model \n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM \n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see \n\neAppendix 1 in Supplement 1). This physician-in-the-loop process has also been identified as critical \nin other recent work implementing LLMs into clinical workflows.29,53 \n\nWhile the automated methods of SCALE and MPNet-based sentence transformers \n\ndemonstrated a cursory view of the faithfulness performance of the models, the clinical evaluation \n\nprovided the nuanced context of the true factuality of our system on a word by word level. When \n\ncomparing with the source notes, the automatic evaluations rewarded the summaries with more \n\ndetails, more semantic similarities, and more entailment logics, while physician-written notes tended \n\nto be more concise with more shortcuts and clinical jargon, which are penalized by automatic \n\nevaluation metrics. In addition, LLM-generated summaries are completely based on the source \n\nnotes, while physician-written summaries are often composed with additional knowledge that \n\ncannot be found from the source notes. \n\nThe divergence of the automated and clinical evaluation results of an LLM intended for \n\nintegration into a critical clinical workflow is an important finding. First, this observed finding \n\nvalidates the importance of clinical evaluations in addition to conventional automated evaluations to \ndetermine accuracy.54 While other LLM clinical evaluation frameworks have been described to \nmeasure conventional model output quality categories (such as incorrectness domains and other \nperformance gaps),30,35 to our knowledge, our novel framework is the first to incorporate \nanticipated patient safety implications for each individual category deficiency. \n\n**Limitations**\nThere were several limitations to the study that were primarily driven from constraints of \n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location, \n\nthe data were required to remain on premise at all times and the infrastructure that was provided \n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model \n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable \ndifference between our fine-tuned LLM 2 model and third party LLMs32,55 because of the study \nlocation’s restrictions and concerns with the data retention policies. Nevertheless, our study \n\ndemonstrates the potential capability of integrating state-of-the-art open source LLMs at \n\norganizations that are less open to integrating third-party LLMs.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", + "target_page": 1, + "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. \n\n**Models**\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred \nto as LLM 1)43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter \nreferred to as LLM 2) 7B44 for abstractive summarization. Further information about the models and \ntechnology specifications is provided in detail in eAppendix 1 in Supplement 1. \n\n**Data Processing**\nAs LLM 2 only has a context size of 4096 tokens,44 we used 2 steps to process the EM notes to both \nshorten the input size while maintaining content salience. First, we adopted a number of heuristic \n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) \n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1–based saliency \n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP \n\nhandoff notes. \n\n**Model Training and Inference**\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We \n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional \n\ninformation about the model training and inference process is provided in eAppendix 1 in \n\nSupplement 1. \n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of \n\nheuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "We evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] \nand GPT-4o [2], denoted as “ours-1”, “ours-2”, “Gemini”, and “GPT”. \n\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference \nbetween attacking LLMs and attacking LLM routers. \n\nD Perplexity issues \n\nIn Section 5 we present perplexity as one of the metrics we use for evaluating the effect of our attack over the quality of \nthe generated response. However, perplexity is intended to measure the naturalness of text, and as such it is ill-suited for \ncomparing the quality of multiple natural texts. This results with the perplexity values of the responses of both the weak \nand the strong model being close and withing the margin of error. Figure 7 shows the distribution of perplexity values of \nthe clean responses generated by both models, and the ROCAUC score computed on these two sets of values. As can be \nseen, the perplexity values are quite similar between both models, with ROCAUC scores ranging between 0.38 to 0.47. \n\n24", + "page_start": 23, + "page_end": 23, + "source_file": "arxiv1.pdf" + }, + { + "text": "[71] L. Zheng, W.-L. Chiang, Y. Sheng, S. Zhuang, Z. Wu, Y. Zhuang, Z. Lin, Z. Li, D. Li, E. Xing et al., “Judging LLM- \nas-a-judge with MT-Bench and chatbot arena,” Advances in Neural Information Processing Systems (NeurIPS), \n2023. \n\n[72] S. Zhu, R. Zhang, B. An, G. Wu, J. Barrow, Z. Wang, F. Huang, A. Nenkova, and T. Sun, “AutoDAN: Automatic \nand interpretable adversarial attacks on large language models,” arXiv preprint arXiv:2310.15140, 2023. \n\n[73] A. Zou, Z. Wang, J. Z. Kolter, and M. Fredrikson, “Universal and transferable adversarial attacks on aligned language \nmodels,” arXiv preprint arXiv:2307.15043, 2023. \n\nA Gadget Examples \n\nBelow are a few examples of the optimized confounder gadgets c we got, for the different routing algorithms: \n\nB Ablation Study \n\nIn this section, we evaluate the effect of different hyperparameters and design choices (in the white-box setting). \n\nPrefix vs. suffix. As described in Section 4, we prepend the confounder gadget to the query. An alternative is to append \nit. This is straightforward for MT-bench and GSM8K, but MMLU consists of multi-choice questions followed by a list \nof possible answers, and the term “Answer:”. We insert the gadget at the end of the question text and before the possible \nanswers. If we append it at the very end, after “Answer:”, the LLM assumes the query was answered and in many cases \ndoes not generate any output at all. \n\nTable 12 shows that average upgrade rates are similar regardless of whether the gadget was inserted as a prefix or a suffix. \nFor MMLU, prefix works better. The downgrade rate is 0% in all cases. \n\n22", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What company released MegatronLM ?", + "target_page": 2, + "target_passage": "NVIDIA released the MegatronLM", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Total 2004** Total 2003 \n\n**Field units** **mmboe** Field units mmboe \n\n**Condensate (‘000 bbls)**\n\nCooper **1,448.5** **1.4** 2,111.8 2.0 \n\nSurat/Denison **7.8** **–** 10.9 – \n\nOtway **30.6** **–** 73.5 0.1 \n\nEast Spar **775.5** **0.7** 858.3 0.8 \n\nUnited States **114.4** **0.1** 25.6 – \n\nBayu-Undan **1,334.9** **1.2** – – \n\n**Total production** **3,711.7** **3.4** 3,080.1 2.9 \n\nTotal sales volume **3,569.5** **3.3** 3,246.6 3.0 \n\nTotal sales revenue ($million)**228.5** 150.0 \n\n**LPG (‘000 t)**\n\nCooper **108.7**\n\nSurat/Denison **0.1**\n\nBayu-Undan **49.8**\n\n**Total production** **158.6**\n\nTotal sales volume **148.6**\n\nTotal sales revenue ($million) **90.5**\n\n**0.9** 240.7 2.0 \n\n**–** – – \n\n**0.4** – – \n\n**1.3** 240.7 2.0 \n\n**1.3** 256.7 2.2 \n\n116.5 \n\n**Total**\n\n**Production (mmboe)** **47.1** 54.2 \n\n**Sales volume (mmboe)** **49.9** 55.4 \n\n**Sales revenue ($million)** **1,500.9** 1,465.0 \n\n\n \n \n \n \n [html]Field units2004Total\n
2003mmboe. Field unitsSales gas and ethane ( P2 )Cooper
125.921.6154.026.5Surat,/ Denison
16.12.814.32.5Amadeus
11.31.911.72.0Otway
4.40.811.92.0Patricia - Baleen
3.80.7L90.3Carnarvon
17.73.017.73.1United States
9.21.611.31.9Indonesia
2.10.4-Total production
190.532.8222.838.3Total sales volume
207.135.6228.439.3Total sales menue ( Smillion ) 480
680.1720.8Crude oil (° 000 bbls )Cooper2.685.5
2.72.808.22.8Surat,/ Denison90.2
0.183.10.1
Amadeus236.50.2270.00.3
Elang - Kakatua226.70.2425.50.4
Legendre2.045.82.02.269.02.3
Thevenard561.20.6708.00.7
Barrow859.30.9945.20.9
Jabiru - Challis176.70.2257.10.3
Stag2.124.82.12.617.22.5
SE Gobe289.10.3376.50.4
United States171.70.2212.20.2
Indonesia68.00.1-
Total production9.535.59.610.972.011.0
Total sales volume9.681.09.70.958.610.9
Total sales revenue ( Smillon )501.8477.7
", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Implementing the IBM Storwize**\n**V7000 with IBM Spectrum**\n**Virtualize V8.2.1**\n\nJon Tate \n\nJack Armstrong \n\nTiago Bastos \n\nPawel Brodacki \n\nFrank Enders \n\nSergey Kubin \n\nDanilo Miyasiro \n\nRodrigo Suzuki", + "page_start": 0, + "page_end": 0, + "source_file": "sg247938.pdf" + }, + { + "text": "**Hassan A Shazly**is a Development and Quality Assurance (QA) Manager for Content \nManager OnDemand. He has over 37 years of experience in Information Systems, the last 17 \nof which were at IBM. Hassan has written articles, submitted patents, and presented topics, \nincluding client/server technology, image processing, testing, and systems performance, at \nseveral conferences. Hassan holds a Ph.D. in Image Processing from the University of South \nCarolina, US. \n\n**Edward E Stonesifer**is an Executive Technical Sales Specialist with Mid-Atlantic Enterprise \nContent Management Business Unit at IBM US. Ed has 37 years of experience in Information \nTechnology and 23 years of experience with Content Manager OnDemand, specializing \nacross all IBM eServer™ platforms. Ed has been instrumental in providing input to the \nproduct development team for enhancements to meet the business requirements for all \nContent Manager OnDemand clients. Ed has presented at numerous technical conferences \nand has authored technical white papers addressing Content Manager OnDemand. \n\n**Vanessa T Stonesifer**is a Software Engineer with the Content Manager OnDemand \ndevelopment team at IBM US, with a current focus on performance and system integration \ntesting. Vanessa joined IBM Software Group in 1999 as a Technical Leader and Consulting \nServices Specialist in the Enterprise Content Management Software Group Services division \n– Content Manager OnDemand. Vanessa has over 29 years of experience in Information \nTechnology and with over 18 years of experience with Content Manager OnDemand. She was \nthe Technical Team Lead for Content Management Lab Services for more than 12 years, \nresponsible for solution implementations, performance optimization, and migrations for \nContent Manager OnDemand. Vanessa has also presented at multiple technical conferences \nand Content Manager OnDemand User Groups and has co-authored multiple Content \nManager OnDemand IBM Redbooks publications. \n\n\n \n \n \n \n [html]\n
platforms. His areas of expertse molute largeLcriterprise Content Manager architectures, as well as analytica application in the space of text analytics.
AcknowledgmentSpecial thanks to Hassan A Shazly for his effort in bringing this book up to the IBM Content ChDemand Version 9.5 level.
", + "page_start": 17, + "page_end": 17, + "source_file": "sg246915.pdf" + }, + { + "text": "Our growth strategy calls \nfor prudent and strategic \ndevelopment of our real \nestate assets to maximize \nshareholder value. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**ATLANTIC CITY LAND/BORGATA EXPANSION Our prime real**\n**estate in Atlantic City, in a location we defined as Renaissance**\n**Pointe, holds spectacular promise to expand MGM MIRAGE’s market**\n**presence on the East Coast.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKÀTM by Cirque du Soleil®", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "FE!4 MODEL AT VARIOUS \nMACH NUMBERS \na-O0 pee \n\n\n\n\n\n\n\n\n\nM*1.2", + "page_start": 238, + "page_end": 238, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Growing in Areas of Expansion**\n\n\n\nthese, however, and repackaged the Quest to give people \n\ntheir most popular options. We’ve also made great strides \n\nin quality and on other aspects get it right. \n\nFor fiscal 2005 we have a volume growth target of 3.3 \n\npercent, but in the first three months of this period we were \n\nactually up by 18 percent! We launched a few new \n\nproducts at the end of the last year, so it’s probably not \n\nrealistic to expect that kind of volume for the whole year, \n\nbut it makes us very confident of reaching our target. \n\nWe won’t have any completely new products in fiscal \n\n2005. That means that, while we will have solid, enviable \n\ngrowth, it won’t translate into the spectacular numbers \n\nwe’ve had over the past four years. The Altima will continue \n\nto drive our growth—it’s in its fifth year, but still a \n\nremarkable performer. We’ve gotten a good boost in the \n\nmarket from the Pathfinder, which was relaunched last fall. \n\nWe also expect to make some inroads with the Frontier, \n\nwhich is outperforming its competitors—it’s clearly the best \n\ntruck in the mid-size truck segment. This is, however, a \n\n“We had a terrific year in \n\nNorth America; sales for \n\ncalendar year 2004 grew by \n\n24.7 percent, and that \n\ngrowth that came in a flat \n\nU.S. market. The auto \n\nindustry here only rose by \n\nabout 237,000 vehicles, \n\nwhile Nissan was up by \n\n191,000 cars. It was a strong \n\nJ E D C O N N E L L Y \nSenior Vice President \nNissan North America \nyear with a rich mix of \n\nproducts. The Altima \n\ncontinues to be a core car \n\nfor us, and our most important car in terms of volume. \n\nWe sell over 200,000 Altimas a year, at a rate of \n\n20,000 units per month—outstanding for a car so far \n\nalong in its lifecycle. The Infiniti has also been \n\nphenomenal over the past few years. The G35 sedan \n\nand coupe continue to be the icons of the brand, \n\ndriving both volume and profit. \n\nOur success always comes down to the product. \n\nWe had great products from top to bottom, \n\nthroughout the lineup and in both divisions. We were \n\nalso very intelligent, I believe, in the way we price our \n\nvehicles—very close to the transaction price, and with \n\nlimited reliance on incentives. That’s been our \n\nstrategy for four years, and it works. Customers \n\nunderstand that we provide a great product at a fair \n\nprice. The other key to our success has been a very \n\nconsistent marketing message. The SHIFT_campaign \n\nis consistent and has been in place for some time \n\nnow, and it’s starting to gain traction with the public. \n\nConsumers look at Nissan products and our \n\ndealerships and say, ‘Hey, something really is going \n\non at Nissan!’ \n\ndifficult segment at the moment. \n\nWe have a great opportunity to build on the strengths \n\nthat we’ve demonstrated in North America over the past \n\nfour years. We have solid growth, and we continue to \n\nestablish the Nissan brand. We have new models that \n\ncontinue to gain strength, such as the Murano, which has \n\ndone wonderful things for Nissan’s image in the market. On \n\nthe Infiniti side, we just launched the M45, the mid-size \n\nluxury sedan that competes with the BMW 5 series. In the \n\nfirst three months after its launch, the M45 is doing very \n\nwell. As we continue to establish Nissan brand recognition, \n\nwe also will continue to define Infiniti, because now we’re \n\nstrong with the M45, strong in the luxury crossover market \n\nwith the FX, and with the M we have a luxury sedan that \n\ncan compete with anything in its class. Infiniti is strong all \n\nacross the board. \n\nNot having a new product launch in fiscal year 2005 \n\nmight be seen as a risk, but the current models are strong \n\nand selling well, and we’ll have a host of new models in \n\n2006. Most of our risks in the coming year are from", + "page_start": 63, + "page_end": 63, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "OUR PROGRESS IN 2013 \nWe continued to make progress on our cost efficiency initiatives this \nyear, which contributed to a 3% increase in consolidated adjusted \noperating profit and a 6 basis point increase in our consolidated \nadjusted operating profit margin to 39.3%, driven mostly by Wireless \nand Cable. \n\nWe were also recognized for our networks: PCMag.com named us \nCanada’s fastest broadband Internet service provider*and*wireless \nnetwork in October 2013, and SamKnows stated through in-home \ntesting in May 2013, that we delivered, on average, 100% or more of \nour advertised download speeds on our most popular \nInternet \npackages, better than most providers they tested in the US and Europe. \n\nOUR PROGRESS IN 2013 \nWe expanded our wireless network by establishing key network sharing \nagreements to bring LTE to more customers at \nfaster speeds to \ncustomers in Manitoba, Quebec and the Ottawa region, and through \nour relationship with AT&T to become the first Canadian carrier to offer \nLTE roaming for customers travelling to the US. We also secured an \noption to buy Shaw’s Advanced Wireless Service (AWS) spectrum \nholdings. \n\n6. DRIVE FUTURE GROWTH OPPORTUNITIES \nContinue to develop targeted new growth areas of our business, \ncommunications, mobile \nincluding machine-to-machine \ncommerce and video, business communications services, \nlocal and \ndigital media services, home automation and sports. \n\n(M2M) \n\n3. EXPAND OUR SERVICES REACH \nExpand the reach of our networks and services \nthrough new \nconstruction and targeted acquisitions that complement our existing \nplatforms; by more widely deploying products and services; and by \nexpanding the reach of our key media brands nationally and across our \ndigital platforms. \n\nOUR PROGRESS IN 2013 \nWe made strides in the M2M market this year, demonstrating a single, \nworldwide SIM card with our M2M global alliance partners that will \ncustomers, and \nstrengthen our M2M offering to multinational \nannouncing an M2M agreement with Sprint to bring a comprehensive \nin-car infotainment solution to the Canadian market. We also certified \nthe Suretap wallet, our mobile payment service, for the Android and \nBlackBerry 10 operating smartphone systems. We received a licence to \noperate a bank for the purposes of launching a Rogers’ branded credit \ncard. In addition, we expanded our Rogers Smart Home Monitoring \nfootprint, and launched other initiatives such as Outrank, an online site \nfor marketing and advertising small business, introduced Rogers Alerts \nand other digital opportunities.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "2004 HIGHLIGHTS \n• Significant progress on new field developments: \n\n> Bayu-Undan and Minerva commenced production \n\n> John Brookes and Casino sanctioned \n\n> Mutineer-Exeter ahead of schedule and Bayu-Undan \n\nLNG construction on track \n\n> Oyong and Maleo progressed to imminent sanction. \n\n• Seven of sixteen exploration wells discovered hydrocarbons, \n\nincluding Jeruk. \n\n• Reserve replacement exceeded production for the third \n\nsuccessive year. \n\n• Indonesia established as a core area. \n\n• New country entry to Egypt. \n\n• Improved safety performance and first Sustainability \n\nReview released. \n\n**EARNINGS AND DIVIDENDS**\n**PER SHARE**\ncents \n\n70 \n\n60 \n**59**\n52 52 50 \n\n40 \n\n**33**\n30 \n30 30 \n\n20 \n\n10 \n\n0 \n’02 ’03 **’04**\nEarnings per share Ordinary dividend \n\n**PRODUCTION BY PRODUCT**\nmmboe \n\n70.0 \n\n57.3 \n60.0 \n54.2 \n**47.1**\n50.0 \n\n40.0 \n\n30.0 \n\n20.0 \n\n10.0 \n\n0.0 \n’02 ’03 **’04**\nSales gas & ethane Crude oil \nCondensate LPG \n\n**NET PROFIT AFTER TAX**\n$million \n\n**380**\n400 \n\n327 \n322 \n\n300 \n\n2005 AND BEYOND \n• New production to commence: \n\n> Mutineer-Exeter, John Brookes and Oyong in 2005 \n\n> Bayu-Undan LNG, Casino and Maleo in 2006. \n\n• Continuing high impact exploration program. \n\n• Follow-up on recent exploration success: \n\n> Jeruk early production potential \n\n> Hiu Aman, Hurricane and Martha appraisal. \n\n• Continued commercialisation of static gas resources. \n\n0 \n’02 ’03 **’04**\n\n**2004** 2003 \n\n**FINANCIAL STRENGTH**\n$million **1,500.9** 1,465.0 \n\n430.9 \n1,400 \n897.3 1,163 \n1,200 \n52.1 \n1,000 \n30 \n800 \n153.8 \n\n**OPERATING CASH FLOW**\n$million \n\n1,000 \n897 \n821 \n800 \n\n**605**\n600 \n\n400 \n\n200 \n\n0 \n’02 ’03 **’04**\n\n**SALES REVENUE**\n$million \n\n1,478 1,465**1,501**\n1,600 \n\n1,400 \n\n1,200 \n\n1,000 \n\n800 \n\n600 \n\n400 \n\n200 \n\n0 \n’02 ’03 **’04**\nSales gas & ethane Crude oil \nCondensate LPG \n\n**RETURN ON ORDINARY EQUITY**\n% \n\n70 25 \n**59**\n60 \n52 52 20 \n50 \n\n15 \n40 \n\n13.1% 12.3% \n**13.1%** 30 \n10 \n\n20 \n\ne \nr \na \nh \ns \n5 \n10 \n\nr \ne \np \ns \nt \nn \ne \nc 0 0 \n’02 ’03 **’04**\nEarnings per share \nReturn on average ordinary shares \n\n**SAFETY PERFORMANCE**\nTRCFR (per million hours worked) \n\n10 45% \n9.0 \n**1,131**\n40% \n8 \n7.2 35% \n898 **6.4**\n30% \n6 \n28.9% \n25% \n\n**24.4%** 20% \n600 \n22.5% \n4 \n15% \n400 \n10% \n2 \n200 \n5% \n\n\n \n \n \n \n [html]\n
20042f
Sales ($ million )1.500.91.46
Operating profit before tax ($ million )540.843
Cash flow from operations ($ million )605.089
Earnings per share ( cents )58.65
Ordinary dividends per share ( cents )33
Cash flow per share ( cents )103.415
Total shareholders ’ funds ($ million )3.498.33.08
Return on average ordinary equity (%)13.11
Return on average capital employed (%)9.4
Net debt /( net debt plus equity ) (%)24.42
Net interest cover ( times )9.2
", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**19**\n\n93 \n\n**THE NEW YORK-NEW YORK SKYLINE BECOMES**\n**A TOWERING PRESENCE IN THE PORTFOLIO.**\nWe acquired Primadonna Resorts to gain full \nownership of the spectacular New York-New York \nas well as three hotel-casinos on the Nevada state \nline and two championship golf courses. \n\n\n\n\n\n\n\n**IT ALL BEGINS WITH MGM GRAND.**MGM Grand, \nthe largest hotel-casino in the world, opened to \ngreat fanfare. “The City of Entertainment” \nredefined the urban resort and provided the \nfoundation for our company’s momentous growth.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "43messa41ITIBTaCUOTI WIIT ITIE CaCTIB441low bandwidth 37interctuster linkLU 780796_ImpImplementing the IBM Stonwize V7000 with IBM Spectrum Virtualize V8.2. 1", + "page_start": 817, + "page_end": 817, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What is the average emission of a human being per year in terms of CO2eq ?", + "target_page": 3, + "target_passage": "the average human is responsible for an estimated 5t CO2e per year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**21**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \ndays \n10 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 16.**Difference in consecutive dry days between 2°C and 1.5°C global warming, for individual ensemble members and \nensemble mean. \n\n\n\n10 20 \n\nHadGEM2-ES", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed11.pdf" + }, + { + "text": "**1 Introduction**\n\nThe Non-Annex I Inventory software (NAIIS) web application is a web-based tool developed for use by Parties not \nincluded in Annex I to the Convention (non-Annex I Parties) to estimate and report their national greenhouse gas \ninventories (GHG inventories). As per Article 4, paragraph 1 (a), and Article 12, paragraph 1 (a) of the Convention, \nnon-Annex I Parties are required to communicate to the Conference of the Parties a national inventory of \nanthropogenic emissions by sources and removals by sinks of all greenhouse gases (GHGs) not controlled by the \nMontreal Protocol, to the extent their capacities permit, following the guidelines contained in the annex to \ndecision17/CP.8. \n\nIn order to assist non-Annex I Parties in estimating and reporting their GHG inventories as part of their national \ncommunications, the secretariat developed an Excel-based software which incorporated all the elements of a national \nGHG inventory prescribed by decision 17/CP.8. The software was based on the IPCC inventory software version \n1.1, which used the Tier 1 methodologies for estimating GHG emissions and removals for all source categories \nincluded in the Revised 1996 IPCC Guidelines, and further complemented by the GPGs.1 \n\nSince its release in 2005, most non-Annex I Parties have been using that software for the development of their \nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it \navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel- \nbased version of the software (v.1.3.2)2 into a web-based application (NAIIS) which provides greater flexibility and \nsecurity for maintaining data. \n\n**2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG \ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their \nnational communications and biennial update reports. \n\n**2.1** **System overview**\n\nThe NAIIS web application has the following functionalities: \n\n1. User management (only for the user roles NFP and PM) \n2. Submission management \n3. Data entry \n4. Key category analysis \n5. Reporting tables \n6. Data Export/Import \n7. Completeness \n8. Consistency \n\nThe NAIIS web application allows input of data through three different channels: \n\n1. Manual input into the entry grids \n2. Partial or full import of data from Excel \n3. Bulk import of data from XML \n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values \nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the \nreporting of other category specific information, for example, the choice of the method for activity data and emission \nfactors. \n\n1 Good Practice Guidance and Uncertainty Management in National Greenhouse Gas Inventories, 2000, and Good Practice Guidance for Land \nUse, Land‐Use Change and Forestry, 2003. \n2 http://unfccc.int/files/national_reports/non‐ \nannex_i_natcom/training_material/methodological_documents/application/zip/unfccc_nai_is_132.zip", + "page_start": 3, + "page_end": 3, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "**20**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n–2 –1 \n0 \n°C \n1 2 \n. \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \nMIROC-ESM-CHEM \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 14.**Difference in annual maximum daily maximum temperature between 2°C and 1.5°C global warming, for individual \nensemble members and ensemble mean. \n\nensemble mean \n\n\n\n**Figure 15.**Difference between 2°C and 1.5°C global warming for percentage of days with maximum temperature above 90th \npercentile of baseline, for individual ensemble members and ensemble mean. \n\npossible outcomes projected here, the differences between 2°C and 1.5°C are not always clear. The \ndifferences between 2°C and 1.5°C are not always in the same direction as the changes at 2°C; in \nthe Amazon, for example, the difference in flow between 2°C and 1.5°C varies from positive to \nnegative between ensemble members.", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed11.pdf" + }, + { + "text": "**3.** **Emission factors**\n\n***a.**Ozone precursors and SO2 from oil refining –**Crude oil throughput***\n\nNOx = 0.06 \nCO = 0.09 \nNMVOC = 0.62 \nSO2 = 0.93 \n\n***b.**Ozone precursors and SO2 from oil refining –**Catalytic cracker throughput***\n\nNOx = 0.2 \nCO = 42.6 \nNMVOC = 0.6 \nSO2 = 1.5 \n\n*c. NMVOC emissions from storage and handling –**Crude oil throughput***\n\nSecondary seals = 0.2 \nPrimary seals = 0.7 \nFixed Roof = 4.9 \n\n*d. SO2 from Sulphur Recovery Plants –***139 kg/t**\n\n**4.** **CKD correction factor**= 1.02 \n\n**5.**\n\n**Methane Correction Factor (MCF)**\nManaged — 1.0 \nUnmanaged – deep (>= 5m) — 0.8 \nUnmanaged – shallow (< 5m) — 0.4 \nMethane Correction Factor — 0.6 \n\n**6.**\n**Inventory time period***(for Cropland remaining Cropland – Carbon stock change – Mineral soils)*= \n**20 years**", + "page_start": 49, + "page_end": 49, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**REDUCING**\n**OUR**\n**CARBON**\n**FOOTPRINT**\n\nour annual report is printed on stock \ncontaining recycled material. Please \nrecycle. our report is also available \non‑line at: killamproperties.com/ \nfinancial‑reports \n\nK i l l a m P r oPe r t i e s in c | 2 0 1 3 9 7", + "page_start": 96, + "page_end": 96, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.**\nIn this study, climate \ndata of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models \ndriven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a \ntotal of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- \nCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- \nshine hours (Fig. 1).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "The SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with \nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a \nrange of outcomes for future climate change, including high and low climate sensitivity, different \nbiases in baseline precipitation climatology, and different global patterns of precipitation change. \nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global \nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global \nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected, \nwhich means that the results here may be sensitive to systematic errors arising from biases in the \npresent-day SST patterns. \n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5 \nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol \nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse \ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", + "target_page": 5, + "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Thus at each step, from initial participation in Internet fora, to \ncontinued presence there, to the collection and finally the filtering \nof training data, current practice privileges the hegemonic view- \npoint. In accepting large amounts of web text as ‘representative’ \nof ‘all’ of humanity we risk perpetuating dominant viewpoints, \nincreasing power imbalances, and further reifying inequality. We \ninstead propose practices that actively seek to include communities \nunderrepresented on the Internet. For instance, one can take inspi- \nration from movements to decolonize education by moving towards \noral histories due to the overrepresentation of colonial views in \ntext [35, 76, 127], and curate training datasets through a thoughtful \nprocess of deciding what to put in, rather than aiming solely for \nscale and trying haphazardly to weed out, post-hoc, flotsam deemed \n‘dangerous’, ‘unintelligible’, or ‘otherwise bad’. \n\n4.2 Static Data/Changing Social Views \nA central aspect of social movement formation involves using lan- \nguage strategically to destabilize dominant narratives and call at- \ntention to underrepresented social perspectives. Social movements \nproduce new norms, language, and ways of communicating. This \nadds challenges to the deployment of LMs, as methodologies re- \nliant on LMs run the risk of ‘value-lock’, where the LM-reliant \ntechnology reifies older, less-inclusive understandings. \n\nFor instance, the Black Lives Matter movement (BLM) influenced \nWikipedia article generation and editing such that, as the BLM \nmovement grew, articles covering shootings of Black people in- \ncreased in coverage and were generated with reduced latency [135]. \nImportantly, articles describing past shootings and incidents of po- \nlice brutality were created and updated as articles for new events \nwere created, reflecting how social movements make connections \nbetween events in time to form cohesive narratives [102]. More \ngenerally, Twyman et al. [135] highlight how social movements \nactively influence framings and reframings of minority narratives \n\nThese demonstrations of biases learned by LMs are extremely \nvaluable in pointing out the potential for harm when such models \nare deployed, either in generating text or as components of classi- \nfication systems, as explored further in §6. However, they do not \nrepresent a methodology that can be used to exhaustively discover \nall such risks, for several reasons. \n\nFirst, model auditing techniques typically rely on automated \nsystems for measuring sentiment, toxicity, or novel metrics such \nas ‘regard’ to measure attitudes towards a specific demographic \ngroup [119]. But these systems themselves may not be reliable \n\n14Available at https://github.com/LDNOOBW/List-of-Dirty-Naughty-Obscene-and- \nOtherwise-Bad-Words/blob/master/en, accessed Jan 18, 2021 \n15This observation is due to William Agnew. \n\n\n \n \n \n \n [html]\n
Table
indirectly to construct GPT - 3 ′ s [ 53 ].
", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "most similar to the ones used in GPT-2’s training data, i.e. docu- \nments linked to from Reddit [25], plus Wikipedia and a collection \nof books. While this was reportedly effective at filtering out docu- \nments that previous work characterized as “unintelligible” [134], \nwhat is unmeasured (and thus unknown) is what else it filtered out. \nThe Colossal Clean Crawled Corpus [107], used to train a trillion \nparameter LM in [43], is cleaned, inter alia, by discarding any page \ncontaining one of a list of about 400 “Dirty, Naughty, Obscene or \nOtherwise Bad Words” [p.6].14 This list is overwhelmingly words \nrelated to sex, with a handful of racial slurs and words related to \nwhite supremacy (e.g. swastika, white power) included. While possi- \nbly effective at removing documents containing pornography (and \nthe associated problematic stereotypes encoded in the language of \nsuch sites [125]) and certain kinds of hate speech, this approach will \nalso undoubtedly attenuate, by suppressing such words as twink, \nthe influence of online spaces built by and for LGBTQ people.15 If \nwe filter out the discourse of marginalized populations, we fail to \nprovide training data that reclaims slurs and otherwise describes \nmarginalized identities in a positive light. \n\nin the type of online discourse that potentially forms the data that \nunderpins LMs. \n\nAn important caveat is that social movements which are poorly \ndocumented and which do not receive significant media attention \nwill not be captured at all. Media coverage can fail to cover protest \nevents and social movements [41, 96] and can distort events that \nchallenge state power [36]. This is exemplified by media outlets \nthat tend to ignore peaceful protest activity and instead focus on \ndramatic or violent events that make for good television but nearly \nalways result in critical coverage [81]. As a result, the data under- \npinning LMs stands to misrepresent social movements and dispro- \nportionately align with existing regimes of power. \n\nDeveloping and shifting frames stand to be learned in incomplete \nways or lost in the big-ness of data used to train large LMs — particu- \nlarly if the training data isn’t continually updated. Given the com- \npute costs alone of training large LMs, it likely isn’t feasible for \neven large corporations to fully retrain them frequently enough to \nkeep up with the kind of language change discussed here. Perhaps \nfine-tuning approaches could be used to retrain LMs, but here again, \nwhat would be required is thoughtful curation practices to find ap- \npropriate data to capture reframings and techniques for evaluating \nwhether such fine-tuning appropriately captures the ways in which \nnew framings contest hegemonic representations. \n\n4.3 Encoding Bias \nIt is well established by now that large LMs exhibit various kinds of \nbias, including stereotypical associations [11, 12, 69, 119, 156, 157], \nor negative sentiment towards specific groups [61]. Furthermore, \nwe see the effects of intersectionality [34], where BERT, ELMo, GPT \nand GPT-2 encode more bias against identities marginalized along \nmore than one dimension than would be expected based on just the \ncombination of the bias along each of the axes [54, 132]. Many of \nthese works conclude that these issues are a reflection of training \ndata characteristics. For instance, Hutchinson et al. find that BERT \nassociates phrases referencing persons with disabilities with more \nnegative sentiment words, and that gun violence, homelessness, \nand drug addiction are overrepresented in texts discussing mental \nillness [61]. Similarly, Gehman et al. show that models like GPT-3 \ntrained with at least 570GB of data derived mostly from Common \nCrawl16 can generate sentences with high toxicity scores even when \nprompted with non-toxic sentences [53]. Their investigation of GPT- \n2’s training data17 also finds 272K documents from unreliable news \nsites and 63K from banned subreddits.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "52. \n\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. \n\nHum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18,", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed10.pdf" + }, + { + "text": "INTRODUCTION \n\n∗Joint first authors \n\n\n\nJust as environmental impact scales with model size, so does \nthe difficulty of understanding what is in the training data. In §4, \nwe discuss how large datasets based on texts from the Internet \noverrepresent hegemonic viewpoints and encode biases potentially \ndamaging to marginalized populations. In collecting ever larger \ndatasets we risk incurring documentation debt. We recommend \nmitigating these risks by budgeting for curation and documentation \nat the start of a project and only creating datasets as large as can \nbe sufficiently documented. \n\nAs argued by Bender and Koller [14], it is important to under- \nstand the limitations of LMs and put their success in context. This \nnot only helps reduce hype which can mislead the public and re- \nsearchers themselves regarding the capabilities of these LMs, but \nmight encourage new research directions that do not necessarily \ndepend on having larger LMs. As we discuss in §5, LMs are not \nperforming natural language understanding (NLU), and only have \nsuccess in tasks that can be approached by manipulating linguis- \ntic form [14]. Focusing on state-of-the-art results on leaderboards \nwithout encouraging deeper understanding of the mechanism by \nwhich they are achieved can cause misleading results as shown \n\nThis work is licensed under a Creative Commons Attribution International 4.0 License. \nFAccT ’21, March 3–10, 2021, Virtual Event, Canada \nACM ISBN 978-1-4503-8309-7/21/03. \nhttps://doi.org/10.1145/3442188.3445922", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "then the associations suddenly strengthened in 2012 when numerous hashtags about phenomena were \nincluded in the discourse. Notably, the red node in the top right-hand corner named “2012” refers \nto the Maya prediction that the year 2012 would be the end of the world and that the world would \nbe destroyed by extreme natural events, and was linked to other climate hashtags for the first time \nin the graph exactly in 2012. The blue nodes included the political hashtags, such as “maga”, “ows”, \n“p2”, “tcot”, and “obama”. The involvement of political hashtags in the global warming discourse was \nsignificantly higher than that in the climate change discourse according to the comparison between \nFigure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, \nas shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in \nFigure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts \nand actions, where words describing global efforts, such as “ipcc”, “cop15”, and “un”, and words \nquestioning global warming, such as “hoax” and “fraud”, were both included. The associations \nbetween the yellow nodes were most salient in 2010 and 2011 but were less dominant in the following \nyears. The green nodes occupied 50.7% of all the nodes representing talk about the scientific hashtags of \nclimate issue, including words such as “ecology”, “ocean”, and “cleanenergy”. Associations between \nscientific hashtags (green nodes) exploded and the centrality sum of this cluster also showed an obvious \nrising trend in dominating the theme of the global warming discourse, according to Figure 5.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed10.pdf" + }, + { + "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed10.pdf" + }, + { + "text": "and framing effects. Psychon. Bull. Rev.**2003**, 10, 596–602. [CrossRef] \n\n26. Du, Y.R. Same events, different stories: Internet censorship in the Arab Spring seen from China. Journal. \n\n27. \n\n28. \n\nMass Commun. Q.**2016**, 93, 99–117. [CrossRef] \nSchuldt, J.P.; Roh, S. Media frames and cognitive accessibility: What do “global warming” and “climate \nchange” evoke in partisan minds? Environ. Commun.**2014**, 8, 529–548. [CrossRef] \nSonnett, J. Climates of risk: A field analysis of global climate change in US media discourse, 1997–2004. \nPublic Underst. Sci.**2010**, 19, 698–716. [CrossRef] \nJaspal, R.; Nerlich, B.; Van Vuuren, K. Embracing and resisting climate identities in the Australian press: \nSceptics, scientists and politics. Public Underst. Sci.**2016**, 25, 807–824. [CrossRef] [PubMed] \nShi, W.; Chen, C.; Xiong, J.; Fu, H. What Framework Promotes Saliency of Climate Change Issues on Online \nPublic Agenda: A Quantitative Study of Online Knowledge Community Quora. Sustainability**2019**, 11, 1619. \n[CrossRef] \n\n31. Gifford, R.; Comeau, L.A. Message framing influences perceived climate change competence, engagement, \n\nand behavioral intentions. Glob. Environ. Chang.**2011**, 21, 1301–1307. [CrossRef] \nJiang, H.; Qiang, M.; Zhang, D.; Wen, Q.; Xia, B.; An, N. Climate Change Communication in an Online Q&A \nCommunity: A Case Study of Quora. Sustainability**2018**, 10, 1509. \n\n32.", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed10.pdf" + }, + { + "text": "5.1.3. Discourse Structure \n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action” \nrepresented the themes of the three largest clusters in the network. However, three popularly recurring \nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters \nabove, but formed another small tight cluster together, sitting in the most central part of the semantic \nnetwork, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of \nthe climate change topic and these three hashtags were tightly bundled might indicate an attempt by \n#climatechange users to address all three communities together [91], consolidating climate change as \na topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags’ \nfunction of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food��. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. \n\nEven when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. \n\n5.1.3. Discourse Structure", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", + "target_page": 1, + "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. \n\nmolecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. \n\n] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from \n\nSubtracting \nlong-range Coulombic potential \nV LR \nij (r) (which depends on the dielectric constant of the \nsolvent) from V eff \nij (r), we obtain the short-range contri- \nbution V SR \nij (r) to the effective potentials. These are given \nin Fig. 1 (species 1 and 2 refer to Na+ and Cl− free ions, \nrespectively). All the short-range potentials exhibit os- \ncillations corresponding to the solvent layering between \nthe ions, but this effect is particularly important for the \ncation-anion interaction: a considerable potential barrier \n(& 2kBT ) separates the first two attractive wells. To \nserve as a reference, Monte Carlo (MC) simulations were \nperformed with these effective potentials; a comparison \nbetween MD and MC RDF is also provided in Fig. 1. The \nexcellent agreement between both sets of RDF validates \nthe HNC inversion procedure [17], and allows us to com- \n\nthe", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "-0.5 \n) \n1 \n- \nPair Fraction \nL \n\n. \nl \no \nm \n-1 \n( \n0.2 \nx \ne \nv \nf \nβ \n0.1 \n\n-1.5 \n0 1 0.5 \n\n3 \n\n2 \n\n1 \n\n0 \n\n(b) \n3 \n\n2 \n\n1 \n\n0 \n\n4 8 6 10 \nr (Å) \n\nFIG. 3: Effective pair potentials derived for MSA3 and \nBIMSA3. (a) Cation anion (dashed line: without taking the \npair into account), (b) pair cation, (c) pair anion, and (d) pair \npair. The internal potential of the pair β eVint(r) is set equal \nto βV eff ij (r) for distances less than 4 ˚A. \n\n0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. \n\ntrapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, \n\n3i (k) = \nV SR \n33 (k) = \nV SR \ne \ne \nwhere \n\n(k), \nw(k/2) \n1i + V SR \nV SR \n2i \n(cid:3) \n(cid:2) \nw(k/2)2 \n22 + 2V SR \n11 + V SR \nV SR \ne \n12 \n(cid:2) \ni = 1, 2 \n(k) \n\n(2a) \n\n(2b) \n(cid:3) \ne \nw(r) is the pair probability distribution \n\n\n \n \n \n \n [html]\n
TablePatientsTable1.
Parameters.FigureP
PatientsPatientsTableTable
Table=TableTable
\n\nwe have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne \n\nw(k) (1 − δij ) + \nρ3 \nw(k/2) \ng3j \nρj \ng3i + \nρi \nρ3 \ne \ne \ne \ne \n(cid:2) \nw(k/2)]2 \ng33(k) \nρ 2 \n3 [ \ne \ne \ne \ne \ne \ngij(k) \n(k) \ne \n(cid:3) \n\nρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "8 \n\nBCSI model. However, before that, we show in Figs 10- \n12 the conductivities and the optical integrals for the \noriginal MFLI model. \n\nConductivities (Original MFLI) \n\nNS \n0.2 \nSC \n\n∆+ω \n1 \n) \n\nω \n( \nσ 0.1 \n\n0.2 \n0.4 \nω \nc \n0.6 \n in eV \n0.8 \n\nFIG. 9: ∆W vs the cut-off for the EB model. It remains neg- \native for larger cut-offs. Parameters are the same as before. \nThe dot indicates the value of ∆W ( ) = ∆WK \n∞ \n\nof the lattice (the dashed line in Fig. 9). \n\nFor their analysis of the optical integral, Norman and \nP´epin30 introduced a phenomenological model for the self \nenergy which fits normal state scattering rate measure- \nments by ARPES41. \n(ω) out \nof two contributions - impurity scattering and electron- \nelectron scattering which they approximated phenomeno- \nlogically by the marginal Fermi liquid form of αω at small \nfrequencies6 (MFLI model). The total Σ \n\n120 \n0 ′′ \nIt constructs the NS Σ \n\nFIG. 10: Top –the conductivities in the NS and SCS in the \noriginal MFLI model of Ref.30. We set Γ = 70 meV , α = 0.75, \n∆ = 32 meV , ω1 = 71 meV . Note that σ \n(ω) in the SCS \nbegins at Ω = ∆ + ω1. Bottom – the behavior of WK with Γ. \nis \n\nω \nωsat (cid:19) \nwhere ωsat is about ∼ 1 \n2 of the bandwidth, and f (x) ≈ 1 \nfor x < 1 and decreases for x > 1. In Ref 30 f (x) was \nassumed to scale as 1/x at large x such that Σ′′ is flat at \nlarge ω. The real part of Σ(ω) is obtained from Kramers- \nKr¨onig relations. For the superconducting state, they \nobtained Σ \nby cutting off the NS expression on the lower \nend at some frequency ω1 (the analog of ω0 + ∆ that we \nhad for EB model): \n\nIn Fig 10 we plot the conductivities in the NS and the \nSCS and Kubo sums WK vs Γ at α = 0.75 showing that \nthe spectral weight in the SCS is indeed larger than in the \nNS. In Fig 11 we show the behavior of the optical sums \nW (ωc) in NS and SCS. The observation here is that only \n∼ 75−80% of the Kubo sum is recovered up to the scale of \nthe bandwidth implying that there is indeed a significant \nspectral weight well beyond the bandwidth. And in Fig \n12 we show the behavior of ∆W (wc). We see that it does \nnot change sign and remain positive at all ωc, very much \nunlike the BCS case. Comparing the behavior of W (wc) \nwith and without a lattice (solid and dashed lines in Fig. \n12) we see that the ‘finite bandwidth effect’ just shifts the \ncurve in the positive direction. We also see that the solid \nline flattens above roughly half of the bandwidth, i.e., at \nthese frequencies ∆W (ωc) ≈ ∆WK. Still, we found that \n∆W continues going down even above the bandwidth \nand truly saturates only at about 2 eV (not shown in the \nfigure) supporting the idea that there is ‘more’ left to \nrecover from higher frequencies. \n\n′′ \n\nwhich fits \nwhere Θ(x) is the step function. In reality, Σ \nARPES in the NS has some angular dependence along the \nFermi surface42, but this was ignored for simplicity. This \nmodel had gained a lot of attention as it predicted the \noptical sum in the SCS to be larger than in the NS, i.e., \n∆W > 0 at large frequencies. This would be consistent \nwith the experimental findings in Refs. 8,9 if, indeed, one \nidentifies ∆W measured up to 1eV with ∆WK . \n\nThe rationale for ∆WK > 0 in the original MFLI \nmodel has been provided in Ref. 30. They argued that \nthis is closely linked to the absence of quasiparticle peaks \nin the NS and their restoration in the SCS state because \nthe phase space for quasiparticle scattering at low ener- \ngies is smaller in a superconductor than in a normal state. We will show below that the sign of ∆W in the MFLI \nmodel actually depends on how the normal state results \nare extended to the superconducting state and, moreover, \nwill argue that ∆WK is actually negative if the extension \nis done such that at α = 0 the results are consistent with", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0764.pdf" + }, + { + "text": "0 \n0 \n0.5 \nω in eV \n\nConductivities (CB model λ =10) \n1 \n\nNS \nSC \n\n0.6 \n\nω \n( \nσ \n2∆ + ω \no \n\n0.2 \n\n0 \n0.5 \nω in eV \n\n1 2 3 \nλ (coupling) \n\nFIG. 18: The behavior of Kubo sums in the CB model. Note \nthat the spectral weight in the NS is always larger than in the \nSCS. We set ωsf = 26 meV ,λ = 1, and ∆ = 30 meV . \n\nFIG. 19: The evolution of the optical integrals in the NS \nand the SCS in the CB model. Note that about \n75% of \nthe spectral weight is recovered up to 1 eV . We set ωsf = \n26 meV ,λ = 1, and ∆ = 30 meV . \n\n∼ \n\nFIG. 17: Conductivities and ∆W for a fixed λωsf . Top – \nωsf = 26 meV ,λ = 1,ωo = 40 meV ,Zo = 0.77 Bottom – \nωsf = 2.6 meV ,λ = 10,ωo = 13.5 meV ,Zo = 1.22. The zero \ncrossing for ∆W is not affected by a change in λ because it \nis determined only by λωsf . We set ∆ = 30 meV . \n∆ W (CB model λ=1) \n20 \n\nwith lattice \nwithout lattice \n\n) \nc \nCB model (Ω \n=40 meV) \no \nω \n( \n\nS \nN \nW \n− \n) \n0 200 \n\nSCS \nNS \nc \nω \n( \n\nC \nS \nW \n) \n−20 \nV \ne \nm \n160 \n( \n\nK \nW \n0 \n0.5 \n in eV \n1 \nω \nc \n120 \n∆ W (CB model λ=10) \n\nwith lattice \nwithout lattice \n20 \n) \nc \nω \n( \n\nS \nN \nW \n− \n) 0 \nc \nω \n( \n\nC \nS \nW \n−20 \n\nWe performed the same calculations of conductivities \nand optical integrals as in the previous three cases. The \nresults are summarized in Figs. 17 - 22. Fig 17 shows con- \nductivities in the NS and the SCS for two couplings λ = 1 \nand λ = 10 (keeping λωsf constant). Other parameters \nZo and ωo are calculated according to the discussion after \nEq 21. for ωsf = 26 meV , λ = 1, we find ωo = 40 meV , \nZo = 0.77. And for ωsf = 2.6 meV , λ = 10, we find \nωo = 13.5 meV , Zo = 1.22. Note that the conductivity \nin the SCS starts at 2∆ + ωo (i.e. the resonance energy \n\n1 \n\nFIG. 20: ∆W (in meV) for λ = 1(top) and λ = 10(bottom). \nWe used ωsf = 26 meV /λ and ∆ = 30meV . The zero crossing \nis not affected because we keep λωsf constant. The notable \ndifference is the widening of the dip at a larger λ.", + "page_start": 11, + "page_end": 11, + "source_file": "1001.0764.pdf" + }, + { + "text": "ρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the principle of the liquid perturbation theory (LPT) ?", + "target_page": 2, + "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to \n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the \n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to \n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term \n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal \n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three- \n\ndimensional models are also discussed in the literature [76, 77]. \n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied \n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 4: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles \n\nwith average density ρav \n\nn = 0.3. The top row are the nanoparticle density profiles and the bottom row are \nl σ2. \nthe corresponding liquid density profiles at the times t/tl = 8 (left) and 80 (right), where tl = 1/kT M nc \n\nThe parameters are kT /εll = 0.8, εnl/εll = 0.6, εnn = 0, α = 0.4M nc \nl σ4, M c l = 0, ρl(t = 0) = 0.9 ± ξ \n\n(where ξ represents white noise of amplitude 0.05) and (µ − µcoex)/kT = −0.88, where the liquid exhibits \n\nspinodal decomposition-evaporation. \n\nalso diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines \n\ndeveloped above for the nanoparticles. For the non-conserved part we assume a standard form \n\n[85], i.e., the change in time of ρl is proportional to −(µsurf(r, t) − µ) = −δF [ρn, ρl]/δρl(r) \n\nwhere µsurf(r, t) is the local chemical potential of the liquid at the point r on the surface at time t. \n\nThis gives the evolution equation for the liquid density \n(cid:21) (cid:20) \n\n∂ρl \n∂t \nδF [ρn, ρl] \nδρl δF [ρn, ρl] \nδρl \nM c − M nc = ∇ · \nl ρl∇ \n, \nl \n\nwhere we assume that the coefficients M c \nl and M nc \nl \nare constants. \n\n16", + "page_start": 15, + "page_end": 15, + "source_file": "1001.2669.pdf" + }, + { + "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. \n\nThe kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the \n\n(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between \n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- \n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "substrate and force equilibria at the free surface, and applies a long-wave approximation. Under \n\nthe assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled \n\nnon-linear evolution equations for the film thickness profile h(x, t) and the amount of nanoparticles \n\nper unit length hp = φh, where φ is the volume concentration of the nanoparticles. Note, that hp \n\ncorresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The \n\nresulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence \n\nof particle-independent capillarity and wettability only, the energy functional F [h] is given by \n\nEq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. \n\n[88, 89, 91, 92] we use the Quemada law for dense suspensions [93–95] \n\n(cid:18) (cid:19)−2 \n\nφ \nφc \nη(φ) = η0 \n1 − (8) \n\nwhere φc = 0.64 corresponds to random close packing of spherical particles. For the nanoparticle \n\nvolume per length hp = φh one obtains the following evolution equation: \n\n(cid:20) (cid:21) \n\nδF \nδh \n∂t(φh) = ∇ · φQc∇ \n+ ∇ · [D(φ)h∇φ] , (9) \n\nwhere the particle concentration dependent diffusion coefficient D(φ) is related to the viscosity by \n\nthe Einstein relation D(φ) = kT /6πRη(φ), where R is the radius of the nanoparticles [96]. \n\nWe illustrate results obtained employing this thin film theory using the single example of a re- \n\nceding dewetting front for a partially wetting film. We use the disjoining pressure and material \n\nconstants for the liquid considered in Ref. [57], where the evaporative and convective dewetting \n\nof a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The \n\nexpression that we employ for the local free energy term in Eq. (2) is: \n\n(cid:18) d0 − h \nl0 \n\n(cid:19) \nSLW d2 \n0 \nf (h) = \nh2 + SP exp \n, (10) \n\nwhere the parameters characterising the interaction between the liquid film and the surface are \n\nthe apolar and polar spreading coefficients SLW and SP , respectively, the Debye length l0 and the \n\nBorn repulsion length d0 [57]. The resulting disjoining pressure Π = −∂hf (h) allows for a stable \n\nprecursor film (thickness hprecursor) and also has a second (larger) thickness (h0) that corresponds \n\nto a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of \n\nfilm and drop states for similar disjoining pressures. Our results are calculated for a system where \n\nthe profiles only vary in one Cartesian direction (x), corresponding to a straight dewetting front. \n\nHowever, our results may also be interpreted as applying to a circular flat drop whose front remains \n\n19", + "page_start": 18, + "page_end": 18, + "source_file": "1001.2669.pdf" + }, + { + "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", + "page_start": 30, + "page_end": 30, + "source_file": "1001.2669.pdf" + }, + { + "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Similarly considering the following perturbation on y- \n\nlinks, λ Hperturbation = λ[Sj1 \n− \n· \nSj4)]. Following similar procedures we get the second \norder perturbation from this term \n\n(Sk3 Sk4) + r Sk1 (Sj3 \n− · \n\nIn this Appendix we derive the second order pertur- \nbations of inter-cluster Heisenberg and spin-chirality in- \nteractions. The results can then be used to construct \n(16). \nλ2 \n6Jcluster h \n+ 2r \n\n9 + 9r2 \n8 − \n\nPjk[Sj1 \n(Sj3 \n\nSj4)][Sk1 \n− \nSk4 + r2 Sj3 \n\n(Sk3 Sk4)] \nPjk \n\n· \nPjk(Sk3 \n· \n9 + 9r2 \n8 \nPjk(Sk3 \n\n· \n\n− \nPjki \n(3/2) Sj4) \n− \n\n· \nj τ y \n\n· \n\nλ2 \n6Jcluster h \n(3/2) \n\n+ 2r (3/4)τ y = \nk \n− \n\nSk4 + r2 Sj3 Sj4) \nPjki \n\nFirst consider the perturbation λ Hperturbation = λ[Sj1 \n· \nSk1 + r(Sj2 \nSk2)], where r is a real number to be tuned \nlater. Due to the fact mentioned in Subsection IV B, \nthe action of Hperturbation on any cluster singlet state \nwill produce a state with total spin-1 for both cluster j \nand k. Thus the first order perturbation in (15) van- \nishes. And the second order perturbation term can be \nHcluster j − \n− Pjk)[0 \ngreatly simplified: operator (1 \nHcluster k]−1(1 \n− Pjk) can be replaced by a c-number \n2Jcluster)−1. Therefore the perturbation up to second \n( \n− \norder is \n\n− \nSo we can choose \nthe last intra-cluster Sk3 \nfirst order perturbation. \n· \n(r λ2)/(4Jcluster) = \nSk4 + r2 Sj3 \n\n· \n\nJy, and include \nSj4 term in the \n− \n− \n· · \n\nTherefore we can choose the following perturbation on \ny-links (not unique), \n\nλy Hperturbation, y \n\nSk1 + sgn(Jy) \nSj4 + Sk3 (Sj3 \nSk4) · \n(Sj3 \n· \n· − | \n\n· \nJy| · | \n\nλ2 \n\n2Jcluster Pjk(Hperturbation)2 \nThis is true for other perturbations considered later in \nthis Appendix. The cluster j and cluster k parts can be \nseparated, this term then becomes (a, b = x, y, z), \n\nPjk − \n\n=λy[Sj1 \nJy| \nJcluster, r = sgn(Jy) is the sign of Jy. \n4 \nwith λy = \np \nj τ z \nThe τ z \nk term is again more difficult to get. We use \nthe representation of τ z by spin-chirality (6). And con- \nsider the following perturbation \n\n(cid:2)PjSa \n2Jcluster X \na,b \nj2Pj · PkSa \nj1Sb \nPjSa \nj2Pj · PkSa \nj2Sb \nPjSa \njℓSb \nPjSa \nPj(Sjℓ · \nThen use the fact that \nSjm) \nPj by spin rotation symmetry, the perturbation be- \ncomes \n\nj1Pj · PkSa \nk1Sb \nk2Sb \n\nk1Pk − \n\nHperturbation = Sj2 (Sj3 Sj4) + r Sk2 (Sj3 Sj4) \n· · × \n\n+ 2r \n+ r2 \n\nk2Pk \nk2Pk(cid:3) \njmPj = δab(1/3) \nλ2 \n· \n\nλ2 \n6Jcluster h \nλ2 \n6Jcluster h 9 + 9r2 \n16 \n9 + 9r2 \n16 \n\n+ 2r \n\nPjk(Sj1 \nj τ x \n\nSj2)(Sk1 Sk2) \n· · \n\n+ (r/2)τ x r/2 \nk − \n\nr \nPjk(Sj1 \nSj2 + Sk1 Sk2) \nPjki. − · · \n\n(r λ2)/(12Jcluster) = \nSj2 + Sk1 \nSo we can choose \nthe last intra-cluster Sj1 \norder perturbation. \nJx, and include \nSk2 term in the first \n− − \n· · \n\n× \nThe first order term in (15) vanishes due to the same \nreason as before. There are four terms in the second \norder perturbation. The first one is \nPjkSj2 \n[0 \n− \n− Pjk)Sj2 \n(1 \n\n(Sk3 \n× \nHcluster j − \nSk4)(1 \n− Pjk) \nHcluster k]−1 \nSk4) \n× \n× \n(Sk3 \nPjk \n\n· \nFor the cluster j part we can use the same arguments \nas before, the Hcluster j can be replaced by a c-number \nJcluster. For the cluster k part, consider the fact that \nSk4], \nSk3 \nthe action of Sk3 \nSk4 on physical singlet states of k will \nalso only produce spin-1 state. So we can replace the \nHcluster k in the denominator by a c-number Jcluster as \nwell. Use spin rotation symmetry to separate the j and \nk parts, this term simplifies to \n\n× \nPjki − \n\n= \n− \n\nλ2 \nThe perturbation on x-links is then (not unique), \nSj2 \nPj · Pk(Sk3 \nSk4) (Sk3 Sk4) \nPk. · × · × \nSk2)] \n· \n\nλx Hperturbation, x =λx[Sj1 \n\nSk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2) \n· \nJx(Sj1 \n− · · \n\n12 \np \n\nj τ x \n\n6Jcluster PjSj2 \nUse (S)2 = 3/4 and \n\n− \n\n(Sk3 \n\nSk4) \n× \nk3Sb \n(Sa (Sk3 \nk3Sb Sk4) \nk3Sb \nSa · \nk4Sa \n× \nk4 −", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0266.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", + "target_page": 16, + "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, \n\nThe Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "partners \n\n\n\n**“P**artnering” is a popular business buzzword that may \n\nvanish as quickly as it appeared. The Hartford’s partner- \n\nships, on the other hand, are built for the long term and \n\nhave played a major role in the company’s growth and \n\nsuccess. \n\nThe company enjoys outstanding partnerships \n\nwith several of the world’s top asset managers. It also \n\nvalues its thousands of relationships with financial \n\nintermediaries such as large broker-dealers, banks and \n\nindependent financial planners—and with affinity part- \n\nners who extend The Hartford’s reach into large, grow- \n\ning markets. \n\n“A lot of people talk about having the right part- \n\nners, but The Hartford views it differently from most,” \n\nsays Gary Trippe, CEO of Fort Myers, Fla., property- \n\ncasualty agency Oswald, Trippe and Company, Inc. \n\n“They look for partners who share their core values, \n\nand the relationship is based on trust and respect. It’s \n\nall about compatibility.” Trippe should know. His \n\nagency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "(cid:5) T**he Hartford’s acquisition of Fortis**\n**Financial Group in 2001 enhanced**\n**the company’s market share and**\n**distribution advantage. Most impor-**\n**tantly, the acquisition brought into**\n**The Hartford’s family powerful sales**\n**professionals like Allen Chinoy of**\n**Darien, Ill., left, the nation’s fifth-**\n**leading producer of The Hartford’s**\n**variable universal life insurance.**\n**Chinoy is a vocal supporter of**\n**Hartford Investor, which makes it**\n**easier for him to show customers**\n**such as Dr. Dilip Patel how his**\n**portfolio is performing.**\n\n(cid:3) J**oe Smith, right, and Kim Connolly,**\n**left, are a brother-sister team**\n**heading Smith Brothers Insurance,**\n\n**Inc. of Glastonbury, Conn. These**\n**VIP agents are enthusiastic users**\n**of The Hartford’s Electronic**\n**Business Center (EBC) and other**\n**technological tools for property-**\n**casualty agents. They piloted**\n**the EBC and have given valuable**\n**feedback to Senior Commercial**\n**Underwriter Tracey Kamenash**\n**and others at The Hartford to help**\n**develop the EBC standards and**\n**navigational model.**", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "technology \n\nIn short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far \n\n**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "(cid:3) K**wadwo Dankyi-Ampadu, service**\n**representative, personal lines,**\n**takes customer phone calls in**\n**The Hartford’s Southington, Conn.,**\n**customer call center. It’s one of**\n**three AARP call centers throughout**\n**the United States.**\n\n(cid:2) B**usiness Technology Solutions**\n**Manager Mike Conery and**\n\n**tools into their sales strategies.**\n**BTSMs work out of 14 regional**\n**offices throughout the country,** **Automation Trainer Brenda**\n**advising agents on the best way** **Fischer, left, help agents such as**\n**to use tools such as the Electronic** **Bonnie Piazza, commercial select**\n**Business Center and InterComm** **accounts manager at Webster**\n**On the Net (ICON), a Web-based** **Insurance in Hartford, Conn., inte-**\n**automated quoting system.** **grate The Hartford’s technological**\n\nthe", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed \n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November. \n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with \n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to \n\nits 35 million members. Our small-business property-casualty operation continues to \n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001. \n\nWe’re also in a leading position to take advantage of demographic shifts and to provide \n\nestate planning and investment and insurance products to baby boomers. We are very excited, \n\ntoo, about our new SMART 529™ college savings program, which offers flexible features and \n\nnumerous tax advantages. And the growing small-business market segment is a key target for \n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and \n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever. \n\nAs our markets continue to grow and evolve, we stay intensely focused on the key \n\nstrategies in all our businesses. \n\n**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the \n\n\n \n \n \n \n [html]\n
A Marsh, Inc. is a major distributor of The Hartford ' s group benefits plans for mid - sized basinessMarsh ' s employee benefits practice. The team includes, left to risht, Senjor Vice Presidents* In 2001, The Hartford introduced a new category of commercial cererase called GyberflexC *Cameron Harris, president of Cameron M. Harris & Company, second from right.
a key growth area for The HartfordKerry King, Robert Lustberg, Maria Meshdesigned to protect small andCyberFlex ’ s benefits to Todd W.
atemptic and parameters without parameters ative, third from right, and RevinEric Jacobson. Szott, who isnurse - basiness risks such as e - maiiCharlotte property developer
Szott, group sales representative,legally blind, also works withviruses and Web site businessand a 13 - year customer of
far right, work in partnershipThe Hartford ' s Team Ability, ainterruption. Deirdre Barbee,The Hartford. Product innova -
with senior executives fromgroup of company - sponsoredThe Hartford ' s middle markettions such as CyberFlex allow
athletes with disabilities.manager in Charlotte, N. C., MikeThe Hartford to provide risk -Lesniak, Charlotte regional vice
management solutions for customatics, basis, basis, basis, non - solutions
", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Intermediary Service Award and the first-ever Life \n\nInsurance Service Award. The triple win reflected the \n\noverall excellence of The Hartford’s service, a natural \n\ncomplement to the company’s quality products. DAL- \n\nBAR also recognized The Hartford’s mutual funds as the \n\nindustry leader in several categories, including invest- \n\nment management. \n\nIn managing its product portfolio, The Hartford fol- \n\nlows its own advice: think ahead and diversify. The com- \n\npany’s earnings base derives from a variety of \n\nbusinesses. Diversification is a key element in managing \n\nrisk and ensuring profitability—a time-tested philosophy \n\nthat held especially true in 2001, as the company’s other \n\nbusinesses evolved to anticipate changing market \n\ndemands and to offer protection from new risks. \n\n\n \n \n \n \n [html]\n
The property - casualty Business Insurance group, for example, extended its coverage to inslude commonrisks associated with e - commerce. Hartford Financial
Products ’ ( HFP ) coverage continued to meet emergingrisks in an extremely volatile business environment.
\n\nThe Hartford helped customers manage risk by \n\ndeveloping a new category of commercial coverage \n\ncalled CyberFlex.TM This targets the previously unmet \n\nneeds of small and mid-sized businesses that are inte- \n\ngrating the Internet and other communications tools \n\ninto their regular operations. \n\nA 2001 survey by The Hartford revealed that 80 \n\npercent of small and mid-sized businesses weren’t sure \n\nif their current insurance policies covered specific—and \n\nincreasingly common—risks such as e-mail viruses, \n\nWeb site business interruption and online copyright \n\ninfringement. CyberFlex coverage protects middle-mar- \n\nket and small-business policyholders against the risk of \n\nthose potentially debilitating conditions. \n\nCyberFlex is part of a broad array of industry- \n\nspecific coverages in The Hartford’s SPECTRUM ® busi- \n\nness-owner’s policy, including protection against \n\nemployment practices liability, equipment breakdown \n\nand business interruption. As the economic environ- \n\nment changes rapidly, The Hartford thinks ahead by \n\nproviding those flexible coverages. And the company’s", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**\n\nour proven approach to asset management despite the stock market’s vagaries. It means \n\ngrowing our business profitably, maintaining financial discipline, controlling expenses and \n\nproviding extraordinary service to distributors and customers. \n\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive \n\nDALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service \n\nAward and the first-ever Life Insurance Service Award. \n\nAs you’ll read throughout this report, service means very specific—and very impor- \n\ntant—things to us. We strive to forge strong partnerships with our distributors and provide \n\nthem with technological tools and outstanding products to enhance their selling efforts. \n\nThese are some of the underpinnings to our solid 2001 results. \n\nDespite the challenges I’ve mentioned, our revenues for 2001 rose 3 percent to $15.1 \n\n\n \n \n \n \n [html]\n
billion. Total assets under management rose 8 percent to $ 198 billion. Operating income rose
7 percent to $ 1.034 billion, or $ 4.28 per diluted share, excluding the $ 440 million impact of
Sept. 11 ( after tax and net of reinsurance ) and a $ 130 million tax benefit in our life operations.
The results attest to the resilience of our enterprise. With our strong and balanced
portfolia of businesses, we consistently demonstrate superior financial performance. Since
1995, we ve produced 13 percent annualized operating earnings - per - share growth, excluding
the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets
under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on
", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "How many licensed intermediaries did Hartford group have in 2001 ?", + "target_page": 23, + "target_passage": "More than 153,000 licensed intermediaries", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "(cid:5) T**he Hartford’s acquisition of Fortis**\n**Financial Group in 2001 enhanced**\n**the company’s market share and**\n**distribution advantage. Most impor-**\n**tantly, the acquisition brought into**\n**The Hartford’s family powerful sales**\n**professionals like Allen Chinoy of**\n**Darien, Ill., left, the nation’s fifth-**\n**leading producer of The Hartford’s**\n**variable universal life insurance.**\n**Chinoy is a vocal supporter of**\n**Hartford Investor, which makes it**\n**easier for him to show customers**\n**such as Dr. Dilip Patel how his**\n**portfolio is performing.**\n\n(cid:3) J**oe Smith, right, and Kim Connolly,**\n**left, are a brother-sister team**\n**heading Smith Brothers Insurance,**\n\n**Inc. of Glastonbury, Conn. These**\n**VIP agents are enthusiastic users**\n**of The Hartford’s Electronic**\n**Business Center (EBC) and other**\n**technological tools for property-**\n**casualty agents. They piloted**\n**the EBC and have given valuable**\n**feedback to Senior Commercial**\n**Underwriter Tracey Kamenash**\n**and others at The Hartford to help**\n**develop the EBC standards and**\n**navigational model.**", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Intermediary Service Award and the first-ever Life \n\nInsurance Service Award. The triple win reflected the \n\noverall excellence of The Hartford’s service, a natural \n\ncomplement to the company’s quality products. DAL- \n\nBAR also recognized The Hartford’s mutual funds as the \n\nindustry leader in several categories, including invest- \n\nment management. \n\nIn managing its product portfolio, The Hartford fol- \n\nlows its own advice: think ahead and diversify. The com- \n\npany’s earnings base derives from a variety of \n\nbusinesses. Diversification is a key element in managing \n\nrisk and ensuring profitability—a time-tested philosophy \n\nthat held especially true in 2001, as the company’s other \n\nbusinesses evolved to anticipate changing market \n\ndemands and to offer protection from new risks. \n\n\n \n \n \n \n [html]\n
The property - casualty Business Insurance group, for example, extended its coverage to inslude commonrisks associated with e - commerce. Hartford Financial
Products ’ ( HFP ) coverage continued to meet emergingrisks in an extremely volatile business environment.
\n\nThe Hartford helped customers manage risk by \n\ndeveloping a new category of commercial coverage \n\ncalled CyberFlex.TM This targets the previously unmet \n\nneeds of small and mid-sized businesses that are inte- \n\ngrating the Internet and other communications tools \n\ninto their regular operations. \n\nA 2001 survey by The Hartford revealed that 80 \n\npercent of small and mid-sized businesses weren’t sure \n\nif their current insurance policies covered specific—and \n\nincreasingly common—risks such as e-mail viruses, \n\nWeb site business interruption and online copyright \n\ninfringement. CyberFlex coverage protects middle-mar- \n\nket and small-business policyholders against the risk of \n\nthose potentially debilitating conditions. \n\nCyberFlex is part of a broad array of industry- \n\nspecific coverages in The Hartford’s SPECTRUM ® busi- \n\nness-owner’s policy, including protection against \n\nemployment practices liability, equipment breakdown \n\nand business interruption. As the economic environ- \n\nment changes rapidly, The Hartford thinks ahead by \n\nproviding those flexible coverages. And the company’s", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "technology \n\nIn short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far \n\n**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, \n\nThe Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**\n\nour proven approach to asset management despite the stock market’s vagaries. It means \n\ngrowing our business profitably, maintaining financial discipline, controlling expenses and \n\nproviding extraordinary service to distributors and customers. \n\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive \n\nDALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service \n\nAward and the first-ever Life Insurance Service Award. \n\nAs you’ll read throughout this report, service means very specific—and very impor- \n\ntant—things to us. We strive to forge strong partnerships with our distributors and provide \n\nthem with technological tools and outstanding products to enhance their selling efforts. \n\nThese are some of the underpinnings to our solid 2001 results. \n\nDespite the challenges I’ve mentioned, our revenues for 2001 rose 3 percent to $15.1 \n\n\n \n \n \n \n [html]\n
billion. Total assets under management rose 8 percent to $ 198 billion. Operating income rose
7 percent to $ 1.034 billion, or $ 4.28 per diluted share, excluding the $ 440 million impact of
Sept. 11 ( after tax and net of reinsurance ) and a $ 130 million tax benefit in our life operations.
The results attest to the resilience of our enterprise. With our strong and balanced
portfolia of businesses, we consistently demonstrate superior financial performance. Since
1995, we ve produced 13 percent annualized operating earnings - per - share growth, excluding
the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets
under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on
", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "people \n\n**T**he worst of 2001 brought out the best in The \n\nHartford’s people. \n\nAs the world watched the horrors of Sept. 11, \n\nsome 330 of our New York employees fled their offices \n\nin 7 World Trade Center. Though many were caught in \n\nthe debris and dust from the nearby Twin Towers, all \n\nescaped safely. \n\nBy the time the 47-story 7 World Trade Center \n\nbuilding collapsed at about 5:20 p.m., The Hartford had \n\nalready arranged for temporary space in several of the \n\ncompany’s other offices. Employees and suppliers \n\nimmediately began working around the clock to get \n\nthe business up and running again. Despite the \n\ndestruction, back-up systems kept distributors’ and \n\ncustomers’ data secure. \n\nA hundred miles from Ground Zero, home office \n\nemployees in Hartford, Conn., began shuttling equip- \n\nment and supplies to our temporary offices. Some \n\nbooked Long Island Sound ferries from Connecticut to \n\nLong Island within 48 hours of the attack. Others spent \n\nthe weekend driving supplies to the new locations so \n\nemployees could concentrate on customers instead of \n\non finding pens and paper. Employees and suppliers \n\nwere determined to get the company, its distributors \n\nand its customers through the crisis. \n\nBy Monday, Sept. 17, all of The Hartford’s business \n\nunits in New York were serving customers again. \n\nEmployees had new furniture, phones, servers and PCs. \n\nDistributors’ and customers’ access to company e-mail \n\nwas never interrupted. Calls to old phone numbers were \n\nrerouted to cell phones or new office phones. Print and \n\nradio ads—along with The Hartford’s Web site— \n\ngave customers instructions for filing claims quickly. \n\nCustomer relationships were stronger than ever. The \n\nHartford Experience—customer solutions, ease of doing \n\nbusiness and extraordinary service—was never better \n\ndemonstrated.", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "The EBC saves hours of administrative time, allowing \n\nagents to sell commercial insurance products much \n\nmore profitably. \n\nThe EBC also came into its own as a decision-sup- \n\nport tool in 2001. Among other new features, its scoring \n\ntool evaluates potential small-business customers \n\nbased on factors such as the number of employees and \n\nthe size and type of the business. The score helps identi- \n\nfy businesses The Hartford is likely to accept and mini- \n\nmizes the complexity of agents’ decisions. \n\nTechnology introduced in 2001 also enhanced \n\ncustomers’ interaction with our personal lines opera- \n\ntion. Computer-telephony integration (CTI) at call cen- \n\nters immediately directs calls to the right customer \n\nservice representative based on whether the caller is an \n\nauto or homeowner’s policyholder. CTI also automati- \n\ncally calls up the customer’s record on the customer \n\nservice representative’s screen so service is faster and \n\ndoing business is easier—the embodiment of The \n\nHartford Experience. \n\nmore incentive to look to The Hartford for the right \n\nproducts to offer their clients. \n\nThe Hartford’s Group Benefits Division’s (GBD) \n\nProducer View Web portal enables group benefits bro- \n\nkers to manage their books of business and track com- \n\nmissions and premium payments online. It’s also a \n\nresource for product brochures and other marketing \n\nmaterial. GBD’s Employer View portal meets benefits \n\nmanagers’ increasing demands for self-service. In 2001 \n\nGBD added online billing capability to the portal, which \n\nalso features access to forms and status reports on pre- \n\nmium payments and claims, among other functions. \n\nThe property-casualty operation’s Electronic \n\nBusiness Center (EBC) has transformed the way agents \n\ndo business. They can obtain quotes almost instantly, \n\ncheck billing and loss information, track claims pay- \n\nments and perform a host of other daily tasks. Because \n\nit’s their virtual back office, agents have more time to \n\ndo what’s right for them: build their business. The EBC \n\nis proving especially valuable in the high-growth small- \n\nbusiness market, where service is as important as price.", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "products & services \n\n\n\nThe ability to deliver that kind of performance \n\ncan be traced to our money managers—Wellington \n\nManagement Co., American Funds, Franklin Templeton \n\nInvestments, MFS Investment Management, AIM \n\nFunds Management, Inc., Putnam Investment \n\nManagement and The Hartford’s own Hartford \n\nInvestment Management Co. \n\nAll of The Hartford’s money managers have years \n\nof experience and are among the most respected firms \n\nin the industry. Their experience and expertise were \n\nespecially important during the market volatility we \n\nsaw in 2001. They always stay focused on long-term \n\nperformance, which is the true measuring stick of The \n\nHartford’s value to its customers. \n\nBesides outstanding products and excellent man- \n\nagement, great service is a critical component in deliv- \n\nering the right solutions to our customers. In 2001, \n\nThe Hartford won an unprecedented sixth consecutive \n\nDALBAR Annuity Service Award, as well as the \n\n**H**ow do you secure the future when the present is \n\npuzzling enough? It’s a big challenge, and The Hartford’s \n\nprimary objective. Everything we do is designed to help \n\nour customers deal with the uncertainties that lie ahead. \n\nThe Hartford believes the best way to secure the \n\nfuture is to provide customers with the right products, \n\nand then back those products with outstanding per- \n\nformance and great service. Staying focused on this \n\nobjective was never more important—or more chal- \n\nlenging—than in 2001. \n\nTrue to form, The Hartford’s life operations’ annu- \n\nities and mutual funds delivered high-quality perform- \n\nance in a time of market turmoil. Despite an anemic stock \n\nmarket, 87 percent of the funds in The Hartford’s Director \n\nvariable annuity remained in the first or second quartile \n\nof three-year returns within the Lipper Peer Group in \n\n2001. Sixty-four percent of the funds in the Leaders suite \n\nof annuities and 91 percent of The Hartford’s mutual \n\nfunds remained in the first or second quartile over the \n\nthree-year period.", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed \n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November. \n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with \n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to \n\nits 35 million members. Our small-business property-casualty operation continues to \n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001. \n\nWe’re also in a leading position to take advantage of demographic shifts and to provide \n\nestate planning and investment and insurance products to baby boomers. We are very excited, \n\ntoo, about our new SMART 529™ college savings program, which offers flexible features and \n\nnumerous tax advantages. And the growing small-business market segment is a key target for \n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and \n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever. \n\nAs our markets continue to grow and evolve, we stay intensely focused on the key \n\nstrategies in all our businesses. \n\n**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", + "target_page": 38, + "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**\n\nour proven approach to asset management despite the stock market’s vagaries. It means \n\ngrowing our business profitably, maintaining financial discipline, controlling expenses and \n\nproviding extraordinary service to distributors and customers. \n\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive \n\nDALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service \n\nAward and the first-ever Life Insurance Service Award. \n\nAs you’ll read throughout this report, service means very specific—and very impor- \n\ntant—things to us. We strive to forge strong partnerships with our distributors and provide \n\nthem with technological tools and outstanding products to enhance their selling efforts. \n\nThese are some of the underpinnings to our solid 2001 results. \n\nDespite the challenges I’ve mentioned, our revenues for 2001 rose 3 percent to $15.1 \n\n\n \n \n \n \n [html]\n
billion. Total assets under management rose 8 percent to $ 198 billion. Operating income rose
7 percent to $ 1.034 billion, or $ 4.28 per diluted share, excluding the $ 440 million impact of
Sept. 11 ( after tax and net of reinsurance ) and a $ 130 million tax benefit in our life operations.
The results attest to the resilience of our enterprise. With our strong and balanced
portfolia of businesses, we consistently demonstrate superior financial performance. Since
1995, we ve produced 13 percent annualized operating earnings - per - share growth, excluding
the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets
under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on
", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "YEAR ENDED DECEMBER 31, \n2003 2002 2001 \n\n914 $ 1,081 $ 1,520 \n\n32 (44) 188 \n\n946 1,037 1,708 \n\n912 327 74 \n\n21 39 21 \n\n933 366 95 \n\n$ 1,879 $ 1,403 $ 1,803 \n\n\n \n \n \n \n [html]\n
D EFERRE D TAX ASSETS :
Patents and goodwill$654$1.041
Benefit plans492639
Inventories374342
Tax credits169451
Other3960
Total deferred tax assets$1.728$2.555
DEFERRED TAX LUABILUTIES :
Property, plant and equipment$3.838$3.253
Pensions626362
Other15
Total deferred tax liabilities$4.464$3.630
Net deferred tax liability$2.736$1.097
", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Southlake \n\nMain Office \n3205 E. Highway 114 \nSouthlake, Texas 76092 \n*Chartered 1985*\nBranches \n95 Trophy Club Drive \nTrophy Club, Texas 76262 \n891 E. Keller Parkway \nSuite 100 \nKeller, Texas 76248 \n\nSenior Officers \nPerry D. Elliott \n*Chairman of the Board*\nMark L. Jones \n*President and Chief Executive Of��cer*\nF. Mills Shallene \n*Senior Vice President*\nJ. Sean Shope \n*Senior Vice President*\nMichele P. Stevens \n*Senior Vice President and Cashier*\n\nJack Dortch \n*Jack Dortch Insurance Agency*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDerrell Johnson \n*President, American Council of Engineering*\n*Companies Life Health Trust*\nMark L. Jones \n*President and Chief Executive Officer*\nK. Wayne Lee \n*President, DDFW Properties*\nRobert S. Mundlin \n*Owner, Lifetime Benefits Insurance*\nJim Ridenour \n*President, Sunbelt Station Service*\n\nDirectors \nPerry D. Elliott \n*Chairman of the Board*\nJames E. Burger \n*Burger Construction*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 67.750$ 65.554
Loans45.13242.366
< underline > Deposits 61.53259.672
Equity6.2955.845
Net Income412652
Return on Average Assets0.62 %1.07 %
Return on Average Equity6.7410.97
", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "(cid:2) T**he Hartford claims adjusters**\n**arrived in lower Manhattan within**\n**days after the Sept. 11 attack to**\n**fulfill obligations to policyholders**\n**who suffered losses. Senior**\n**Property General Adjuster Ray**\n**extensive damage.** **Davidson wrote a check on the**\n**spot for $250,000 to Wheelhouse**\n\n\n \n \n \n \n [html]\n
Speciesteam of The Hartford ' s home officeservices, enterorise technologies
ery efforts.employees set up shop in a con -services ; Mark Gauvain, assistant
s.- based soft -ference room to organize somevice president, property - casualty
a downtown150 employees, who deliverede - business ; Tony Abate, vice presi -
t sufferedsupplies and equipment by cardent, IT acquisitions ; Franca Lewis,
and ferry to get temporary Newussistant director, informationYork - area offices up and running
technology ; and Patrice Chandler,within a week. Left to right,assistant procurement administration -
\n\n**manager, corporate real estate;**\n\nthe", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Garth Merrick \n*President and Chief Executive Officer,*\n*Merrick Petfoods, Inc.*\nAllen Parson \n*Restaurateur and Investments*\nJerry Stevens \n*Vice President and General Manager,*\n*Stevens 5-Star Car and Truck Center*\nJohnny Trotter \n*Ranching, Farming and Cattle Feeding*\nRoger Williams \n*Farming*\n\nHereford State Bank \n\nOffice \n212 E. Third Street \nHereford, Texas 79045 \n*Chartered 1947*\n\nDirectors \nCraig Smith \n*Chairman of the Board*\nJoe Artho \n*Retired General Manager, Hereford Grain Corp.*\nTerry Bromlow \n*Executive Vice President*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nTerry Langehennig \n*Cowsert, Line and Langehennig, Attorneys*\nSteve Lewis, D.V.M. \n*Manager and Senior Partner,*\n*Hereford Veterinary Clinic*\nMike Mauldin \n*President and Chief Executive Officer*\nSenior Officers \nCraig Smith \n*Chairman of the Board*\nMike Mauldin \n*President and Chief Executive Officer*\nTerry Bromlow \n*Executive Vice President*\nSteve Gilbert \n*Senior Vice President and Cashier*\nJeff Brown \n*Senior Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 80.976$ 84.246
Loans38.38346.261
Deposits71.92670.546
Equity8.5298.120
Net Income1.2051.277
Return on Average Assets1.48 %1.57 %
Return on Average Equity14.4115.64
", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, \n\nThe Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Current — federal.........................................................................................................................................................................................$200.419$ 68.760
$ 50.352Deferred — federal........................................................................................................................................................................................( 9.155 )40.142
111.981Provision for federal income taxes................191.264108.902
162.333Current — state...........................................................................................................................................................................................2.8515.167
6.169Deferred — state..........................................................................................................................................................................................11.420( 682 )
( 51 )Provision for state income taxes...................14.2714.485
6.118Current — foreign.........................................................................................................................................................................................424
Deferred — foreign........................................................................................................................................................................................
Provision for foreign income taxes................424
S205.959
", + "page_start": 68, + "page_end": 68, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "[html]For the year ended December 31.2003FirstSecondThirdFourthTotalRevenues$24.947$24.844$ 27.582$ 28.488$ 105.861Operating income4.1502.4024.9767.10018.628Income fromContinuing operations1.9311.0442.7174.0699.761Income from discontinued operations, net of taxes22.628-( 23 )( 216 )22.389Cumulative effect of change in accounting( 76 )-1.1.( 76 )Net income ( a )$24.483$1.044$2.694$3.853$ 32.074Income ( loss ) per share –Continuing operations - diluted$0.26$0.14$0.36$0.53$1.28Discontinued operations - diluted2.98--( 0.03 )2.94Cumulative effect of change in accounting — diluted( 0.01 )---( 0.01 )Net income per share – basic$3.24$0.14$0.36$0.51$4.23Net income per share - diluted3.230.140.350.504.22For the year ended December 31.2002FirstSecondThirdFourthTotalRevenues$ 20.697$ 22.186$ 24.631$ 25.460$92.974Operating income2.3162.6172.3712.0349.338Income ( loss ) fromContinuing operations370( 3.984 )383338( 2.893 )Income from Discontinuedoperations, net of taxes1.7861.8701.8411.9157.412Net income ( b )$2.156$ ( 2.114 )$2.224$2.253$4.519Income ( loss ) per share –Continuing operations - dilutedS0.05S( 0.53 )$0.05$0.04$( 0.38 )Discontinued operations - diluted0.240.250.240.250.98Net income per share – basic$0.29$( 0.28 )$0.29$0.30$0.60Net income per share - diluted0.29( 0.28", + "page_start": 39, + "page_end": 39, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nThe estimated fair values, and carrying values at December 31, 2002 and 2001, were as follows: \n\n\n \n \n \n \n [html]2002. 2001\n
CarryingEstimated pCarryingEstimated p
Value.Eair. ValueXalueEair. ValueCash and due from banks
$ 108.436.645$ 108.436.645$ 112.150.214$ 112.150.214Federal funds sold
70.000.00070.000.00072.975.00072.975.000Interest - bearing deposits in banks
2.324.4252.324.4251.374.2851.374.285Investment securities
772.256.413783.668.780721.693.695729.588.999Net loans
952.821.044964.782.729929.528.556938.431.998Accrued interest receivable
15.360.83315.360.83317.636.60817.636.608Deposits with stated maturities
541.031.072544.575.352575.069.375580.467.556Deposits with no stated maturities
1.170.531.1441.170.531.1441.110.093.2231.110.093.223Securities sold under agreements to repurchaseAccrued interest payable
26.708.99426.708.99419.847.06719.847.067Accrued interest payable
\n\nFinancial instruments actively traded in a secondary market have been valued using quoted available market prices. \nFinancial instruments with stated maturities have been valued using a present value discounted cash flow with a \ndiscount rate approximating current market for similar assets and liabilities. Financial instrument assets with \nvariable rates and financial instrument liabilities with no stated maturities have an estimated fair value equal to both \nthe amount payable on demand and the carrying value. Changes in assumptions or estimation methodologies may \nhave a material effect on these estimated fair values. \n\nThe Company’s remaining assets and liabilities, which are not considered financial instruments, have not been \nvalued differently than customary with historical cost accounting. \n\nThere is no material difference between the carrying value and the estimated fair value of the Company’s contractual \noff-balance-sheet unfunded lines of credit, loan commitments and letters of credit which are generally priced at \nmarket at the time of funding. \n\nReasonable comparability between financial institutions may not be likely due to the wide range of permitted \nvaluation techniques and numerous estimates which must be made given the absence of active secondary markets \nfor many of the financial instruments. This lack of uniform valuation methodologies also introduces a greater \ndegree of subjectivity to these estimated fair values. \n\n9. COMMITMENTS AND CONTINGENCIES: \n\nThe Company is engaged in legal actions arising from the normal course of business. In management’s opinion, the \nCompany has adequate legal defenses with respect to these actions, and the resolution of these matters will have no \nmaterial adverse effects upon the results of operations or financial condition of the Company. \n\nThe Company leases a portion of its bank premises and equipment under operating leases. At December 31, 2002, \nfuture minimum lease commitments are not significant.", + "page_start": 83, + "page_end": 83, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", + "target_page": 11, + "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). \n\n\n–0.2 0 \n0.2 \n1.0 \n0.6 \nvulnerability to food insecurity \n0.4 0.8 1.2 1.4 \n\n\n\n\n\n**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "**18**\n\n\n\n\n\n\n\n\n\n\n\n(*b*) TX90p (% time) \n\n35 \n30 \n25 \n20 \n15 \n10 \n5 \n0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nH ad G E M 2-E S \nIPS L-C M 5 A- M R \nM IR O C-E S M -C H E M \n(*d*) RX5day (mm) \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nIPS L-C M 5 A- M R \nH ad G E M 2-E S \nM IR O C-E S M -C H E M \n\n(*a*) TXx (°C) \n\n3.5 \n3.0 \n2.5 \n2.0 \n1.5 \n1.0 \n0.5 \n0 \n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \nIPS L-C M 5 A- M R \nH ad G E M 2-E S \n\nense m ble m ean \nA C C E SS1-0 \nIPS L-C M 5 A-L R \n1.5°C 2°C \n(*c*) CDD (days) \n\n2.0 \n\n0.0 \n\n–2.0 \n\n–4.0 \n\n–6.0 \n\nIPS L-C M 5 A-L R \nG F D L-E S M 2 M \n\nH ad G E M 2-E S \nM IR O C-E S M -C H E M \nIPS L-C M 5 A- M R \n\nA C C E SS1-0 \nense m ble m ean \n\n**Figure 12.**Comparison of global mean changes in climate extremes indices relative to 1981–2010 at 2°C and 1.5°C global \nwarming for individual ensemble members and ensemble mean. (a) Change in annual daily maximum temperature; \n(b) percentage of days with maximum temperature above 90th percentile for 1981–2010; (c) change in consecutive dry days; \n(d) change in annual maximum 5-day rainfall. \n\nFor precipitation, generally similar changes are seen at 1.5°C global warming as at 2°C, but \nsmaller in magnitude (compare figures 16 and 4), suggesting that most of these changes are a \nresponse to radiatively forced climate change as opposed to internal climate variability. However, \nsome localized changes do vary in sign between the GWLs, such as in South Australia, suggesting \na possible dominance of internal variability over the global warming signal in these places. \n\nWhere Rx5day increases, the increases are projected to be larger—in some cases approximately \ndouble—at 2°C global warming than 1.5°C. Where Rx5day decreases, again the decreases are \nprojected to be larger at 2°C global warming than 1.5°C (figure 17). \n\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global \nwarming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would \nsee a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C \n(figures 18 and 19). Conversely, 24% of countries would, by this metric, see the same or higher \nvulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI \nis projected to be lower at 2°C global warming than in the baseline. For example, in Mali the \nensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81 \nat 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming \nlevels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C. \n\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen \nin the baseline, and this number increased to seven at 1.5°C. The same four countries with \n‘unprecedented’ HCVI values at 2°C also saw ‘unprecedented’ values at 1.5°C; these were Oman, \nBangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as \nhaving ‘unprecedented’ values at 1.5°C. The role of internal climate variability in the HCVI \nresults needs to be assessed, as does the effect of potential nonlinear interactions between the \nflood and drought metric. Until the reasons behind these country-specific results are understood,", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed11.pdf" + }, + { + "text": "**12**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \nmm \n10 20 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 5.**Simulated changes in the annual maximum rainfall over 5 days relative to 1981–2010, at 2°C global warming, for \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean. The labels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n2°C, although the geographical variation is still dominated by the non-climatic factors (figure 7). \nTherefore, the ensemble-mean change is a reasonable guide to the results. \n\nThe ensemble mean is higher in nearly all assessed countries relative to the baseline (figure 8). \nThe greatest increase was in Oman, followed by India, Bangladesh and Saudi Arabia, then Brazil \nand a number of its neighbouring countries. Smaller increases in HCVI were seen across Africa. \nSoutheastern Africa showed larger increases than Central Africa. The HCVI decreased in three \ncountries: Mali, Burkino Faso and Sudan. \n\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming, \nwith increases in most assessed countries and generally similar sets of countries experiencing the \nlargest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI \nthan Central Africa, due to increased length of drought events projected in all ensemble members \n(not shown). The length of flood events was not projected to increase in this region. The Sahel \nregion consistently showed one or more countries with a small decrease in the HCVI, although \nthe precise country or countries varied between ensemble members. The decrease in HCVI here \nwas due to projected decreases in length of drought, with length of flood events projected to \nchange little. \n\nIndia is projected to see increased HCVI by all ensemble members, due to a consistent increase \nin length of flood events projected in all members, outweighing the beneficial impact of decreased \nlength of drought which is again projected in all members. \n\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble \nmembers. Although the location of projected longer flood events varies across the country in \ndifferent members, the aggregation of the HCVI to the country level renders this geographical \nvariability irrelevant for such a large country because only the median value across the country \nis used in the HCVI. Some ensemble members project longer drought for Brazil, which again \ncontributed to increased HCVI.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed11.pdf" + }, + { + "text": "**17**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. \n\n**Table 6.**Global mean changes at 1.5°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIROC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )1.21.91.72.01.51.91.7
TX90p (% time )10.015.716.219.214.118.315.6
CDD− 1.20.7− 1.3− 5.40.0− 3.8− 1.6
RX5day ( mm )1.13.64.54.64.04.33.6
drought proxy0.740.48n. a.0.390.160.310.42
flood proxy0.750.73n. a.0.730.790.730.75
Pmean (%)1.40.93.11.33.92.42.2
Rmean (%)2.10.75.40.76.75.03.9
Rlow (%)− 3.40.35.92.25.94.92.6
\n\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15–20% or \nmore. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater \nincreases in the tropics than mid-latitudes (electronic supplementary material).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. \n\nand 75%, especially in the Iberian Peninsula. Southern Africa also sees a decrease in low flows \nwhere changes in mean flows were small. Changes in high run-off show similar patterns and \nmagnitudes to those in mean run-off. \n\nThe simulated changes in both mean and low run-off flows show substantial differences \namong the six simulations (figures 10 and 11). In most basins examined here, the range of \noutcomes include both increases and decreases in mean and low flows for any particular basin, \nbut generally with the largest proportion simulating increases in both mean and low flows. In a \nfew cases, notably the Lena in northeast Asia and Ganges in southeast Asia, the ensemble agreed \nentirely or almost entirely on increased flows. Even here, the range of outcomes is large, with the \nprojected flow increases in the Ganges for 2°C global warming ranging from approximately 30% \nto more than 110%. \n\nExceptions to the general picture of consensus on increasing flows are seen in the Amazon, \nOrange, Danube and Guadiana basins where the range of projected extends more towards \ndecreased mean flows. Mean flows in the Amazon are projected to decline by up to 25% for 2°C \nglobal warming. For low flows, the ensemble of projections entirely gives decreased flows at 2°C \nglobal warming for these basins. \n\nThe signal of decreased flows was stronger for low flows than mean flows, and indeed in the \nNiger, the range of mean flow changes extended more towards increases whereas the range of \nlow flow changes extended more towards decreases. \n\n(b) Impacts at 1.5°C global warming compared to 2°C \n\nFor almost all quantities and simulations examined here, global-scale changes in extremes and \nrun-off at 1.5°C global warming (table 6) are smaller than those compared to 2°C (table 5; \nfigures 12 and 13). The exceptions to these are mean and low run-off which each show one \ninstance of a smaller change at 2°C than 1.5°C, but still with a majority of simulations showing \nlarger changes at 2°C (figure 13). For temperature-related indices, the ranges of change at the two \nGWLs do not overlap—the change at 2°C in all members is larger than the change at 1.5°C in", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "**11**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \ndays \n10 20 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 4.**Simulated changes in the number of consecutive dry days relative to 1981–2010, at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 5.**Global mean changes at 2°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIRC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )2.12.82.52.92.42.82.6
TX90p (% time )20.124.324.929.023.527.925.0
CDD− 3.00.9− 3.4− 5.7− 2.0− 5.5− 2.9
RX5day ( mm )3.55.46.96.86.06.75.9
drought proxy0.760.89n. a.0.380.380.660.61
flood proxy0.830.82n. a.0.750.730.780.78
Pmean (%)2.13.45.03.05.32.94.0
Rmean (%)2.46.58.14.48.64.95.8
Rlow (%)− 2.03.811.28.09.45.15.9
\n\nareas are projected to see an increase in flood event lengths of 4 days or more, particularly India \nand Bangladesh, for which such increases are projected in all ensemble members to some extent. \nIncreases of 2–4 days are also projected in parts of Brazil by all ensemble members, although \nthe magnitude and location within the country varied between members. Similar increases are \nprojected in the region of the Horn of Africa and southern Arabian Peninsula in several members. \nThe HCVI calculated for 2°C global warming showed very large geographical variability \n(figure 7) which relates largely to differences in socio-economic factors [22]. Differences in the \nclimate change simulated in different ensemble members leads to some variation in the HCVI at", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this \nresult illustrates the important point that the nature and patterns of the climate forcing at a \nparticular level of global warming can play an important role in determining the patterns of \nregional impacts. \n\n**25**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n5. Conclusion \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related \nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the \nglobal annual mean. There is a higher degree of spatial variation in our projections compared \nwith CMIP5-based studies. \n\nIn the model projections examined here, changes relating to the water cycle are complex, both \nin their geographical pattern and in the variation between different models. The length of flooding \nevents generally increases across world in all models, but maximum rainfall can either increase or \ndecrease depending on locations. Global patterns of increase and decrease show some consistency \nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly \ntend to increase with global warming in most areas. For global mean changes, even when the sign \nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared \nwith 2°C. However, this does not always hold even at the scale of major global river basins. \n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in \napproximately three-quarters of countries assessed. The vulnerability increase can arise from \nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a \nlimited number of cases. \n\nMost simulations here project a general increase in mean streamflow in most of the basins \nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are \nconsistently projected to increase by 30–110% at 2°C, Amazon flows could either increase by 3% \nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of \nthe magnitude of changes that may be possible, so adaptation planning in particular should not \nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low \nstreamflows also increase in many basins, but not as many as for the mean flows—many basins \nsee decreased low flows in some or all projections. \n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling- \nback the impacts at 2°C, if this is done with individual ensemble members rather than the \nensemble mean. However, this was not always the case for impacts that depend on more complex \nprocess or interactions between more than one climate variable, such as run-off and an indicator \nof vulnerability to food insecurity. \n\nData accessibility. This article has no additional data. \nCompeting interests. We declare we have no competing interests. \nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007– \n2013 under grant agreement no. 603864 (HELIX: \n‘High-End cLimate Impacts and eXtremes’; www. \nhelixclimate.eu). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint \nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101). \nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion, \nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous \nreviewers whose comments substantially improved the paper.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "**2**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nModel Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration \nscenario. To provide more detailed representations of climate processes and impacts, the \nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution \nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface \nmodel to examine the projected changes in weather extremes and their implications for \nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate \nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments. \nDespite some degree of inconsistency between components of the study due to the need to \ncorrect for systematic biases in some aspects, the outcomes from different ensemble members \ncould be compared for several different indicators. The projections for weather extremes \nindices and biophysical impacts quantities support expectations that the magnitude of change \nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with \nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes \nshow more geographical variation with some increases and some decreases in both heavy \nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts \nat local scales due to different climate models producing different outcomes. Nevertheless, \nhydrological impacts generally point towards wetter conditions on average, with increased \nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the \nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global \nwarming. Some areas are projected to experience shorter meteorological drought events and \nless severe low flows, although longer droughts and/or decreases in low flows are projected \nin many other areas, particularly southern Africa and South America. Flows in the Amazon \nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events \nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this \nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76% \nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of \nvulnerability to food insecurity. \n\n1. Introduction \n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future \ntime horizons, e.g. impacts by the middle or end of the twenty-first century [1,2]. However, \nwith international climate policy now largely focused on limiting warming to specific levels of \nglobal mean temperature such as 2°C [3] or 1.5°C [4], policy-relevant climate impacts assessments \nincreasingly need to be framed in terms of such warming levels. \nThere are two major research questions concerning the impacts of climate change at 1.5°C and \n2°C global warming, which are relevant to both mitigation and adaptation policy areas. \n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question \narising from the Paris Agreement [4] and is relevant to mitigation policy, informing \njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and \n‘pursuing efforts to limit the temperature increase to 1.5°C’.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", + "target_page": 12, + "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**14**\n\n\n–1.00 –0.75 –0.50 –0.25 \n\n0 \nchange in vulnerability to food insecurity \n\n0.25 0.50 0.75 1.00 \n\n\n\n\n\n**Figure 8.**Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2°C \nglobal warming, for five individual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, \nand the ensemble mean. \n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher \nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. \nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels \nof vulnerability to food insecurity that are greater than any seen in the present day. For \nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at \n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels \nof vulnerability to food insecurity that are greater than those expected in other countries under \n2°C global warming. This suggests that other factors are already posing greater risk for food \ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk \nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity \narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by \naddressing various socio-economic issues in such counties. \n\nincreased run-off over \napproximately half of the land surface (figure 9) and the majority of the major river basins \nassessed (figure 10), but with large regional uncertainties including the possibility of decreased \nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of \nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing \nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and \nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of \nthe Sahara Desert where the existing very small run-off become even smaller. \n\nThe JULES simulations show a general tendency towards \n\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with \nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low \nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that \nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean \nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the \nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "The HCVI consists of three equally weighted components: exposure to climate-related hazards, \nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity— \na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and \nadaptive capacity components are based on data from the World Bank, World Resources Institute,", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk \n\n\n\nChanges in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 \n\nextremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "**12**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \nmm \n10 20 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 5.**Simulated changes in the annual maximum rainfall over 5 days relative to 1981–2010, at 2°C global warming, for \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean. The labels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n2°C, although the geographical variation is still dominated by the non-climatic factors (figure 7). \nTherefore, the ensemble-mean change is a reasonable guide to the results. \n\nThe ensemble mean is higher in nearly all assessed countries relative to the baseline (figure 8). \nThe greatest increase was in Oman, followed by India, Bangladesh and Saudi Arabia, then Brazil \nand a number of its neighbouring countries. Smaller increases in HCVI were seen across Africa. \nSoutheastern Africa showed larger increases than Central Africa. The HCVI decreased in three \ncountries: Mali, Burkino Faso and Sudan. \n\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming, \nwith increases in most assessed countries and generally similar sets of countries experiencing the \nlargest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI \nthan Central Africa, due to increased length of drought events projected in all ensemble members \n(not shown). The length of flood events was not projected to increase in this region. The Sahel \nregion consistently showed one or more countries with a small decrease in the HCVI, although \nthe precise country or countries varied between ensemble members. The decrease in HCVI here \nwas due to projected decreases in length of drought, with length of flood events projected to \nchange little. \n\nIndia is projected to see increased HCVI by all ensemble members, due to a consistent increase \nin length of flood events projected in all members, outweighing the beneficial impact of decreased \nlength of drought which is again projected in all members. \n\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble \nmembers. Although the location of projected longer flood events varies across the country in \ndifferent members, the aggregation of the HCVI to the country level renders this geographical \nvariability irrelevant for such a large country because only the median value across the country \nis used in the HCVI. Some ensemble members project longer drought for Brazil, which again \ncontributed to increased HCVI.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed11.pdf" + }, + { + "text": "**22**\n\nvulnerability to food insecurity \n\n0.4 0.6 0.8 1.0 1.2 1.4 \n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n–0.2 \n. \n. \n. \n. \n**Figure 18.**Hunger and Climate Vulnerability Index at 1.5°C global warming (ensemble mean). \n. \n. \n. \n\n\n\n\n\n\n\n**Figure 19.**Difference in Hunger and Climate Vulnerability Index between 2°C and 1.5°C global warming, for individual ensemble \nmembers and ensemble mean. \n\n4. Discussion \n\nIn most cases, global mean changes at 2°C are larger than those at 1.5°C, not only for individual \nmembers but also for the ensemble as a whole. All ensemble members show increases in TXx at \n2°C which are larger than all changes at 1.5°C, and same true for most other variables.", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed11.pdf" + }, + { + "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 3.**Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- \nCM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS \n10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. \n\n\n \n \n \n \n [html]\n
TablePatientsStatementSpeciesStateStatestedStatementTableStatementStateSpeciesStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 6", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed9.pdf" + }, + { + "text": "References \n1. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al*.), pp. \n1–32. Cambridge, UK: Cambridge University Press.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). \n\n\n–0.2 0 \n0.2 \n1.0 \n0.6 \nvulnerability to food insecurity \n0.4 0.8 1.2 1.4 \n\n\n\n\n\n**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change simulation, what is JULES ?", + "target_page": 7, + "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In the present study, processing errors in the input data for one ensemble member, the \nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the \nHCVI are, therefore, not presented here. \n\n**7**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n\n(d) Freshwater resources: run-off \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. \n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming \n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed \nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there \nwere some differences in how these data were applied, with different approaches to the treatment \nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered \nimportant to assess changes in the raw climate model output, because this directly represents \nthe behaviour of the model itself. The main focus was on the changes relative to the present- \nday baseline climate, defined as 1981–2010, with absolute values in either the baseline or the \nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off \nanalyses, however, it was considered important to correct for systematic biases in the climate \nmodel output, because these can lead to unrealistic representations of the key quantities in the \npresent-day simulation [35]. A bias-correction methodology was, therefore, applied for these two \nparts of the analysis, whereby the model output was adjusted to make it consistent with an \nobserved climatology [36]. We used a multi-segment statistical bias-correction methodology for \nprecipitation [37], and a modification of this for other variables [37].", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. \n\nRather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nWe ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "**9**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n –2 –1 0 1 \n2 \n°C \n3 4 5 6 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 2.**Simulated changes in annual daily maximum temperature relative to 1981–2010 at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 4.**Time of reaching GWLs of 1.5°C and 2°C in each bias-corrected output from the HadGEM3 climate simulations, driven \nby different sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data \nis applied to the HCVI calculation and JULES simulations. \n\n\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20242035
GFDL - ESM2M20362051
HadGEM2 - ES20192033
IPSL - CM5A - MR20232036
MIROC - ESM - CHEM20202032
ACCESS1 - 020262040
\n\nland surface sees an increase in annual daily maximum temperature which is similar to the global \nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially \nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By \ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases \nin annual daily maximum temperature larger than the global mean warming. Much of the mid- \nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more \nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the \nMIROC and ACCESS models. \n\nThe percentage of days exceeding the 90th percentile of daily maximum temperature increase \nmore in tropical areas (figure 3). Some areas show over 60% of days above this level at 2°C global \nwarming compared with present day, whereas in the mid-latitudes between 20% and 30% of days \nexceed this level. The global mean is between 20% and 30% in all ensemble members (table 3).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**17**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. \n\n**Table 6.**Global mean changes at 1.5°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIROC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )1.21.91.72.01.51.91.7
TX90p (% time )10.015.716.219.214.118.315.6
CDD− 1.20.7− 1.3− 5.40.0− 3.8− 1.6
RX5day ( mm )1.13.64.54.64.04.33.6
drought proxy0.740.48n. a.0.390.160.310.42
flood proxy0.750.73n. a.0.730.790.730.75
Pmean (%)1.40.93.11.33.92.42.2
Rmean (%)2.10.75.40.76.75.03.9
Rlow (%)− 3.40.35.92.25.94.92.6
\n\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15–20% or \nmore. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater \nincreases in the tropics than mid-latitudes (electronic supplementary material).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20152030
GFDL - ESM2M20402055
HadGEM2 - ES20272039
IPSL - CM5A - MR20202034
MIR0C - ESM - CHEM20232035
ACCESS1 – 020342046
\n\n**Table 3.**Time of reaching GWLs of 1.5°C and 2°C in the raw output from the HadGEM3 climate simulations, driven by different \nsets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied \nto the calculation of the ClimPACT indices. \n\n**8**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nup to present-day plus model-projected warming thereafter (table 4). While this does lead to \ninconsistent definitions of dates of the GWLs for applications of the climate model output with \nand without bias correction, the focus here is on the level of warming relative to pre-industrial \nrather than the timing of this warming. Therefore, priority is given to an accurate quantification \nof GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming \nlevels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on \nthe model and warming level. This inconsistency would have consequences if these results were \napplied to time-dependent impacts and adaptation assessments, but that is not the case here so \nthis concern does not apply. However, one issue is that the time-dependent nature of the aerosol \nforcing means that the spatial pattern of regional climate responses varies over time, so this will \nlead to some degree of inconsistency between the analysis of the ClimPACT extremes and the \nHCVI and JULES impacts projections. \n\n3. Results \n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the \nlevel of agreement between models for a particular projected change, and hence an indication \nof potential robustness of the projected changes for informing adaptation. We then make a \ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would \nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in \nregional climate outcomes, we address this in a number of ways. For individual realizations, we \ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C, \neven if the sign of the change is uncertain. We also compare the range of outcomes at different \nGWLs, to see if the regional-scale uncertainty itself increases with global warming. \n\n(a) Climate-change impacts at 2°C global warming", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "2. Methods and models \n(a) Global climate simulations at 1.5°C and 2°C global warming \n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could \nbe the long-term climate state following a stabilization of warming at that level, another could \nbe the state over a shorter period around the time of first reaching that level. Here we choose the \nsecond definition, which is what is seen first and hence needs to be adapted to. There are also \na number of methods with which such changes can be assessed [10]. We take the opportunity \nof availability of a new set of higher-resolutions transient climate and impacts simulations, and \nuse a time-sampling methodology [10] to assess global-scale impacts at these resolutions for the \nfirst time.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. \n\nand 75%, especially in the Iberian Peninsula. Southern Africa also sees a decrease in low flows \nwhere changes in mean flows were small. Changes in high run-off show similar patterns and \nmagnitudes to those in mean run-off. \n\nThe simulated changes in both mean and low run-off flows show substantial differences \namong the six simulations (figures 10 and 11). In most basins examined here, the range of \noutcomes include both increases and decreases in mean and low flows for any particular basin, \nbut generally with the largest proportion simulating increases in both mean and low flows. In a \nfew cases, notably the Lena in northeast Asia and Ganges in southeast Asia, the ensemble agreed \nentirely or almost entirely on increased flows. Even here, the range of outcomes is large, with the \nprojected flow increases in the Ganges for 2°C global warming ranging from approximately 30% \nto more than 110%. \n\nExceptions to the general picture of consensus on increasing flows are seen in the Amazon, \nOrange, Danube and Guadiana basins where the range of projected extends more towards \ndecreased mean flows. Mean flows in the Amazon are projected to decline by up to 25% for 2°C \nglobal warming. For low flows, the ensemble of projections entirely gives decreased flows at 2°C \nglobal warming for these basins. \n\nThe signal of decreased flows was stronger for low flows than mean flows, and indeed in the \nNiger, the range of mean flow changes extended more towards increases whereas the range of \nlow flow changes extended more towards decreases. \n\n(b) Impacts at 1.5°C global warming compared to 2°C \n\nFor almost all quantities and simulations examined here, global-scale changes in extremes and \nrun-off at 1.5°C global warming (table 6) are smaller than those compared to 2°C (table 5; \nfigures 12 and 13). The exceptions to these are mean and low run-off which each show one \ninstance of a smaller change at 2°C than 1.5°C, but still with a majority of simulations showing \nlarger changes at 2°C (figure 13). For temperature-related indices, the ranges of change at the two \nGWLs do not overlap—the change at 2°C in all members is larger than the change at 1.5°C in", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
ModelResearch instituteCountryHorizontal resolution
GFDL - ESM2MGeophysical Fluid Dynamics LaboratoryThe United States144 × 90
HadGEM2 - ESHodley Center for Climate Prediction and ResearchThe United Kingdom192 × 145
IPSL - CM5A - LR1. Institute Pierre - Simon LaplaceFrance96 × 96
NorESM1 - MNorway Climate CenterNorway144 × 96
MIROC - ESMCenter for Clinate System Research, National Institute for Environmental Studies and Prontier Research Center for Global ChangeJapan128 × 64
\n\n\n\n**Figure 1.**Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs \nunder 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black \nvertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models \nand scenarios. \n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. \n\n**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). \n\n\n–0.2 0 \n0.2 \n1.0 \n0.6 \nvulnerability to food insecurity \n0.4 0.8 1.2 1.4 \n\n\n\n\n\n**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Which of #climatechange and #globalwarming is the most used ?", + "target_page": 5, + "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library \nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed \n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset \ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the \n#globalwarming hashtag, we did not document these two hashtags when processing data. The number \nof hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose \nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended \nto be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, \nand excluding them helps researchers focus on meaningful rather than occasional associations. \n\n3.3. Measurement \n\n3.3.1. Hashtag Co-Occurrence Network \n\nThe co-occurrence patterns of hashtags in tweets from two datasets were documented to build \nsemantic networks for climate change and global warming. For instance, for “#cimatechange \nredistributes #fish species at high latitudes. @_OScience @AarhusUni #Arctic”, a tweet in the climate \nchange dataset, hashtags #fish and #arctic were documented as co-occurring and their associations plus \none in the semantic network of climate change. In the semantic network, nodes represent hashtags and \nthe weight of edge refers to the frequency at which two hashtags co-occurred. \n\nWe visualized the network using Gephi software [81]. Following the established literature \n[60,61,82], only the most prominent hashtags were included in the visualization to concentrate our \nanalysis on the most important hashtags. In this research, the top 50 hashtags with the highest centrality \nin each network were selected for visualization. Modularity analysis was then analyzed to identify the \nclusters of hashtags in each semantic network, and hashtags belonging to the same cluster were drawn \nin the same color. The network spatialization was conducted with Gephi’s built-in force-directed \nlayout algorithm proposed by Fruchterman and Reingold [83], where the more associated the hashtags, \nthe closer they are to each other in the spatial layout. \n\nA temporal analysis was introduced to understand the evolution of the two climate discourses \nover a long period. We first examined how the two semantic networks evolved in the past years. \nAll the nodes once ranked top 50 in any of the 10 years were gathered to form a union set for each \ndataset. Then, they were clustered according to the strength of their associations in the whole dataset \nand mapped with a force-directed layout algorithm in Gephi to produce a graph of nodes. With the \ndynamic network function supplied by Gephi, we then added the associations between the nodes \nranked on the top 50 list in 2009 to the graph of nodes and obtained the relationship of the top 50 nodes \nfor 2009. Similarly, we produced a total of 10 graphs from 2009 to 2018, where the positions of the \nnodes on the 10 maps are the same, but the strengths of their associations are different to represent the \nchanges in the associations of key hashtags for each discourse.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the \nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest, \nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al \nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster \n(16%), including both domestic efforts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”, \nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred \nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was \ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities \non the earth. \n\n4.3. Temporal Analysis of the Associations in the Two Discourses \n\nThe online presentations of the climate change and global warming discourses are dynamic. \nAs shown in Table 2, for the global warming discourse, 11 key concepts remained in the top 50 central \nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11 \nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that \nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list \nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”, \nand “food” only occurred on the critical list for the climate change discourse. \n\n**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n\n \n \n \n \n [html]\n
UniqueShared
# climatechangechina, solar, water, food, economy, coal, sustainabilityco2, news, carbon, green, climate,
# globalwarmingpollution, earthus, energy, science, environment
\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period, \nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies \nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary \nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more \nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of \nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the \n10 years, as shown in Figure 5.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed10.pdf" + }, + { + "text": "The correlation between climate change and global warming discourses was measured every \nyear to observe whether the two discourses converged or diverged over time. Considering computing \npower limitations, only key hashtags ranked in either of the top 50 lists for the two discourses in that \nyear were included in the calculations. First, we measured to what extent the two discourses resemble \neach other in the order of importance for the hashtags in each year. For every year, the top 50 hashtags \nin each network were selected with a rank order according to their centrality. Then, Spearman’s rank \ncorrelation coefficient was used to examine the correlation of the rank orders of the selected nodes \nin the two discourses [84], where a high Spearman correlation indicates that the hashtags in the two \ndiscourses were ranked similarly. Secondly, we measured to what extent the two discourses resembled \neach other in the associations between the key hashtags for each year. For every year, we obtained the \nunion of the two top 50 nodes lists and used the name of the nodes in the union as the row name and", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "Figure 3 depicts the associations of hashtags in the climate change discourse for each year \nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the \nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg” \n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global \nactions cluster (in yellow) because these hashtags were frequently used in the global action context and \nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags, \nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental \nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change), \nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political \nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political \nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining \n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of \nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased \nin the last two years of the period according to Figure 5a. \n\nFigure 4 describes the evolution of concepts’ associations in the global warming discourse during \nthe 10 years. The red cluster included concepts such as “2012”, “hot”, “summer”, “elnino”, and “snow”, \ndescribing the weather abnormalities related to global warming. A notable finding is that before 2012, \nglobal warming’s association with temperature abnormalities and extreme weather was not salient,", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "104. Walter, S.; De Silva-Schmidt, F.; Brüggemann, M. From “knowledge brokers” to opinion makers: How \nphysical presence affected scientists’ Twitter use during the COP21 climate change conference. Int. J. Commun. \n**2017**, 11, 570–591. \n\n105. Peterson, T.C.; Connolley, W.M.; Fleck, J. The myth of the 1970s global cooling scientific consensus. Bull. Am. \n\nMeteorol. Soc.**2008**, 89, 1325–1338. [CrossRef] \n\n106. Mazur, A. Global environmental change in the news: 1987–1990 vs. 1992–1996. Int. Sociol.**1998**, 13, 457–472. \n\n[CrossRef] \n\n107. Statista. Reach of Selected Social Networks in the United States as of February 2017, by Age Group. Available \nonline: https://www.statista.com/statistics/305245/us-social-network-penetration-age-group/ (accessed on 16 \nJanuary 2020). \n\n108. O’Connor, B.; Balasubramanyan, R.; Routledge, B.R.; Smith, N.A. From tweets to polls: Linking text sentiment \nto public opinion time series. In Proceedings of the Fourth International AAAI Conference on Weblogs and \nSocial Media, Washington, DC, USA, 23–26 May 2010. \n\n109. Zannettou, S.; Caulfield, T.; De Cristofaro, E.; Sirivianos, M.; Stringhini, G.; Blackburn, J. Disinformation \nwarfare: Understanding state-sponsored trolls on Twitter and their influence on the web. In Proceedings \nof the Companion of The 2019 World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019; \npp. 218–226. \n\n110. Shao, C.; Ciampaglia, G.L.; Varol, O.; Yang, K.C.; Flammini, A.; Menczer, F. The spread of low-credibility \n\ncontent by social bots. Nat. Commun.**2018**, 9, 4787. [CrossRef] \n\n© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/).", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed10.pdf" + }, + { + "text": "column name to create two matrices. One matrix was created for the climate change discourse, and we \nfilled the cell whose column name and row name were among the top 50 list in the climate change \ndiscourse with the frequency at which the two hashtags were associated in this discourse, and the \nother cells were filled with 0. This was repeated for the global warming matrix. We thus obtained \ntwo matrices with the same row and column names but different values in the cells. Then, the two \nmatrices were input to the quadratic assignment procedure (QAP) [85] analysis provided by UCINET \nsoftware [86] to assess their correlation for each year. \n\n**4. Results**\n\n4.1. General Descriptions \n\nAssociation networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", + "target_page": 7, + "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Figure 3 depicts the associations of hashtags in the climate change discourse for each year \nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the \nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg” \n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global \nactions cluster (in yellow) because these hashtags were frequently used in the global action context and \nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags, \nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental \nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change), \nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political \nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political \nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining \n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of \nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased \nin the last two years of the period according to Figure 5a. \n\nFigure 4 describes the evolution of concepts’ associations in the global warming discourse during \nthe 10 years. The red cluster included concepts such as “2012”, “hot”, “summer”, “elnino”, and “snow”, \ndescribing the weather abnormalities related to global warming. A notable finding is that before 2012, \nglobal warming’s association with temperature abnormalities and extreme weather was not salient,", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "To be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow \nin Figures 3 and 4) in earlier years, the clusters to which they belonged had significantly different \nmeanings. As mentioned in the results section, these hashtags were associated with a series of scientific \nhashtags in the climate change discourse, appealing to global efforts. In the global warming discourse, \nthey were clustered with “hoax” and “frame”, showing lack of belief in climate issue facts and hesitation \nabout global efforts. More recently, when discussions about temperature, politics, and hesitation \nsignificantly shrank in the global warming discourse, the wo discourses showed more similarities about \nthe importance of scientific concepts according to Figure 5a,b. However, links between global efforts \nand scientific facts were not constructed in the global warming discourse. According to a network \nmodel for cognition, the lack of associations means fewer psychological activations will spread to", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed10.pdf" + }, + { + "text": "5.1.3. Discourse Structure \n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action” \nrepresented the themes of the three largest clusters in the network. However, three popularly recurring \nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters \nabove, but formed another small tight cluster together, sitting in the most central part of the semantic \nnetwork, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of \nthe climate change topic and these three hashtags were tightly bundled might indicate an attempt by \n#climatechange users to address all three communities together [91], consolidating climate change as \na topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags’ \nfunction of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 \n\n**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. \n\n**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "then the associations suddenly strengthened in 2012 when numerous hashtags about phenomena were \nincluded in the discourse. Notably, the red node in the top right-hand corner named “2012” refers \nto the Maya prediction that the year 2012 would be the end of the world and that the world would \nbe destroyed by extreme natural events, and was linked to other climate hashtags for the first time \nin the graph exactly in 2012. The blue nodes included the political hashtags, such as “maga”, “ows”, \n“p2”, “tcot”, and “obama”. The involvement of political hashtags in the global warming discourse was \nsignificantly higher than that in the climate change discourse according to the comparison between \nFigure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, \nas shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in \nFigure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts \nand actions, where words describing global efforts, such as “ipcc”, “cop15”, and “un”, and words \nquestioning global warming, such as “hoax” and “fraud”, were both included. The associations \nbetween the yellow nodes were most salient in 2010 and 2011 but were less dominant in the following \nyears. The green nodes occupied 50.7% of all the nodes representing talk about the scientific hashtags of \nclimate issue, including words such as “ecology”, “ocean”, and “cleanenergy”. Associations between \nscientific hashtags (green nodes) exploded and the centrality sum of this cluster also showed an obvious \nrising trend in dominating the theme of the global warming discourse, according to Figure 5.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed10.pdf" + }, + { + "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data \n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. \n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. \n\n**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library \nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed \n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset \ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the \n#globalwarming hashtag, we did not document these two hashtags when processing data. The number \nof hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose \nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended \nto be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, \nand excluding them helps researchers focus on meaningful rather than occasional associations. \n\n3.3. Measurement \n\n3.3.1. Hashtag Co-Occurrence Network \n\nThe co-occurrence patterns of hashtags in tweets from two datasets were documented to build \nsemantic networks for climate change and global warming. For instance, for “#cimatechange \nredistributes #fish species at high latitudes. @_OScience @AarhusUni #Arctic”, a tweet in the climate \nchange dataset, hashtags #fish and #arctic were documented as co-occurring and their associations plus \none in the semantic network of climate change. In the semantic network, nodes represent hashtags and \nthe weight of edge refers to the frequency at which two hashtags co-occurred. \n\nWe visualized the network using Gephi software [81]. Following the established literature \n[60,61,82], only the most prominent hashtags were included in the visualization to concentrate our \nanalysis on the most important hashtags. In this research, the top 50 hashtags with the highest centrality \nin each network were selected for visualization. Modularity analysis was then analyzed to identify the \nclusters of hashtags in each semantic network, and hashtags belonging to the same cluster were drawn \nin the same color. The network spatialization was conducted with Gephi’s built-in force-directed \nlayout algorithm proposed by Fruchterman and Reingold [83], where the more associated the hashtags, \nthe closer they are to each other in the spatial layout. \n\nA temporal analysis was introduced to understand the evolution of the two climate discourses \nover a long period. We first examined how the two semantic networks evolved in the past years. \nAll the nodes once ranked top 50 in any of the 10 years were gathered to form a union set for each \ndataset. Then, they were clustered according to the strength of their associations in the whole dataset \nand mapped with a force-directed layout algorithm in Gephi to produce a graph of nodes. With the \ndynamic network function supplied by Gephi, we then added the associations between the nodes \nranked on the top 50 list in 2009 to the graph of nodes and obtained the relationship of the top 50 nodes \nfor 2009. Similarly, we produced a total of 10 graphs from 2009 to 2018, where the positions of the \nnodes on the 10 maps are the same, but the strengths of their associations are different to represent the \nchanges in the associations of key hashtags for each discourse.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "The correlation between climate change and global warming discourses was measured every \nyear to observe whether the two discourses converged or diverged over time. Considering computing \npower limitations, only key hashtags ranked in either of the top 50 lists for the two discourses in that \nyear were included in the calculations. First, we measured to what extent the two discourses resemble \neach other in the order of importance for the hashtags in each year. For every year, the top 50 hashtags \nin each network were selected with a rank order according to their centrality. Then, Spearman’s rank \ncorrelation coefficient was used to examine the correlation of the rank orders of the selected nodes \nin the two discourses [84], where a high Spearman correlation indicates that the hashtags in the two \ndiscourses were ranked similarly. Secondly, we measured to what extent the two discourses resembled \neach other in the associations between the key hashtags for each year. For every year, we obtained the \nunion of the two top 50 nodes lists and used the name of the nodes in the union as the row name and", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "For the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses \non the responsibility to tackle climate change, where several global action hashtags are included, such \nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in \nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the \ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including \n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "What are two main reasons for one's low climate concern ?", + "target_page": 13, + "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. \n\nEven when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. \n\n5.1.3. Discourse Structure", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. \n\nLarge amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? \n\n**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "**6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public \ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how \nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter \nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing \nclimate discourses and discovered how these two discourses evolved. \n\nWe found that broad scientific, social, political, and international discussions are the topics \nof public climate discourse. Although the semantic difference between climate change and global \nwarming seems subtle, the differences in their cognitive associations are not trivial. Despite some \nshared concerns between the two discourses, “global warming” is more politicized and focuses more on \ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact \ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis \nrevealed that traditional political discussions decreased in both discourses but climate change started to \nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s \nassociations to extreme events and temperature change were suddenly strengthened around 2012. \nClimate change is becoming dominant compared with global warming in public discussions. Although \nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable \ndiscrepancy still exists in the way in which they get concepts associated. These observations may \nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between \ndiverse climate perceptions. \n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media \ndata rather than samples, discrepancies still exist between social media users and the public. As most \nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics \nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global \ncooling was a prominent climate concern amongst the public [105]. While in the 1980s, ozone layer \ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [106]. \nConsidering the historical background of climate issues, age might influence how individuals perceive \nclimate issues. According to the statistics in 2017 [107], only 16 % of older people (older than 60) \nin America use Twitter, while the proportion is 39% for people between 30–59 years old and 47% \nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of \nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular. \nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute \nand supplement for polling [108], we thought our results should be further examined before being \ngeneralized to the whole population.", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed10.pdf" + }, + { + "text": "The two distinct climate discourses being produced based on the same reality can be explained \nby the framing theory in communication study. Framing refers to the phenomenon where the reality \nis always partially selected or highlighted when described by the public or media [19]. By distinctly \ndefining problems, suggesting solutions, and indicating casual interpretations [20], different frames \ntell the audience different stories and influence how they observe facts [21,22]. Two types of frames, \nequivalency frames and emphasis frames, are commonly studied by scholars to examine how framing \neffects influence individuals’ attitudes and beliefs [23]. Equivalency frames describe the same fact or \nlogic with different words and may suggest that the audience perceives facts in psychologicallydifferent \nways [24]. For example, a cup can be described as “half full” and “half empty”, where the former \nis a positive frame indicating a reference point lower than current status, and the latter is negative, \nmeaning that the reference point is above the current situation [25]. Emphasis frames employ words \nselectively associated with parts of reality to shift the audience’s attention to particular attributes [26]. \nClimate change and global warming have been noted to highlight different aspects of an issue by \nactivating distinct cognitive accessibility patterns [27]. \n\nDifferent frames concerning the global climate concern are popular among the public, politicians, \nenvironmentalists, and the media [1,28,29]. Big data analyses have indicated that when interpreting \nclimate events, individuals’ preference for frameworks was influenced by demographics [5] and \nsocial-political background [2]. Different choices of frameworks can evoke different psychological \nprocesses [30], promote or inhibit engagement intentions [31], or gain approval on various levels [32]. \nStudies have noted that the frameworks of climate change and global warming may result from \ndifferent political indications. The American Republican-leaning states show more preference for \nglobal warming than climate change compared with Democratic-leaning states, and global warming is \nmore connected with “hoax” in questioning the reality of the global climate issue [5]. Conservatives \nare more likely to link heat-related phenomena to global warming, whereas liberals associate these \nfacts equally with both frames [27]. An earlier survey conducted by [4] argued that wording choice \nmight not influence the whole population similarly. For the whole sample and politically independent \nindividuals, the two terminologies were equally serious, but climate change seemed more serious \ncompared with global warming among the Republicans, and the Democrats held the opposite opinion. \n\n2.2. Network Model for Cognition \n\nDifferent framework choices may create even more differences than have already been noticed. \nPsychologists think that human beings are a collection of learned associations [33], and associative \nresponse rather than simply linear logic form the structural basis of thought [34]. Associative \nlearning [35] is a long-standing assumption underlying cognitive science [14], suggesting that human \ncognition toward the world forms a network pattern, where the world is organized into several groups \nof related items and stored in a network model in the mind. When messages are processed by humans, \nthey are first encoded into a temporary memory network and then linked to an existing associative \nmemory network for long-term storage [36]. In the network, a node represents a certain concept, \nand edges refers to particular relationships, such as time sequences [37], similarity [38], semantic \nconnections [37], or cause and effect [33] between two nodes.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed10.pdf" + }, + { + "text": "94. Brian Kennedy, M.H. U.S. Concern about Climate Change Is Rising, but Mainly among Democrats. 2019. \nAvailable online: https://www.pewresearch.org/fact-tank/2019/08/28/u-s-concern-about-climate-change-is- \nrising-but-mainly-among-democrats/ (accessed on 10 October 2019). \n\n95. Carroll, L. George Takei Says White House Removed Pages about Climate Change, Civil Rights from Website. \n2017. Available online: https://www.politifact.com/punditfact/statements/2017/jan/23/george-takei/george- \ntakei-says-white-house-removed-pages-about-/l (accessed on 10 October 2019). \n\n96. Haug, G.H.; Günther, D.; Peterson, L.C.; Sigman, D.M.; Hughen, K.A.; Aeschlimann, B. Climate and the \n\ncollapse of Maya civilization. Science**2003**, 299, 1731–1735. [CrossRef] \n\n97. Kennett, D.J.; Breitenbach, S.F.; Aquino, V.V.; Asmerom, Y.; Awe, J.; Baldini, J.U.; Bartlein, P.; Culleton, B.J.; \nEbert, C.; Jazwa, C.; et al. Development and disintegration of Maya political systems in response to climate \nchange. Science**2012**, 338, 788–791. [CrossRef] \nFredland, J.S. Unlabel Their Frankenstein Foods: Evaluating a US Challenge to the European Commission’s \nLabeling Requirements for Food Products Containing Genetically-Modified Organisms. Vanderbilt J. Transnatl. \nLaw**2000**, 33, 183. \nScott, I.M. Green symbolism in the genetic modification debate. J. Agric. Environ. Ethics**2000**, 13, 293–311. \n[CrossRef] \n\n98. \n\n100. Nisbet, M.C.; Scheufele, D.A.; Shanahan, J.; Moy, P.; Brossard, D.; Lewenstein, B.V. Knowledge, reservations, \nor promise? A media effects model for public perceptions of science and technology. Commun. Res.**2002**, 29, \n584–608. [CrossRef] \n\n101. Lewandowsky, S.; Gignac, G.E.; Vaughan, S. The pivotal role of perceived scientific consensus in acceptance \n\nof science. Nat. Clim. Chang.**2013**, 3, 399. [CrossRef] \n\n102. Houghton, J. Global Warming: The Complete Briefing; Cambridge University Press: Cambridge, UK, 2009. \n103. Pew. The Science People See on Social Media. Available online: http://www.pewinternet.org/2018/03/21/the- \n\nscience-people-see-on-social-media/ (accessed on 16 January 2020).", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Figure 2.**(continued) \n\nis 16.9% in which the temperature would go up more than 3.0 °C, most located in the high latitude regions of \nNorthern Hemisphere; the area is rarely in which the temperature would go up between 0 and 1.0 °C. \n\nThere are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. \n\n\n \n \n \n \n [html]\n
State global warming by 1.5 ° C. The dutributions of maize yield loss under the two scenarios are similar to each otherTableStatementStatesticsPatientsSpecificationStatestratesTableStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 5", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed9.pdf" + }, + { + "text": "**14**\n\n\n–1.00 –0.75 –0.50 –0.25 \n\n0 \nchange in vulnerability to food insecurity \n\n0.25 0.50 0.75 1.00 \n\n\n\n\n\n**Figure 8.**Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2°C \nglobal warming, for five individual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, \nand the ensemble mean. \n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher \nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. \nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels \nof vulnerability to food insecurity that are greater than any seen in the present day. For \nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at \n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels \nof vulnerability to food insecurity that are greater than those expected in other countries under \n2°C global warming. This suggests that other factors are already posing greater risk for food \ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk \nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity \narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by \naddressing various socio-economic issues in such counties. \n\nincreased run-off over \napproximately half of the land surface (figure 9) and the majority of the major river basins \nassessed (figure 10), but with large regional uncertainties including the possibility of decreased \nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of \nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing \nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and \nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of \nthe Sahara Desert where the existing very small run-off become even smaller. \n\nThe JULES simulations show a general tendency towards \n\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with \nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low \nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that \nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean \nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the \nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "conducted to reveal the interactions between public discourse and natural, scientific, social, or political \nevents. In particular, factors promoting public consensus and factors resulting in discourse discrepancy \nshould be further identified to help climate communicators narrow the public cognitive divergence \nabout the global climate issue. \n\n**Supplementary Materials:**The following are available online at http://www.mdpi.com/1660-4601/17/3/1062/s1. \n\n**Author Contributions:**W.S. designed the study, collected the data, conducted the analysis, and wrote the article. \nH.F. offered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. \nhelped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. \nAll authors have read and agreed to the published version of the manuscript. \n\n**Funding:**This work was supported in part by the National Key R&D Program of China (Grant No. \n2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and \nU1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High \nPerformance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and \nTechnology (Qingdao). \n\n**Conflicts of Interest:**The authors declare no conflict of interest. \n\n**Appendix A**\n\n#agw, short for anthropogenic global warming, indicating global warming is caused by \n\nhuman activities. \n\n#cdnpoli, short for Canadian politics \n#cop21, the yearly session of COP (short for the Conference of the Parties) held in 2015. \n#cop24, the yearly session of COP (short for the Conference of the Parties) held in 2018. \n#epa, short for the United States Environmental Protection Agency founded in 1970, an agency \n\naiming at protecting environment. \n\n#gop, short for Grand Old Party, the Republican political party in the United States. \n#nyc, short for New York City \n#p2, short for Progressives 2.0, a hashtag used to show progressive political standpoints on Twitter. \n#parisagreement, Paris Agreement, the agreement signed on UNFCCC in 2016 to deal with global \n\nwarming by reducing greenhouse gas emissions. \n\n#sdgs, short for Sustainable Development Goals, containing 17 global goals put forward by the \n\nUnited Nations General Assembly in 2015 and expected to be achieved in 2030. \n\n#tcot, short for Top Conservatives On Twitter, a hashtag used to show conservative political \n\nstandpoints on Twitter. \n\n#un, short for the United Nations \n#us, short for the United States \n\n**References**\n\n1. Nisbet, M.C. Communicating climate change: Why frames matter for public engagement. Environ. Sci. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. \n\nPolicy Sustain. Dev.**2009**, 51, 12–23. [CrossRef] \nRoxburgh, N.; Guan, D.; Shin, K.J.; Rand, W.; Managi, S.; Lovelace, R.; Meng, J. Characterising climate change \ndiscourse on social media during extreme weather events. Glob. Environ. Chang.**2019**, 54, 50–60. [CrossRef] \nSchuldt, J.P.; Konrath, S.H.; Schwarz, N. “Global warming” or “climate change”? Whether the planet is \nwarming depends on question wording. Public Opin. Q.**2011**, 75, 115–124. [CrossRef] \nVillar, A.; Krosnick, J.A. Global warming vs. climate change, taxes vs. prices: Does word choice matter? \nClim. Chang.**2011**, 105, 1–12. [CrossRef] \nJang, S.M.; Hart, P.S. Polarized frames on “climate change” and “global warming” across countries and \nstates: Evidence from Twitter big data. Glob. Environ. Chang.**2015**, 32, 11–17. [CrossRef] \nUnited States Environmental Protection Agency. Climate Change: Basic Information. Available online: \nhttps://19january2017snapshot.epa.gov/climatechange/climate-change-basic-information_.html (accessed on \n10 October 2019).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "How many scholarly articles are published every year ?", + "target_page": 1, + "target_passage": "over 3 million scholarly articles published per year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**\n\n**Connections to ORCID records**\n6M \n5M \n4M \n3M \n2M \n1M \n\n2012 2013 2014 2015 2016 2017 2018 \n\n■**Live ORCID iDs**\n■**w/at least 1 education** ■**w/at least 1 employee**\n■**w/at least 1 work**\nSource: Orcid.org/statistics as of November 2018 \n\n42,500 ACTIVE \nSCHOLARLY PEER- \nREVIEWED JOURNALS \nSource: The STM Report, October 2018 \n\nSponsored by ORCID \n**To learn more go to https://orcid.org** **Institutions must increasingly recognize and demonstrate**\n**the impact of all types of research contributions**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Paulson, Lawrence C. (February 2018). \"Computational Logic: Its Origins and Applications\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832843).*Proceedings of the Royal Society*\n*A: Mathematical, Physical and Engineering Sciences*.**474**(2210): 1–14. arXiv:1712.04375 \n(https://arxiv.org/abs/1712.04375). Bibcode:2018RSPSA.47470872P (https://ui.adsabs.harv \nard.edu/abs/2018RSPSA.47470872P). doi:10.1098/rspa.2017.0872 (https://doi.org/10.109 \n8%2Frspa.2017.0872). PMC 5832843 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832 \n843). PMID 29507522 (https://pubmed.ncbi.nlm.nih.gov/29507522). S2CID 3805901 (http \ns://api.semanticscholar.org/CorpusID:3805901). \nPedemonte, Bettina (25 June 2018). \"Strategic vs Definitory Rules: Their Role in Abductive \nArgumentation and their Relationship with Deductive Proof\" (https://www.ejmste.com/article/ \nstrategic-vs-definitory-rules-their-role-in-abductive-argumentation-and-their-relationship-with \n-5539).*Eurasia Journal of Mathematics, Science and Technology Education*.**14**(9): 1–17. \ndoi:10.29333/ejmste/92562 (https://doi.org/10.29333%2Fejmste%2F92562). ISSN 1305- \n8215 (https://search.worldcat.org/issn/1305-8215). S2CID 126245285 (https://api.semantics \ncholar.org/CorpusID:126245285). Archived (https://web.archive.org/web/20211207195246/h \nttps://www.ejmste.com/article/strategic-vs-definitory-rules-their-role-in-abductive-argumentati \non-and-their-relationship-with-5539) from the original on 7 December 2021. Retrieved \n8 January 2022. \nPickel, Bryan (1 July 2020). \"Structured Propositions and Trivial Composition\" (https://doi.or \ng/10.1007%2Fs11229-018-1853-1).*Synthese*.**197**(7): 2991–3006. doi:10.1007/s11229- \n018-1853-1 (https://doi.org/10.1007%2Fs11229-018-1853-1). hdl:20.500.11820/3427c028- \nf2cb-4216-a199-9679a49ce71c (https://hdl.handle.net/20.500.11820%2F3427c028-f2cb-42 \n16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964). \nS2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020). \nPietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri \nes/logical-form/#pat).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta \nnford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved \n4 December 2021. \nPlanty-Bonjour, Guy (2012).*The Categories of Dialectical Materialism: Contemporary Soviet*\n*Ontology*. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0. \nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. \norg/rec/POSCAW-4).*Informal Logic*.**36**(4): 563–593. doi:10.22329/il.v36i4.4527 (https://do \ni.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht \ntps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved \n8 January 2022. \nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan \nford.edu/entries/logic-paraconsistent/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021. \nPépin, Jean (2004). \"Logos\".*Encyclopedia of Religion*(https://www.encyclopedia.com/philo \nsophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02- \n865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi \na.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the \noriginal on 29 December 2021. Retrieved 29 December 2021. \nPutnam, H. (1969). \"Is Logic Empirical?\".*Boston Studies in the Philosophy of Science*. \nVol. 5. pp. 216–241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94- \n010-3381-7_5). ISBN 978-94-010-3383-1. \nQuine, Willard Van Orman (1981).*Mathematical Logic*. Harvard University Press. p. 1. \nISBN 978-0-674-55451-1.", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Newell, Allen; Simon, H. A. (1976). \"Computer Science as Empirical Inquiry: Symbols and \n\nSearch\" (https://doi.org/10.1145%2F360018.360022).*Communications of the ACM*.**19**(3): \n113–126. doi:10.1145/360018.360022 (https://doi.org/10.1145%2F360018.360022). \n\nNicas, Jack (7 February 2018). \"How YouTube Drives People to the Internet's Darkest Corners\" \n(https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1 \n518020478).*The Wall Street Journal*. ISSN 0099-9660 (https://search.worldcat.org/issn/009 \n9-9660). Archived (https://web.archive.org/web/20241005171230/https://www.wsj.com/articl \nes/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) from the \noriginal on 5 October 2024. Retrieved 16 June 2018. \n\nNilsson, Nils (1983). \"Artificial Intelligence Prepares for 2001\" (https://ai.stanford.edu/~nilsson/O \n\nnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF).*AI Magazine*.**1**(1). \nArchived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin \nePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August \n2020. Retrieved 22 August 2020. Presidential Address to the Association for the \nAdvancement of Artificial Intelligence. \n\nNRC (United States National Research Council) (1999). \"Developments in Artificial \n\nIntelligence\".*Funding a Revolution: Government Support for Computing Research*. National \nAcademy Press. \n\nOmohundro, Steve (2008).*The Nature of Self-Improving Artificial Intelligence*. presented and \n\ndistributed at the 2007 Singularity Summit, San Francisco, CA. \n\nOudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from \n\ninsect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD \nOudeyer10.pdf) (PDF).*IEEE Transactions on Autonomous Mental Development*.**2**(1): 2– \n16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057). \nS2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web. \narchive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) \n(PDF) from the original on 3 October 2018. Retrieved 4 June 2013. \n\nPennachin, C.; Goertzel, B. (2007). \"Contemporary Approaches to Artificial General \n\nIntelligence\".*Artificial General Intelligence*. Cognitive Technologies. Berlin, Heidelberg: \nSpringer. pp. 1–30. doi:10.1007/978-3-540-68677-4_1 (https://doi.org/10.1007%2F978-3-54 \n0-68677-4_1). ISBN 978-3-5402-3733-4. \n\nPinker, Steven (2007) [1994],*The Language Instinct*, Perennial Modern Classics, Harper, \n\nISBN 978-0-0613-3646-1 \n\nPoria, Soujanya; Cambria, Erik; Bajpai, Rajiv; Hussain, Amir (September 2017). \"A review of \n\naffective computing: From unimodal analysis to multimodal fusion\" (http://researchrepository. \nnapier.ac.uk/Output/1792429).*Information Fusion*.**37**: 98–125. \ndoi:10.1016/j.inffus.2017.02.003 (https://doi.org/10.1016%2Fj.inffus.2017.02.003). \nhdl:1893/25490 (https://hdl.handle.net/1893%2F25490). S2CID 205433041 (https://api.sem \nanticscholar.org/CorpusID:205433041). Archived (https://web.archive.org/web/20230323165 \n407/https://www.napier.ac.uk/research-and-innovation/research-search/outputs/a-review-of- \naffective-computing-from-unimodal-analysis-to-multimodal-fusion) from the original on 23 \nMarch 2023. Retrieved 27 April 2021. \n\nRawlinson, Kevin (29 January 2015). \"Microsoft's Bill Gates insists AI is a threat\" (https://www.b \nbc.co.uk/news/31047780).*BBC News*. Archived (https://web.archive.org/web/20150129183 \n607/http://www.bbc.co.uk/news/31047780) from the original on 29 January 2015. Retrieved \n30 January 2015. \n\nReisner, Alex (19 August 2023), \"Revealed: The Authors Whose Pirated Books are Powering", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
For the Years Ended December 31,
Note20132012
Property revenue$ 141.112$ 133.641
Property operating expenses( 58.072 )( 53.197 )
Net operating income83.04080.444
Other income
Equity income[ 6 ]1.296758
Home sales[ 18 ]323469
Corporate income[ 19 ]746962
2.3652.189
Other expenses
Financing costs[ 20 ]( 35.231 )( 34.633 )
Depreciation( 589 )( 540 )
Amortization of deferred financing costs( 1.643 )( 1.605 )
Administration( 7.878 )( 8.832 )
( 45.341 )( 45.610 )
Income before fair value gains, loss on disposition and income taxes40.06437.023
Fair value gains[ 5 ]13.07037.726
Loss on disposition( 1.401 )( 1.286 )
Income before income taxes51.73373.463
Current tax expense[ 21 ]( 1.451 )-
Deferred tax expense[ 21 ]( 9.350 )( 19.234 )
Net income and comprehensive income$ 40.932$ 54.229
Net income and comprehensive income attributable to :
Common shareholders39.77951.727
Non - controlling interest1.1532.502
$ 40.932$ 54.229
Net income per share attributable to common shareholders :- basic - diluted[ 22 ]
$ 0.74 $ 0.69$ 1.03 $ 0.97See accompanying notes to consolidated financial statements.
", + "page_start": 66, + "page_end": 66, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "population there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this \npopulation) accounted for just over ten per cent of all positive tests (30,471 tests in total). These \nindividuals provided between 16 and 57 positive tests over the period 2004 to 2013. \n\n**Figure 4: Proportion of positive tests by number of times an individual tested positive.**", + "page_start": 12, + "page_end": 12, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "[html]2018 - 2018 - 2018 - 2018 - 2018Research15525555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555Researchbge - m30.880.740.850.600.49distilbert - base - 25lang - cased0.390.290.180.110.01distilbert - base - en - fr - cased0.390.290.180.110.01distilbert - base - fr - cased0.390.290.180.110.01sentence - camembert - large0.820.630.790.560.33sentence - flaubert - base0.810.480.690.420.18Solon - embeddings - base - 0.10.850.710.810.000.41Solon - embeddings - large - 0.10.870.720.850.580.47sentence - croissant - llm - base0.780.570.740.520.30bert - base - multilingual - cased0.430.320.190.100.02bert - base - multilingual - uncased0.590.330.350.160.06camembert - base0.360.260.060.000.00camembert - large0.360.330.180.010.02sentence - camembert - base0.740.580.690.390.22embed - multilingual - light - v3.00.820.700.770.520.35embed - multilingual - v3.00.840.740.790.440.38flaubert_base_cased0.430.290.210.020.02flaubert_base_uncased0.490.300.220.030.02flaubert_large_cased0.320.290.020.000.01e5 - mistral - 7b - instruct0.900.740.830.640.45multilingual - e5 - base0.830.670.800.530.36multilingual - e5 - large0.830.690.810.590.38multilingual - e5 - small0.820.650.760.520.27udever - bloom - 1b10.480.390.410.320.12udever - bloom - 560m0.470.310.240.060.02laser20.490.390.290.080.03bge - m3 - custom - fr0.850.740.790.530.45sentence_croissant_alpha_v0.20.820.720.790.600.45sentence_croissant_alpha_v0.30.820.740.800.660.49mistral - embed0.810.780.790.680.57LaBSE0.680.550.550.230.20all - MiniLM - L12 - v20.690.670.610.340.33all - MiniLM - L6 - v20.670.630.600.270.28distiluse - base - multilingual - cased -", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv4.pdf" + }, + { + "text": "11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3. \nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat \no.stanford.edu/entries/chinese-logic-language/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Figure 5.**The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to \n2018 (**a**); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to \n2018 (**b**). \n\nAs the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. \n\n**Figure 6.**Rank order correlation between hashtags in the climate change and global warming discourses \nfrom 2009 to 2018 (**a**); correlation between matrices of the climate change discourse and the global \nwarming discourse from 2009 to 2018 (**b**). \n\n**5. Discussion**\n\n5.1. Themes and Structure of the Two Discourses \n\n5.1.1. Phenomenon vs. Mechanism of Action \n\nClimate change and global warming have long been two competing frameworks shaping the \npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "F I N A N C I A L S**2014**", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", + "target_page": 1, + "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**\n\n**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**\n\n**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**\n\n**3.7 ORCID iDs created**\n**every minute**\n\n**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "As a part of careful data collection practices, researchers must \nadopt frameworks such as [13, 52, 86] to describe the uses for which \ntheir models are suited and benchmark evaluations for a variety of \nconditions. This involves providing thorough documentation on the \ndata used in model building, including the motivations underlying \ndata selection and collection processes. This documentation should \nreflect and indicate researchers’ goals, values, and motivations in \nassembling data and creating a given model. It should also make \nnote of potential users and stakeholders, particularly those that \nstand to be negatively impacted by model errors or misuse. We note \nthat just because a model might have many different applications \ndoesn’t mean that its developers don’t need to consider stakeholders. \nAn exploration of stakeholders for likely use cases can still be \ninformative around potential risks, even when there is no way to \nguarantee that all use cases can be explored. \n\nWe also advocate for a re-alignment of research goals: Where \nmuch effort has been allocated to making models (and their training \ndata) bigger and to achieving ever higher scores on leaderboards \noften featuring artificial tasks, we believe there is more to be gained \nby focusing on understanding how machines are achieving the \ntasks in question and how they will form part of socio-technical \nsystems. To that end, LM development may benefit from guided \nevaluation exercises such as pre-mortems [68]. Frequently used in \nbusiness settings before the deployment of new products or projects, \npre-mortem analyses center hypothetical failures and ask team \nmembers to reverse engineer previously unanticipated causes.25 \nCritically, pre-mortem analyses prompt team members to consider \nnot only a range of potential known and unknown project risks, but \nalso alternatives to current project plans. In this way, researchers \ncan consider the risks and limitations of their LMs in a guided \nway while also considering fixes to current designs or alternative \n\n6.3 Summary \nIn this section, we have discussed how the human tendency to \nattribute meaning to text, in combination with large LMs’ ability \nto learn patterns of forms that humans associate with various bi- \nases and other harmful attitudes, leads to risks of real-world harm, \nshould LM-generated text be disseminated. We have also reviewed \nrisks connected to using LMs as components in classification sys- \ntems and the risks of LMs memorizing training data. We note that \nthe risks associated with synthetic but seemingly coherent text are \ndeeply connected to the fact that such synthetic text can enter into \nconversations without any person or entity being accountable for it. \nThis accountability both involves responsibility for truthfulness and \nis important in situating meaning. As Maggie Nelson [92] writes: \n“Words change depending on who speaks them; there is no cure.” \nIn §7, we consider directions the field could take to pursue goals \nof creating language technology while avoiding some of the risks \nand harms identified here and above. \n\n7 PATHS FORWARD \nIn order to mitigate the risks that come with the creation of in- \ncreasingly large LMs, we urge researchers to shift to a mindset of \ncareful planning, along many dimensions, before starting to build \neither datasets or systems trained on datasets. We should consider \n\n\n \n \n \n \n [html]\n
1Table
", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "?customer ?relation ?relatedToCustomer.} \n\nThis would be much less intuitive than the user defined names. There are good reasons to use auto- \ngenerated names, especially for large ontologies that are implemented in multiple natural languages. \nHowever, for new users, especially those who plan to use SPARQL and SHACL, I think it is more \nintuitive to start with user supplied names and then progress to auto-generated names if and when the \nrequirements show a true need for them. This approach to developing software incrementally rather than \nto attempt to design the perfect system that can scale for all possible future requirements is known as the \nAgile approach to software development. In my experience Agile methods have proven themselves in \ncountless real-world projects to deliver better software on time and on budget than the alternative \nwaterfall approach. For more on Agile methods see: https://www.agilealliance.org/agile101/ \n\nThis just gives you a basic overview of some of the things that can be done with SPARQL. There is a lot \nmore and if you are interested you should check out DuCharme’s book or some of the many SPARQL \ntools and tutorials on the web. Some of these are in the bibliography. \n\nOne final point: features of OWL and SWRL that new users frequently find frustrating are the Open \nWorld Assumption (OWA) and lack of non-monotonic reasoning. The OWA was discussed in chapter \n4.13. Non-monotonic reasoning will be discussed in section 11.1. For now, though remember that \nSPARQL is*not*subject to*either*of these restrictions. With SPARQL one can do non-monotonic \nreasoning and leverage the more common Closed World Assumption (CWA). E.g., one can test if the \nvalue for a property on a specific instance exists or not and can take actions if that property does not exist.", + "page_start": 71, + "page_end": 71, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "INTRODUCTION \n\n∗Joint first authors \n\n\n\nJust as environmental impact scales with model size, so does \nthe difficulty of understanding what is in the training data. In §4, \nwe discuss how large datasets based on texts from the Internet \noverrepresent hegemonic viewpoints and encode biases potentially \ndamaging to marginalized populations. In collecting ever larger \ndatasets we risk incurring documentation debt. We recommend \nmitigating these risks by budgeting for curation and documentation \nat the start of a project and only creating datasets as large as can \nbe sufficiently documented. \n\nAs argued by Bender and Koller [14], it is important to under- \nstand the limitations of LMs and put their success in context. This \nnot only helps reduce hype which can mislead the public and re- \nsearchers themselves regarding the capabilities of these LMs, but \nmight encourage new research directions that do not necessarily \ndepend on having larger LMs. As we discuss in §5, LMs are not \nperforming natural language understanding (NLU), and only have \nsuccess in tasks that can be approached by manipulating linguis- \ntic form [14]. Focusing on state-of-the-art results on leaderboards \nwithout encouraging deeper understanding of the mechanism by \nwhich they are achieved can cause misleading results as shown \n\nThis work is licensed under a Creative Commons Attribution International 4.0 License. \nFAccT ’21, March 3–10, 2021, Virtual Event, Canada \nACM ISBN 978-1-4503-8309-7/21/03. \nhttps://doi.org/10.1145/3442188.3445922", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "• The top 10 documents that are not labeled as \n\nrelevant constitute the negative samples. \n\nWe recognize that this process leads to a high cor- \nrelation between the retrieval and reranking tasks. \nWe still think it is essential to make the latter avail- \nable, with an open door to future improvement8. \n• Variety: Diverse model types were included \nto offer an insightful analysis across vari- \nous model characteristics (dimension, training \nstrategy, etc.). \n\nIn line with the third objective, we explicit below \nthe studied characteristics of embedding models \nthat will be discussed with the results. \n\n7SummEvalFr available at: https://huggingface.co/ \ndatasets/lyon-nlp/summarization-summeval-fr-p2p \nhttps: \n8SyntecReranking \n\nat: \n//huggingface.co/datasets/lyon-nlp/ \nmteb-fr-reranking-syntec-s2p \ning available at: \nlyon-nlp/mteb-fr-reranking-alloprof-s2p \n\navailable \n\nand AlloprofRerank- \nhttps://huggingface.co/datasets/ \n\n• Embedding dimension: This critical element \ninfluences the expressiveness of the represen-", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "existing] problem that is somewhere else. \n\nRegardless of the real probability of data alterations before they are published, the major problem \n\nhappens after. We already mentioned in the first report the fact that, while correct interpretation of \n\npublic data from*the majority of average citizens*is absolutely critical, the current situation, even in \n\ncountries with (theoretical) high alphabetization and Internet access rates, is one in which most \n\npeople still lack the skills needed for such analysis. Therefore, there surely is space for both \n\nintentional manipulation of PSI and for misunderstanding it. After the publication of the first report, \n\nwe've encountered several examples of this danger, which are reported in the rest of this paragraph. \n\nBefore describing those cases, and in spite of them, it is necessary to point out one thing. While the \n\nimpact on the general public (in terms of raising interest and enhancing participation) on the Open \n\nData activity of 2010 is been, in many cases and as of today, still minimal, it is also true that there \n\nhas been no big increase in demagogy, more or less manipulated scandals and conflictual discussion \n\ncaused by Open Data. There has certainly been something of this in the Cablegate but that's not \n\nreally relevant because, as we've already explained, what Wikileaks did is intrinsically different \n\nfrom Open Data. So far, negative or at least controversial reactions by manipulation and \n\nmisunderstanding of Open Data haven't happened to such a scale to justify not opening PSI. \n\nThis said, let's look at some recent example of misunderstanding and/or manipulation based on \n\n(sometimes open) public digital data. \n\nNicolas Kayser-Bril mentioned a digital map of all the religious places in Russia, that shows \n\n[also]*\"mosques that are no longer in use, so as to convey the idea that Muslims were invading*\n\n*Russia.\"*\n\nIn September 2010 the Italian National Institute of Geophysics and Vulcanology officially declared \n\nin September 2010 that they were evaluating whether to stop publishing online Italy's seismic data, \n\nas they had been doing for years. The reason was that, following the March 2009 earthquake in \n\nItaly, the data were being used to*\"come to conclusions without any basis at all\"*, both by the press, \n\nto sell more, and by local politicians trying to hide the lack of preventive measures, like enforcing \n\nanti seismic construction codes. \n\nStill in Italy, Daniele Belleri runs a Milan crime mapping blog called \"Il giro della Nera\", making a \n\nbig effort to explain to his readers the limits of the maps he publishes, and the potential for \n\nmisunderstanding if they are used without preparation, or with wrong expectations. This is a \n\nsynthesis of Belleri's explanation, also covered in other websites, that is applicable to any map-", + "page_start": 17, + "page_end": 17, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "A well-chosen name serves both as a label for an object and as a tool for tracking and \nmanaging the object. Choosing a meaningful name is important if you decide to use \nconfiguration backup and restore. \n\nWhen you choose a name for an object, apply the following naming rules: \n\n(cid:2) Names must begin with a letter. \n\n**Important**: Do not start names by using an underscore (_) character, even though it is \npossible. The use of the underscore as the first character of a name is a reserved \nnaming convention that is used by the system configuration restore process. \n\n(cid:2) The first character cannot be numeric. \n\n(cid:2) The name can be a maximum of 63 characters, but exceptions exist. The name can be a \nmaximum of 15 characters for Remote Copy relationships and groups. The**lsfabric**\ncommand displays long object names that are truncated to 15 characters for nodes and \nsystems. V5.1.0 systems display truncated volume names when they are partnered with a \nversion V6.1.0 or later system that has volumes with long object names \n(**lsrcrelationshipcandidate**or**lsrcrelationship**commands). \n\n(cid:2) Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), the \nunderscore (_) character, a period (.), a hyphen (-), and a space. \n\n(cid:2) Names must not begin or end with a space. \n\n(cid:2) Object names must be unique within the object type. For example, you can have a volume \ncalled ABC and an MDisk called ABC, but you cannot have two volumes called ABC. \n\n(cid:2) The default object name is valid (object prefix with an integer). \n\n(cid:2) Objects can be renamed to their current names.", + "page_start": 205, + "page_end": 205, + "source_file": "sg247938.pdf" + }, + { + "text": "different rightsholders and authors. Managing opt-outs for so many different interests within \none book may get overly complicated very fast. \n\nIn any event, creating an opt-out system will need some ways of authenticating whether \nsomeone has the relevant authority to make choices about inclusion of a work. \n\n*Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The \nPile. Another possible design choice is to restrict access only to authorized users and to \nenforce particular responsibilities or obligations in return for authorization. Three particular \ndimensions of permitted uses and users came up in our discussions: \n\n•**Defining and ensuring acceptable and ethical use:**Participants discussed to what \nextent restrictions should be put on use of the resource. In the case of HathiTrust, \nacceptable use is implicitly ensured by limiting access to researchers from member \ninstitutions; other forms of “gated access” are possible, allowing access only to \ncertain types of users and for certain uses. \n One can imagine more fine-grained \nmechanisms, based on a review of the purpose for which datasets are used. This \nimagined resource could become a useful lever to demand responsible development \nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that \ncould incentivize good behavior. At the same time, drawing the lines around, let alone \nenforcing, “good behavior” would constitute a significant challenge. \n\n39 \n\n•**Charging for use to support sustainability of the training corpus itself:**While wanting \nto ensure broad access to this resource, it is important to consider economic \nsustainability, including support for continuing to update the resource with new works \nand appropriate tooling for AI training. Requiring some form of payment to use the \nresource could support sustainability, perhaps with different requirements for \ndifferent types of users (e.g., differentiating between non-commercial and \ncommercial users, or high-volume, well-resourced users and others). 40 \n\n•**Ensuring benefits of AI are broadly shared, including with book authors or**\n**publishers:**The creation of a training resource might \nlower barriers to the \ndevelopment of AI tools, and in that way support broadly shared benefits by \nfacilitating greater competition and mitigating concentration of power. On the other \nhand, just as concentration of technology industries is already a significant challenge, \nAI might not look much different, and the benefits of this resource may still simply go \nto a few large firms in “winner takes all-or-most” markets. The workshops discussed \nhow, for instance, large commercial users might be expected to contribute to a fund \nthat supported contributors of training data, or more generally to fund writers, to \nensure everyone contributing to the development of AI benefits. \n\n For examples of gated access to AI models, see https://huggingface.co/docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise.", + "page_start": 18, + "page_end": 18, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "What is an ORCID iD ?", + "target_page": 1, + "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**\n\n**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**\n\n**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**\n\n**3.7 ORCID iDs created**\n**every minute**\n\n**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**\n\n**Connections to ORCID records**\n6M \n5M \n4M \n3M \n2M \n1M \n\n2012 2013 2014 2015 2016 2017 2018 \n\n■**Live ORCID iDs**\n■**w/at least 1 education** ■**w/at least 1 employee**\n■**w/at least 1 work**\nSource: Orcid.org/statistics as of November 2018 \n\n42,500 ACTIVE \nSCHOLARLY PEER- \nREVIEWED JOURNALS \nSource: The STM Report, October 2018 \n\nSponsored by ORCID \n**To learn more go to https://orcid.org** **Institutions must increasingly recognize and demonstrate**\n**the impact of all types of research contributions**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "*Figure 14-6 Adding a recipient list*\n\n**14.2.3 Adding a report ID**\n\nThe next step is to define the reports to ODF. The report ID identifies the application group \nand application to which the report belongs. Figure 14-7 shows the window where you add \nthe report ID.", + "page_start": 345, + "page_end": 345, + "source_file": "sg246915.pdf" + }, + { + "text": "**Event ID**\nAn event ID is a value that is used to identify a unique error condition that was detected by the \nStorwize V7000. An event ID is used internally in the cluster to identify the error. \n\n**Excluded condition**\nThe excluded condition is a status condition. It describes an MDisk that the IBM Storwize \nV7000 decided is no longer sufficiently reliable to be managed by the cluster. The user must \nissue a command to include the MDisk in the cluster-managed storage. \n\n**Extent**\nAn extent is a fixed-size unit of data that is used to manage the mapping of data between \nMDisks and volumes. The size of the extent can range 16 MB - 8 GB. \n\n**External storage**\nExternal storage refers to MDisks that are SCSI logical units that are presented by storage \nsystems that are attached to and managed by the clustered system. \n\n**Failback**\nFailback is the restoration of an appliance to its initial configuration after the detection and \nrepair of a failed network or component. \n\n**Failover**\nFailover is an automatic operation that switches to a redundant or standby system or node in \na software, hardware, or network interruption. See also Failback. \n\n**Feature activation code**\nAn alphanumeric code that activates a licensed function on a product. \n\n**Fibre Channel port logins**\nFC port logins refer to the number of hosts that can see any one V7000 port. The IBM \nStorwize V7000 has a maximum limit per node port of FC logins that are allowed. \n\n**Field-replaceable unit**\nField-replaceable units (FRUs) are individual parts that are replaced entirely when any one of \nthe unit’s components fails. They are held as spares by the IBM service organization. \n\n**FlashCopy**\nFlashCopy refers to a point-in-time copy where a virtual copy of a volume is created. The \ntarget volume maintains the contents of the volume at the point in time when the copy was \nestablished. Any subsequent write operations to the source volume are not reflected on the \ntarget volume. \n\n**FlashCopy mapping**\nA FlashCopy mapping is a continuous space on a direct-access storage volume that is \noccupied by or reserved for a particular data set, data space, or file. \n\n\n \n \n \n \n [html]\n
FlashCopy relationshipSee FlashCopy mapping.
TableTable
TableParameters
\n\n**776**", + "page_start": 797, + "page_end": 797, + "source_file": "sg247938.pdf" + }, + { + "text": "The**idNode**member specifies the ID of the node. This member may not have a value of \n\n**0**. A value of**-1**indicates that child nodes do not use the**idNodeParent**member to \n\nspecify this node as their parent. Instead, this node can be a parent only by enclosing \n\nchild nodes in the EMF. Multiple nodes can have a ID of**-1**. If the ID is not**-1**, the value is \n\nunique across the document. \n\nThe**nodetype**specifies the type of structure node. This member is equal to one of the \n\nvalues from the**MSODOCEXSTRUCTTYPE**enumeration type. The following table lists \n\nexamples of document structure node types. \n\nTable 7. Document structure node types \n\n\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeParaA block of text within an article. Its parent node must be an article.
msodocexStructTypeFigureA graphical element ( for example, an image or collection of shapes ) that has a textual representation. The textual representation is the alternate text used for reading or searching the document.
msodocexStructTypeArticleA group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.
msodocexStructTypeHeadingA heading in the text.
msodocexStructTypeTableA block of text forming a table.
msodocexStructTypeTRA block of text forming a single row of a table.
msodocexStructTypeTDA block of text forming a single cell in a table row.
msodocexStructTypeTHA block of text forming a single header cell in a table row.
msodocexStructTypeListA block of text forming a list.
msodocexStructTypeListltemA block of text forming a list item.
msodocexStructTypeListBodyA block of text forming the body of a list item.
msodocexStructTypeDocumentA document.
msodocexStructTypePageA page in the document.
", + "page_start": 20, + "page_end": 20, + "source_file": "office-pdf.pdf" + }, + { + "text": "**Vital product data**\nVital product data (VPD or VDP) is information that uniquely defines system, hardware, \nsoftware, and microcode elements of a processing system. \n\n**Volume**\nA volume is an IBM Storwize V7000 logical device that appears to host systems that are \nattached to the SAN as a SCSI disk. Each volume is associated with exactly one I/O Group. A \nvolume has a preferred node within the I/O Group. \n\n**Volume copy**\nA volume copy is a physical copy of the data that is stored on a volume. Mirrored volumes \nhave two copies. Non-mirrored volumes have one copy. \n\n**Volume protection**\nTo prevent active volumes or host mappings from inadvertent deletion, the system supports a \nglobal setting that prevents these objects from being deleted if the system detects that they \nhave recent I/O activity. When you delete a volume, the system checks to verify whether it is \npart of a host mapping, FlashCopy mapping, or remote-copy relationship. In these cases, the \nsystem fails to delete the volume, unless the**-force**parameter is specified. Using the**-force**\nparameter can lead to unintentional deletions of volumes that are still active. Active means \nthat the system detected recent I/O activity to the volume from any host.", + "page_start": 809, + "page_end": 809, + "source_file": "sg247938.pdf" + }, + { + "text": "**Application Group Identifier and the Application Group ID**\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers \nthat are used by Content Manager OnDemand to identify the application group in system \ntables. \n\n**Migrate Data from Cache**\nThe Migrate Data from Cache value determines when documents and resources are migrated \nto archive storage. A storage set that is associated with a Tivoli Storage Manager client node \nmust be selected to enable migration to archive storage. \n\nThe following values are valid: \n\n(cid:2) No: Data is never migrated from cache. This option is unavailable when a storage set that \nis associated with a Tivoli Storage Manager client node is selected for the application \ngroup. \n\n(cid:2) When data is loaded: Data is migrated to archive storage when the data is loaded into the \napplication group. \n\n(cid:2) Next cache migration: Data is migrated to archive storage the next time that**ARSMAINT**is \nrun with the**-m**option. The**-m**option indicates that data and resources are copied from \ncache to archive storage. \n\n(cid:2) After__days in cache: This value specifies the number of days that data remains in cache \nstorage. After the prescribed number of days in cache storage are reached, the data is \ncopied to archive storage the next time that**ARSMAINT**is run with the**-m**option for data \nmigration. \n\n**5.2.7 IBM System Storage Archive Manager**\n\nCertain regulations require data to be stored in devices that are read only. In the past, \nphysical storage devices, such as tapes and optical disks that are Write Once Read Many \n(WORM), were used. \n\nWORM disks, such as the NetApp SnapLock or EMC Centera, can be used to store data in \nthe same manner as WORM tapes or optical platters. IBM System Storage Archive Manager \nallows critical data to be retained for a mandated period without the possibility of being \nrewritten or erased. \n\nIn this section, we describe System Storage Archive Manager and how Content Manager \nOnDemand can be configured to use this subsystem to support these WORM disk devices. \n\n**Note:**Verify support for any particular device on a particular platform through the Tivoli \nStorage Manager Device support matrix before you plan your implementation. \n\nFor more information about the Tivoli Storage Manager support of WORM disk devices, such \nas NetApp SnapLock, or EMC Centera, see the following IBM Knowledge Center documents: \n\n(cid:2)*Tivoli Storage Manager for AIX Administrator’s Guide*\n(cid:2)*Tivoli Storage Manager for Windows Administrator’s Guide*\n\nYou can obtain these documents from the IBM Tivoli Storage Manager Knowledge Center at \nthe following web address: \n\nhttp://www.ibm.com/support/knowledgecenter/SSGSG7/welcome?lang=en:", + "page_start": 127, + "page_end": 127, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Dependent VolumesVolumes are entitlees that are made of extents from a storage post. The extents of the stor post come from various MDisks. A volume can there be pred over multiple MDisks, and MDisks can serve multiple volumes. Clicking the Dependent Volume
You can get the same information with the CLI command 1sdependentvdisks.
", + "page_start": 260, + "page_end": 260, + "source_file": "sg247938.pdf" + }, + { + "text": "**The apka2e exit**\nThe**apka2e**exit translates data that is encoded in ASCII (code set IBM-850) into EBCDIC \n(code set IBM-037).*If you are converting line data to AFP, consider converting the data to*\n*EBCDIC.*A much wider selection of EBCDIC coded fonts is available than ASCII fonts. Many \ncustomers find that it is easier to use character sets and code pages that are supplied by IBM \nthan to create their own character sets and code pages. To use these predefined EBCDIC \ncoded fonts, the data must be in EBCDIC. \n\nWhen you use the**apka2e**exit, you must manually change your indexing parameters: \n\n(cid:2) Change an ASCII CPGID to an EBCIDIC CPGID; for example, change CPGID=850 to \nCPGID=500. \n\n(cid:2) Change the HEX codes for the triggers and index names from ASCII to EBCDIC. If you do \nnot, you receive ACIF return code 16, which states that it cannot find trigger1 or any fields. \n\nWe used a hex editor to determine the new EBCDIC values and typed them by keyboard edit \ninto the parameter file. If you do not have a hex editor, you can find conversion tables on the \nInternet. \n\nFor more information about how to update indexing parameters, see 11.2.6, “Debugging input \nuser exit programs” on page 247. \n\n**The asciinp exit**\nThe**asciinp**exit program is used when the data does not contain carriage controls. Instead, \nit contains “PC style” carriage returns and form feeds X'0D0A' and X'0D0C'. This program is \nprovided by IBM. The program transforms the ASCII data stream into a format that contains a \ncarriage control character in byte 0 of every record. \n\nThe**asciinp**exit performs the following actions: \n\n(cid:2) Inserts a new page command (X'31') at the top of the first page. \n\n(cid:2) Removes the ASCII carriage return (X'0D'). \n\n(cid:2) Inserts an ASCII new line (X'20') carriage control at byte 0 of each line, except the first \nline on a new page. \n\n(cid:2) Replaces the ASCII form feed (X'0C') with an ASCII new page command (X'31'). \n\n(cid:2) Leaves X'0A' in the file. \n\n**Note:**Because the**asciinp**exit inserts carriage control characters in byte 0 of your \ndocument, and leaves X'0A', it changes the position of the triggers and fields. If you use \nthis exit, you must add 1 to the column offsets for the triggers and fields. \n\n**The asciinpe exit**\nThe**asciinpe**exit combines the previous two exits. It converts the data from ASCII to \nEBCDIC and inserts EBCDIC carriage control characters. For full documentation about this \nsample program, see the asciinpe.c source code. \n\n**11.2.3 Index record exit**\n\nUse the index record exit to modify or ignore the records that ACIF writes in the index object \nfile. The program, which is specified in the ACIF*indxexit parameter*, receives control before a \nrecord is written to the index object file. The user-written program can instruct ACIF to use the \nrecord, to not use the record, or to edit the record before the record is inserted into the index \nobject file. \n\n**244** IBM Content Manager OnDemand Guide", + "page_start": 267, + "page_end": 267, + "source_file": "sg246915.pdf" + }, + { + "text": "**Chapter 14. Report distribution**\n\nIBM Content Manager OnDemand Distribution Facility (ODF) is an optional report distribution \nfeature for IBM Content Manager OnDemand. ODF provides an easy way to automatically \ngroup reports and portions of reports and distribute the reports to multiple users. ODF \ndistributions can be printed, created as an output file, or emailed as an attachment. \n\nODF can distribute reports that are stored in a Content Manager OnDemand server on any \nplatform that is supported by Content Manager OnDemand. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Introduction to Content Manager OnDemand Distribution Facility \n(cid:2) Defining the objects with the Administrator Client \n(cid:2) Defining the objects by using batch administration \n(cid:2) Customizable user exits \n(cid:2) Status and monitor tool", + "page_start": 338, + "page_end": 338, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", + "target_page": 3, + "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting \n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17–19]. We note in \n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly \n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] \n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water. \n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How- \n\never, these systems have not yet been investigated in any great depth. Such systems are compli- \n\ncated because their behaviour is determined by the interplay between the various solute (or colloid) \n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one \n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number \n\nof experiments have been performed employing (colloidal) solutions of polymers [22–25], macro- \n\nmolecules like collagen and DNA [26–31] and nanoparticles [32–40]. The latter are sometimes \n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on \n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi- \n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from \n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’ \n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when \n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "[97] U. Thiele, M. G. Velarde, K. Neuffer, and Y. Pomeau, “Film rupture in the diffuse interface model \n\ncoupled to hydrodynamics,” Phys. Rev. E 64, 031602 (2001). \n\n[98] J. Heier, J. Groenewold, F. A. Castro, F. Nueesch, and R. Hany, “Enlarged bilayer interfaces from \n\nliquid-liquid dewetting for photovoltaic applications,” P Soc Photo-Opt Instrum Eng 6999, J9991– \n\nJ9991 (2008). \n\n[99] M. D. Haw, M. Gillie, and W. C. K. Poon, “Effects of phase behavior on the drying of colloidal \n\nsuspensions,” Langmuir 18, 1626–1633 (2002). \n\n[100] L. V. Govor, J. Parisi, G. H. Bauer, and G. Reiter, “Instability and droplet formation in evaporating \n\nthin films of a binary solution,” Phys. Rev. E 71, 051603 (2005). \n\n[101] L. V. Govor, G. Reiter, G. H. Bauer, and J. Parisi, “Self-assembled treelike patterns from an evapo- \n\nrating binary solution,” Phys. Rev. E 74, 061603 (2006). \n\n[102] M. Yamamura, T. Nishio, T. Kajiwara, and K. Adachi, “Evaporation-induced pattern formation in \n\npolymer films via secondary phase separation,” Chem. Eng. Sci. 57, 2901–2905 (2002). \n\n[103] P. M¨uller-Buschbaum, E. Bauer, S. Pfister, S. V. Roth, M. Burghammer, C. Riekel, C. David, and \n\nU. Thiele, “Creation of multi-scale stripe-like patterns in thin polymer blend films,” Europhys. Lett. \n\n73, 35–41 (2006). \n\n[104] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, and O. Gengelman, “Meso- \n\nscopic patterning in evaporated polymer solutions: New experimental data and physical mecha- \n\nnisms,” Langmuir 21, 9604–9609 (2005). \n\n[105] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, V. Z. Gaisin, R. Cohen, and \n\nO. V. Gendelman, “Mesoscopic patterning in thin polymer films formed under the fast dip-coating \n\nprocess,” Macromol. Mater. Eng. 290, 114–121 (2005). \n\n[106] J. B. Gibson, K. Zhang, K. Chen, S. Chynoweth, and C. W. Manke, “Simulation of colloid-polymer \n\nsystems using dissipative particle dynamics,” Mol. Simul. 23, 1–41 (1999). \n\n[107] K. Stratford and I. Pagonabarraga, “Parallel simulation of particle suspensions with the lattice Boltz- \n\nmann method,” Comput. Math. Appl. 55, 1585–1593 (2008). \n\n[108] G. Drazer, B. Khusid, J. Koplik, and A. Acrivos, “Wetting and particle adsorption in nanoflows,” \n\nPhys. Fluids 17, 017102 (2005). \n\n[109] J. Kromkamp, D. van den Ende, D. Kandhai, R. van der Sman, and R. Boom, “Lattice Boltzmann \n\nsimulation of 2d and 3d non-Brownian suspensions in Couette flow,” Chem. Eng. Sci. 61, 858–873 \n\n(2006).", + "page_start": 31, + "page_end": 31, + "source_file": "1001.2669.pdf" + }, + { + "text": "Benard instability,” Phys. Rev. Lett. 88, 164501 (2002). \n\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, “Spontaneous formation of nanoparticle stripe \n\n\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\n\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "fast evaporation [104, 105]. These complex experimental systems all represent systems of high \n\npractical interest that the theories presented here are not (yet) able to describe. Such experiments \n\ndo, however, provide a strong motivation for further work to extend the theories presented here, as \n\nwell as to develop new approaches. \n\nLet us finally mention that several topics were entirely excluded from our discussion here. First, we \n\nfocused on a limited range of descriptions and did, for instance, not mention lattice Boltzmann, \n\nmolecular dynamics or dissipative particle dynamics approaches that may also be employed to \n\ndescribe fluid suspensions [106–109]. Second, we have only discussed spatially homogeneous \n\nsubstrates. Patterned substrates are widely used in dewetting experiments [38, 110–112]. Theoret- \n\nical descriptions are well developed for the dewetting of films of pure non-volatile liquids on such \n\nsubstrates [68, 113–119]. However, in the case of volatile liquids on heterogeneous substrates, \n\nmuch less work has been done. A third topic that we did not touch upon are possible continuum \n\nthin film approaches to demixing dewetting suspensions. We believe it is feasible to extend the \n\ndiffuse interface theories such as model-H [120] to include the influence of evaporation in dewet- \n\nting nanoparticle suspensions. For instance, such models have already been adapted to describe \n\ndemixing free surface films of polymer blends [121–123]. \n\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We \n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants \n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)]. \n\n[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985).", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, “Polymers on nanope- \n\nriodic, heterogeneous surfaces,” Phys. Rev. Lett. 82, 2602–2605 (1999). \n\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, “Pattern-directed dewetting of \n\nultrathin polymer films,” Langmuir 18, 7041–7048 (2002). \n\n[112] M. Geoghegan and G. Krausch, “Wetting at polymer surfaces and interfaces,” Prog. Polym. Sci. 28, \n\n261–302 (2003). \n\n[113] P. Lenz and R. Lipowsky, “Morphological transitions of wetting layers on structured surfaces,” Phys. \n\nRev. Lett. 80, 1920–1923 (1998). \n\n[114] C. Bauer, S. Dietrich, and A. O. Parry, “Morphological phase transitions of thin fluid films on chem- \n\nically structured substrates,” Europhys. Lett. 47, 474–480 (1999). \n\n[115] R. Konnur, K. Kargupta, and A. Sharma, “Instability and morphology of thin liquid films on chemi- \n\ncally heterogeneous substrates,” Phys. Rev. Lett. 84, 931–934 (2000). \n\n[116] M. Brinkmann and R. Lipowsky, “Wetting morphologies on substrates with striped surface domains,” \n\nJ. Appl. Phys. 92, 4296–4306 (2002). \n\n[117] L. Brusch, H. K¨uhne, U. Thiele, and M. B¨ar, “Dewetting of thin films on heterogeneous substrates: \n\nPinning vs. coarsening,” Phys. Rev. E 66, 011602 (2002). \n\n[118] U. Thiele, L. Brusch, M. Bestehorn, and M. B¨ar, “Modelling thin-film dewetting on structured sub- \n\nstrates and templates: Bifurcation analysis and numerical simulations,” Eur. Phys. J. E 11, 255–271 \n\n(2003). \n\n[119] U. Thiele, “Open questions and promising new fields in dewetting,” Eur. Phys. J. E 12, 409–416 \n\n(2003). \n\n[120] D. M. Anderson, G. B. McFadden, and A. A. Wheeler, “Diffuse-interface methods in fluid mechan- \n\nics,” Ann. Rev. Fluid Mech. 30, 139–165 (1998). \n\n[121] U. Thiele, S. Madruga, and L. Frastia, “Decomposition driven interface evolution for layers of binary \n\nmixtures: I. Model derivation and stratified base states,” Phys. Fluids 19, 122106 (2007). \n\n[122] O. A. Frolovskaya, A. A. Nepomnyashchy, A. Oron, and A. A. Golovin, “Stability of a two-layer \n\nbinary-fluid system with a diffuse interface,” Phys. Fluids 20, 112105 (2008). \n\n[123] S. Madruga and U. Thiele, “Decomposition driven interface evolution for layers of binary mixtures:", + "page_start": 32, + "page_end": 32, + "source_file": "1001.2669.pdf" + }, + { + "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind \n\n[18]. \n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av- \n\nerage concentration of the nanoparticles ρav \nn ; only the mean finger width increases with increasing \n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) \n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier \n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a \n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten- \n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These \n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of \n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable \n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of \n\nthe nanoparticles. \n\nIf the particle diffusivity is low, the front ‘collects’ the particles, resulting in a build up of the \n\nparticles at the front that itself is slowed down. This makes the front unstable and any fluctuation \n\nalong the front will trigger a transverse instability that results in an evolving fingering pattern. This \n\nhappens even when the particle-liquid and particle-particle attractive interactions do not favour \n\nclustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a \n\npurely dynamic effect and energetics plays no role in determining the number of fingers. We call \n\nthis the ‘transport regime’. \n\nTo illustrate the influence of energetics (characterized by the interaction parameters εij) on finger- \n\ning in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction \n\nstrength εnl. For εnl ≥ 1.5 the mean finger number < f > is nearly constant; this is the trans- \n\nport regime. However, on decreasing εnl below 1.5, we observe a marked increase in the value \n\nof < f >, indicating that energy plays an important role in determining the number of fingers in \n\nthis regime. In this parameter range, demixing of particles and liquid occurs at the moving front \n\nand increases its transverse instability. In this ‘demixing regime’, the wavelength of the fingering \n\ninstability is determined by the dynamics and the energetics of the system. Decreasing εnl further \n\n(below 1.4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger num- \n\nber. This is a geometric effect resulting from our one-dimensional finger counting routine: The \n\nfingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv), \n\nthe measure (cid:104)f (cid:105) does not represent a finger number but instead indicates a decrease in the typical", + "page_start": 11, + "page_end": 11, + "source_file": "1001.2669.pdf" + }, + { + "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", + "page_start": 17, + "page_end": 17, + "source_file": "1001.2669.pdf" + }, + { + "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase \n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole \n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts. \n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A \n\nselection of images exhibiting some of the possible structures is displayed in Fig.1. \n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such \n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the \n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating \n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga- \n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular \n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and – in the case of DNA – liquid crys- \n\ntalline structures [22, 30, 45–49]. The deposition of regularly spaced straight lines orthogonal to \n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em- \n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature \n\n[51–53]. \n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and \n\ntheoretically [55–58]. In this case, different contact line instabilities have been observed for evap- \n\norating liquid drops [59, 60]. \n\nIn the present article we review and preview the experiments and in particular the various mod- \n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol- \n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev- \n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, \n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec- \n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the \n\nindividual approaches and future challenges to all of them. \n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold \n\nnanoparticles in toluene [33, 34, 37–40, 61]. The gold core of 2 – 3 nm diameter is coated by a layer \n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments \n\nranges from 6 to 12 carbon atoms (C6 to C12) [40]. By varying the chain length, one can control", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2669.pdf" + }, + { + "text": "distance between particle clusters resulting from the demixing process that occurs already in the \n\nbulk liquid and is not related to the front instability at all. Note that one finds a similar sequence \n\nof regimes (i) to (iv) when increasing the particle-particle interaction strengths for fixed εnl (see \n\nRef. [41]) for further details. \n\nFIG. 3: (Colour online) Dependence of the mean finger number left behind by the unstable dewetting \n\nfront on the particle-liquid interaction strength εnl. The regions marked (i) to (iv) are discussed in the \n\nmain text. The insets display typical snapshots obtained in the four different regions. Particles are black, \n\nliquid is grey (green online) and the empty substrate is white. The remaining parameters are kT = 0.2, \n\nM = 20, µ = −2.2, ρav \nn = 0.1, (cid:15)nn = 2.0, domain size 1200 × 1200. For the insets, from left to right, \n\n(cid:15)nl = 1.2, 1.4, 1.45, 1.8. \n\nWe note also that the fingering process may be viewed as self-optimising the front motion – i.e. \n\nthe front keeps its average velocity constant by expelling particles into the fingers. A similar effect \n\nexists for dewetting polymer films [18], where liquid is expelled from the growing moving rim \n\nwhich collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet \n\npattern. \n\n\n \n \n \n \n [html]\n
The kinetic MonteCarlo modeThere and is a very useful toolAccessions one to understand the patternformation in dryingnanoparticleAssuspensions. One hasPercent, to keep in mind the restrictionsTableTableTableTable
", + "page_start": 12, + "page_end": 12, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", + "target_page": 12, + "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "FIG. 6: Profiles of the final dried-in nanoparticle layer for the dewetting of a suspension of nanoparticles \n\nin a volatile solvent that partially wets the substrate for (a) high (Ω = 10−3), (b) medium (Ω = 2 × 10−6) \n\nand (c) low (Ω = 0.78 × 10−8) evaporation rates, for the case when χ = H/l0 = 1.09, the lateral length \nscale is (cid:96) = (cid:112)γ/κH with κ = (Sp/l0) exp(d0/l0)H being an energy scale related to wettability and the \nvertical length scale is H = (cid:112)2SLW /κd0. The remaining dimensionless parameters are the evaporation \nnumber Ω = Qeη0(cid:96)2/H 3, the diffusion number Γ = D(0)η0/Hκ = 10−4 and the dimensionless chemical \n\npotential M = Hµ/κ = −0.0035. The system size is L = 19500(cid:96). Film thickness and hp in the plots are \n\ncircular throughout the dewetting and evaporation process. In this case one should interprete the \n\ncoordinate x as the distance from the centre of the circular film. \n\nWe start with a film of height h0 of finite length sitting on a precursor film and assume that the film \n\ncontains nanoparticles at constant concentration φ0. The chosen parameter values ensure that the \n\nfilm of thickness h0 is linearly stable. As we do not incorporate noise, no nucleation of additional \n\nholes can occur (even with noise the probability would be extremely low). Without evaporation the \n\nfilm dewets ‘classically’ by a retraction of the initially step-like front. After a short time, surface \n\ntension smoothes the profile of the receding front and a capillary rim forms that collects all the", + "page_start": 19, + "page_end": 19, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 7: (Colour online) A sequence of profiles during a dewetting process with competing evaporation and \n\nconvection that leads to the dried-in ring structure of nanoparticles displayed in Fig. 6(b). Profiles are at (a) \n\nbefore pinning (t = 0.08T ), (b) at self-pinning (t = 0.13T ), and (c) after depinning (t = 0.29T ), where \n\nT = 3 × 1010τ with τ = η0γH/κ2 (T is of order of 1s). The film thickness profiles h are the bold solid \n\nlines, the nanoparticle concentrations φ are the dotted lines and the nanoparticle layer height hp = hφ are \n\nthe dashed lines. The remaining parameters and scalings are as in Fig. 6(b). \n\n(i) in Fig. 8). The concentration increases further and when it approaches random close packing \n\nφc, the viscosity diverges and the front pins itself. When pinned, further retraction only occurs \n\nthrough evaporation (Fig. 7(b) and regime (ii) in Fig. 8). The front eventually depins and starts \n\nto move again, leaving a nanoparticle ring behind (Fig. 7(c) and regime (iii) in Fig. 8). However, \n\nthe velocity is not as large as at the beginning, owing to the fact that the mean concentration of \n\nparticles has increased. The remaining particles are transported to the centre and are deposited \n\n\n \n \n \n \n [html]\n
DECE WIESIThe simple model used here shows, ( i ) that the contact line stops due to self - piming by the de -posited particles and ( ii ) the Marangoni effect is not necessary for the ring formation. The modelcan easily be refined to account for solutal and / or thermal Marangoni effects [ 88 ] but self - pining
", + "page_start": 21, + "page_end": 21, + "source_file": "1001.2669.pdf" + }, + { + "text": "dewetted liquid. The front recedes until all liquid is collected in a central drop. Since no liquid \n\nevaporates [Qnc = 0 in Eq. (1)], the particle concentration does not change during the process. \n\nThe situation changes when allowing for evaporation (Qnc > 0). Now the front may retract \n\nby convection and/or evaporation. Evaporation leads to the possibility of a strong increase in \n\nthe particle concentration at the contact line as evaporation is strongest there. Due to the strong \n\nnonlinear dependence of the viscosity on the particle concentration, this may lead to a dramatic \n\ndecrease of the convective contribution to the front velocity. For moderate evaporation rates, this \n\nmay result in a (temporary) self-pinning of the front. Within the present basic model, the process \n\ncan (after complete dry-in) result in three different basic deposition patterns: (i) for very fast \n\nevaporation rates, all other processes occur over time scales that are much larger. In particular, the \n\neffects of convective redistribution of the liquid are neglectable. As a result one finds that a nearly \n\nhomogeneous film of nanoparticles of thickness hp = φ0h0 is deposited (see Fig. 6(a)). Convection \n\nonly results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease \n\nin hp on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial \n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective \n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the \n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under \n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending \n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at \n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a \n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase \n\nagain (see Fig. 6(b)). \n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus- \n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of \n\nmicrometers. Pinning of the contact line and thermal Marangoni effects are often mentioned as \n\nnecessary conditions for the ring formation. The contact line pinning is often assumed to result \n\nfrom substrate heterogeneities. Film height and concentration profiles at various instants during \n\nthe dewetting process are displayed in Fig. 7. The profiles are from before, at and after self-pinning \n\nof the contact line. In Fig. 8 we display a space-time plot for the complete process. At first, the \n\nfront recedes in the same manner as when there is no evaporation, but now driven by convection \n\nand evaporation. A small capillary rim forms that collects all the dewetted liquid that does not \n\nevaporate. The particle concentration slowly increases at the contact line (Fig. 7(a) and regime", + "page_start": 20, + "page_end": 20, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 5: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles \n\nwith average density ρav \nn = 0.3 and with the liquid excluded from the region y < 0. The top row shows \n\nthe nanoparticle density profiles and bottom row the corresponding liquid density profiles at the times \n\nt/tl = 1000 (left), 10000 (middle) and 30000 (right), where tl = 1/kT M nc \nl σ2. The parameters are \n\nkT /εll = 0.8, εnl/εll = 0.6, εnn = 0, α = 0.2M nc \nl σ4, M c l = 0, ρl(t = 0) = 0.9 ± ξ (where ξ represents \n\nwhite noise of amplitude 0.05) and (µ − µcoex)/kT = −0.78. \n\nThis theory allows us to study the time evolution of the evaporating film of nanoparticle suspension \n\nwithout some of the restrictions of the kinetic Monte Carlo model. Here, however, we illustrate its \n\napplication in similar parameter regimes as used above for the KMC. We focus on two examples: \n\n(i) the spinodal dewetting of a initially flat film of nanoparticle suspension characterised by con- \n\nstant ρl and ρn (Fig. 4); and (ii) the retraction of a dewetting front that is unstable with respect to \n\na fingering instability (Fig. 5). \n\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the \n\nparameter region of the phase diagram where spinodal dewetting occurs. For small times the film \n\nbecomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The \n\nnanoparticles concentrate where the remaining liquid is situated. However, they are ‘slow’ in their \n\nreaction: when ρl already takes values in the range 0.08 – 0.83, the nanoparticle concentration \n\nhas only deviated by about 25% from its initial value. The film thins strongly forming many", + "page_start": 16, + "page_end": 16, + "source_file": "1001.2669.pdf" + }, + { + "text": "substrate and force equilibria at the free surface, and applies a long-wave approximation. Under \n\nthe assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled \n\nnon-linear evolution equations for the film thickness profile h(x, t) and the amount of nanoparticles \n\nper unit length hp = φh, where φ is the volume concentration of the nanoparticles. Note, that hp \n\ncorresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The \n\nresulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence \n\nof particle-independent capillarity and wettability only, the energy functional F [h] is given by \n\nEq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. \n\n[88, 89, 91, 92] we use the Quemada law for dense suspensions [93–95] \n\n(cid:18) (cid:19)−2 \n\nφ \nφc \nη(φ) = η0 \n1 − (8) \n\nwhere φc = 0.64 corresponds to random close packing of spherical particles. For the nanoparticle \n\nvolume per length hp = φh one obtains the following evolution equation: \n\n(cid:20) (cid:21) \n\nδF \nδh \n∂t(φh) = ∇ · φQc∇ \n+ ∇ · [D(φ)h∇φ] , (9) \n\nwhere the particle concentration dependent diffusion coefficient D(φ) is related to the viscosity by \n\nthe Einstein relation D(φ) = kT /6πRη(φ), where R is the radius of the nanoparticles [96]. \n\nWe illustrate results obtained employing this thin film theory using the single example of a re- \n\nceding dewetting front for a partially wetting film. We use the disjoining pressure and material \n\nconstants for the liquid considered in Ref. [57], where the evaporative and convective dewetting \n\nof a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The \n\nexpression that we employ for the local free energy term in Eq. (2) is: \n\n(cid:18) d0 − h \nl0 \n\n(cid:19) \nSLW d2 \n0 \nf (h) = \nh2 + SP exp \n, (10) \n\nwhere the parameters characterising the interaction between the liquid film and the surface are \n\nthe apolar and polar spreading coefficients SLW and SP , respectively, the Debye length l0 and the \n\nBorn repulsion length d0 [57]. The resulting disjoining pressure Π = −∂hf (h) allows for a stable \n\nprecursor film (thickness hprecursor) and also has a second (larger) thickness (h0) that corresponds \n\nto a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of \n\nfilm and drop states for similar disjoining pressures. Our results are calculated for a system where \n\nthe profiles only vary in one Cartesian direction (x), corresponding to a straight dewetting front. \n\nHowever, our results may also be interpreted as applying to a circular flat drop whose front remains \n\n19", + "page_start": 18, + "page_end": 18, + "source_file": "1001.2669.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "Modelling approaches to the dewetting of evaporating thin films of \n\nnanoparticle suspensions \n\nU. Thiele∗, I. Vancea, A. J. Archer, M. J. Robbins, L. Frastia \n\nDepartment of Mathematical Sciences, \n\nLoughborough University, Leicestershire LE11 3TU, UK \n\nA. Stannard, E. Pauliac-Vaujour, C. P. Martin, M. O. Blunt, P. J. Moriarty \n\nThe School of Physics and Astronomy, \n\nThe University of Nottingham, Nottingham NG7 2RD, UK \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n] \nt \nf \no \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n9 \n6 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 2: Typical KMC results for the final dried-in nanoparticle structures resulting from the evaporative \n\ndewetting processes of nanoparticle solutions (nanofluids) in the case of (a) a spinodal-like process at µ = \n\n−2.55, (b) nucleation and growth of holes at µ = −2.3, (c) unstable fronts at µ = −2.3 and low mobility \n\nM = 5, and (d) unstable fronts at µ = −2.3 and medium mobility M = 10. The starting configuration in \n\n(a) and (b) is a homogeneous liquid film with uniformly distributed particles whereas in (c) and (d) a hole \n\nat the center is nucleated ‘by hand’. The remaining parameters are (a,b) M = 50, (cid:15)nl = 2.0, (cid:15)nn = 1.5, \n\nn = 0.2, kT = 0.3, MC steps= 500, domain size 1200 × 1200; (c,d) εnn = 2.0, (cid:15)nl = 1.5, ρav \nρav n = 0.2, \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 10, + "page_end": 10, + "source_file": "1001.2669.pdf" + }, + { + "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain \n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally \n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding \n\nexcess thiol one can also vary the properties of the solvent [40]. \n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin- \n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the \n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds \n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo- \n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For \n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin- \n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing \n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by \n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced \n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the \n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find \n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched \n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a \n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the \n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold \n\ncores. For short chains (C5 and C8) no formation of branched structures is observed. At similar \n\nconcentrations, well-developed branched structures are formed for longer chains (C10 and C12). \n\nFor even longer chains (C14), however, one again finds less branching. It also depends on the \n\namount of excess thiol in the solvent (for details see Ref. [40]). \n\nWhen following the evolution of the branched patterns in situ (see the complementary video \n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght \n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. \n\nThe macroscopic front can be transversely unstable resulting in large-scale (> 100µm) strongly \n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc- \n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be- \n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 1: (Colour online) Images of strongly ramified dewetting structures obtained using Atomic Force \n\nMicroscopy in the case of (a) an aqueous collagen solution on graphite (courtesy of U. Thiele, M. Mertig \n\nand W. Pompe; see also Ref. [42]. Image size: 5µm×5µm); (b) poly(acrylic acid) in water spin-coated onto \n\na polystyrene substrate (reprinted with permission of John Wiley & Sons, Inc. from Ref. [23]; copyright \n\nJohn Wiley & Sons, Inc. 2002; Image size: 2.5µm×2.5µm); and in both (c) and (d), a solution of gold \n\nnanoparticles in toluene, spin-coated onto native oxide terminated silicon substrates (scale bars given in \n\npanels). In all the images the lighter areas correspond to the deposited solute and the dark areas to the \n\nempty substrate. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", + "target_page": 18, + "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. \n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-", + "page_start": 22, + "page_end": 22, + "source_file": "1001.2669.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. \n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro- \n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions \n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface \n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness \n\nprofile h(x, y, t). In the case of volatile liquids one finds [55–58, 64] \n\n(cid:20) \nQc∇ \n\n(cid:21) \n\nδF \nδh δF \nδh \n− Qe \n, \n\nwith the mobility functions Qc(h) = h3/3η ≥ 0 (assuming Poiseuille flow in the film and no slip \n\nat the substrate; η is the dynamic viscosity) and Qe ≥ 0 for the convective and evaporative part \n\nof the dynamics, respectively. Qe is a rate constant that can be obtained from gas kinetic theory \n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the \n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the \n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65–69]. Finally, ∇ = (∂x, ∂y), and \n\n∂t, ∂x and ∂y denote partial derivatives w.r.t. time and the coordinates. \n\nFocusing on the influence of capillarity and wettability only, the energy functional F [h] is given \n\nby \n(cid:90) (cid:90) \n\n(cid:104) γ \n2 \n(cid:105) \n(∇h)2 + f (h) − µh F [h] = dx dy (2) \n\n7", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion \n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the \n\nKMC for investigations of the early instability stages: they are more easy to discern without the \n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of \n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations \n\n(in analogy to the approach used in Refs. [19, 86, 87]). \n\nThe previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18", + "page_start": 17, + "page_end": 17, + "source_file": "1001.2669.pdf" + }, + { + "text": "where γ is the liquid-gas surface tension and f (h) is a local free energy term that describes the \n\nwettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias \n\nthe system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. \n\nIt contains the curvature (Laplace) pressure −γ∆h and the disjoining pressure Π(h) = −∂hf (h). \n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70–73]). \n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar- \n\nticles are not taken into account. However, under certain conditions one can augment equation (1) \n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean \n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so- \n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. \n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How- \n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film \n\nand may explain why one has such good agreement between the experimentally observed patterns \n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model \n\n[35]. We introduce the KMC model below in Section III A. \n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po- \n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting \n\ninteraction of the solvent with the substrate are collected in a single parameter – an effective chem- \n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the \n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining \n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to \n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the \n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to \n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term \n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal \n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three- \n\ndimensional models are also discussed in the literature [76, 77]. \n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied \n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "Abstract \n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions \n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled \n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to \n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model. \n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched \n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic \n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative \n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition \n\nin the film and contact line motion is discussed. \n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ \n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is \n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect. \n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as \n\npossible future developments and extensions. \n\nJ. Phys.-Cond. Mat. 21, 264016 (2009), The paper is published in: \n\nin the Volume “Nanofluids on solid substrates” and can be obtained at \n\nhttp://dx.doi.org/10.1088/0953-8984/21/26/264016", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2669.pdf" + }, + { + "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. \n\nThe kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the \n\n(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between \n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- \n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "substrate and force equilibria at the free surface, and applies a long-wave approximation. Under \n\nthe assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled \n\nnon-linear evolution equations for the film thickness profile h(x, t) and the amount of nanoparticles \n\nper unit length hp = φh, where φ is the volume concentration of the nanoparticles. Note, that hp \n\ncorresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The \n\nresulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence \n\nof particle-independent capillarity and wettability only, the energy functional F [h] is given by \n\nEq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. \n\n[88, 89, 91, 92] we use the Quemada law for dense suspensions [93–95] \n\n(cid:18) (cid:19)−2 \n\nφ \nφc \nη(φ) = η0 \n1 − (8) \n\nwhere φc = 0.64 corresponds to random close packing of spherical particles. For the nanoparticle \n\nvolume per length hp = φh one obtains the following evolution equation: \n\n(cid:20) (cid:21) \n\nδF \nδh \n∂t(φh) = ∇ · φQc∇ \n+ ∇ · [D(φ)h∇φ] , (9) \n\nwhere the particle concentration dependent diffusion coefficient D(φ) is related to the viscosity by \n\nthe Einstein relation D(φ) = kT /6πRη(φ), where R is the radius of the nanoparticles [96]. \n\nWe illustrate results obtained employing this thin film theory using the single example of a re- \n\nceding dewetting front for a partially wetting film. We use the disjoining pressure and material \n\nconstants for the liquid considered in Ref. [57], where the evaporative and convective dewetting \n\nof a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The \n\nexpression that we employ for the local free energy term in Eq. (2) is: \n\n(cid:18) d0 − h \nl0 \n\n(cid:19) \nSLW d2 \n0 \nf (h) = \nh2 + SP exp \n, (10) \n\nwhere the parameters characterising the interaction between the liquid film and the surface are \n\nthe apolar and polar spreading coefficients SLW and SP , respectively, the Debye length l0 and the \n\nBorn repulsion length d0 [57]. The resulting disjoining pressure Π = −∂hf (h) allows for a stable \n\nprecursor film (thickness hprecursor) and also has a second (larger) thickness (h0) that corresponds \n\nto a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of \n\nfilm and drop states for similar disjoining pressures. Our results are calculated for a system where \n\nthe profiles only vary in one Cartesian direction (x), corresponding to a straight dewetting front. \n\nHowever, our results may also be interpreted as applying to a circular flat drop whose front remains \n\n19", + "page_start": 18, + "page_end": 18, + "source_file": "1001.2669.pdf" + }, + { + "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti- \n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. 37, 9325–9333 (2004). \n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal \n\ndecomposition,” J. Chem. Phys. 121, 4246–4254 (2004). \n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi- \n\nals,” J. Chem. Phys. 128, 084701 (2008). \n\n[84] P. M. Chaikin and T. C. Lubensky, Principles of condensed matter physics, Cambridge University \n\nPress (1997). \n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor, \n\n“Solids far from Equilibrium,” pages 297–363, Cambridge University Press (1992). \n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). \n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J. \n\nAppl. Math. 68, 760–783 (2008). \n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets \n\ncontaining nanoparticles,” Langmuir (2009), online available. \n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle \n\nI. Viscosity-concentration relationship,” Rheol. Acta 16, 82–94 (1977). \n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological \n\nmodeling,” Adv. Colloid Interface Sci. 98, 51–85 (2002). \n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev. \n\nFluid Mech. 37, 129–149 (2005).", + "page_start": 30, + "page_end": 30, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What is AgMERRA ?", + "target_page": 2, + "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Geology \n\nThe silver and gold mineralisation is hosted \nwithin tertiary-aged volcanic units at Arqueros \nand Teterita, and in Paleozoic sediments at \nChimberos. The alteration and mineralisation \nare all Miocene in age and associated with the \nCerros Bravos paleovolcano. \n\nMineralisation comprises two main compo- \nnents. Silver-rich horizontal units termed \n‘mantos’ (Spanish for blanket) and a series of \nnear-vertical, cross-cutting gold-rich structures. \nThe mantos silver mineralisation is hosted by \nvuggy silica within dacitic lapilli tuff. Mantos \noccurs at Arqueros and Teterita where the \nmineralising process has replaced horizontal \nporous tuffs. At Chimberos, silver mineralisation \nis hosted in vuggy silica hydrothermal breccia \nsuperimposed on folded Paleozoic sediments. \nFeasibility Study \n\nThe vertical gold-rich mineralisation, also charac- \nterised by vuggy silica, is well-developed at \nArqueros. It has been interpreted as feeders for \nmineralising fluids. Nonetheless, this style of \nmineralisation has not yet been observed at \nTeterita and is poorly preserved at Chimberos. \n\n\n\nA Definitive Feasibility Study commenced on the \nproject at the end of May 2011 with the focus \non Arqueros, and open pit mining of that deposit \nwith processing by traditional mill and agiitation \nleaching in cyanide. Subsequent acquisition of \nthe Teterita and Chimberos deposits resulted in \nan expansion of the feasibility study to incorpo- \nrate their resources. \nThe environmental permitting process for the \noriginal Arqueros project has been completed, \nwith approval to commence construction and \nmining granted by the Chilean authorities. \nA modification of the environmental assessment \nis being prepared to have the approvals modified \nfor heap leaching and on-site power generation. \n\nExtensive community consultation has been \nundertaken with positive outcomes, and rela- \ntionships with indigenous rural and urban \ncommunities remain a priority. \n\nIn late 2012, a decision was taken to examine \nlower cost options for processing using heap \nleaching. With major engineering already done, \ntechnical studies focussed on metallurgical \ntestwork and heap leach design. It has been \nestablished that the mineralisation from the \nthree deposits can be processed by HPGR (High \nPressure Grinding Rolls) crushing and heap \nleaching with silver and gold recoveries of the \norder of 70% to 75% for silver and 65% to 70% \nfor gold. The project development plan is now \nfocussed on a 3 million tonne per annum heap \nleach operation with an initial mine life of over 6 \nyears. Annualised production levels (post ramp- \nup) are estimated at 6.0–8.0 million ounces of \nsilver and 18,000–22,000 ounces of gold, at an \nindicative start-up capital cost between \nUS$130–150 million (inclusive of 25% \ncontingency). \n\nResource \n\nKingsgate has updated the project resource \nbase to incorporate the recent drilling on the \nChimberos project and using the current gold/ \nsilver ratio of 60 (previously 45) for its gold \nequivalent (AuEq60) and silver equivalent \n(AgEq60) calculations.The combined Measured, \nIndicated and Inferred mineral resource for the \nNueva Esperanza Project is based on resource \nblock modelling of Arqueros, Chimberos and \nTeterita, and has been estimated at a cut-off \ngrade of 0.5 grams per tonne (g/t), gold equiva- \nlent (AuEq60) to be 28.9 million tonnes at \n0.27 g/t gold and 84 g/t silver. \n\nThis represents about 250,000 ounces of gold \nand 78.5 million ounces of silver. \n\nThe Measured, Indicated and Inferred resource \nmay be expressed in gold or silver equivalent \nounces as: \n〉〉 Gold equivalent ounces (AuEQ60): 1.6 \nmillion ounces at 1.7 g/t gold equivalent; and \n\n〉〉 Silver equivalent ounces (AgEQ60): 93.5", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Some progressive rehabilitation was undertaken \nthroughout the 2012-2013 financial year. More \nthan half of TSF1 has been capped with fresh \nwaste rock and will continue into the next \nreporting period. A decision has not yet been \nmade if TSF1 will be raised any further as per \napprovals, however fresh rock capping will \nremain until this is determined. \n\n\n\nt \nr \no \np \ne \nR \ns \nn \no \ni \nt \na \nr \ne \np \nO \n\nWater Quality Environmental Audit \n\nThe Annual Groundwater Review Report indi- \ncated that analysis of groundwater samples \ncollected from the mine site groundwater moni- \ntoring network are generally below the relevant \nguideline, and in many instances near or below \nthe Limit of Reporting (LOR). \nAn independent environmental compliance \naudit was undertaken by specialist consultants \nOutback Ecology in March, 2013. The compli- \nance report was submitted to DMITRE as part \nof the annual MARCR in April, 2013. The compli- \nance audit identified action tasks which have \nnow been completed. \n\nConcentrations of CNWAD (cyanide weak acid \ndissociable metals) analysed from groundwater \nsamples collected from monitoring bores \nsurrounding the tailings storage facility (TSF) \nsuggest the natural attenuation of cyanide is \noccurring and containment measures in place \nfor process water and tailings slurry are perform- \ning as designed. \nFresh waste rock armouring of the crest bund \naround the western and eastern landforms has \ncommenced. The eastern crest bund was \narmoured with 0.5 metres of fresh rock. This \ncrest armouring is proposed to continue into the \nnext reporting period with topsoil added and \nseeded with local province seed. \n\nPreviously disturbed areas around production \nbore four CPW04 were lightly ripped; contoured \nand seeded with local province seed. Disturbed \nareas around other production and gusher bores \nwere lightly ripped and then contoured by a \ngrader for future seeding. \n\nDust Monitoring \n\nIncident Reporting \n\nChallenger’s online incident reporting system \nwas upgraded from Skytrust to QHSE Data \nManager during the 2012/13 financial year. The \nupdated reporting commitments approved in \nMarch 2012 have lead to an increase in the \nnumber of reported incidents during 2012 and \n2013. A total of three environmental incidents \nwere reported to government regulators in the \n2012/13 financial year with the incidents \nassessed as low to moderate risk. All incidents \nwere investigated and were closed out before \nthe end of the financial year. \n\nCyanide Management \n\nAt Challenger tailings are stored in an integrated \nwaste landform (IWL). This is essentially the \nsame as a traditional tailings storage facility \nbut is built to blend into the waste dumps. \nGroundwater monitoring bores located around \nthe Integrated Waste Landform (IWL) were \nsampled quarterly in line with Challenger’s \napproved Program for Environment Protection \nand Rehabilitation. The supernatant pool water \nwas well managed throughout the year with the \ncyanide concentration remaining below the \nadopted guideline limit of 0.5 milligrams per litre \n(mg/L), within the TSF. To date cyanide ground- \nwater quality has remained below the revised \nreporting limit of 0.08 mg/L. \n\nThe triennial noise and hygiene survey was \nconducted in 2012 and comments on dust survey \nresults. All respirable dust results were below the \nset exposure standards for atmospheric contami- \nnates. Higher than limit inhalable dust results \nwere recorded from the lab technician and \ncrusher operator, who wear a P2 dust musk as \npersonal protective equipment to reduce the limit \nof dust inhaled. Underground dust results were \nall below the recommended limits. \n\nRehabilitation", + "page_start": 26, + "page_end": 26, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "CHATREE CHATREE \n\nKhon Kaen KhKh \n\nT H A I L A N D \n\nBangkok \n\nA MC A M B O D I A C A M B O D I A \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nChiang \nMai \n\n10° 10° \n\n\n\n\n\nN SW \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSummary \n\nThe Nueva Esperanza Project is 100% owned \nby Kingsgate since February 2012. Nueva \nEsperanza is located in the Maricunga Gold Belt \nnear Copiapó, a regional mining centre in \nNorthern Chile. The silver-rich mineralisation is \nhosted by the Esperanza high-sulphidation \nepithermal alteration system associated with \nthe Cerros Bravos volcanic complex. \n\nThe project consists of three well-defined miner- \nalised deposits and a number of undeveloped \nexploration targets. The main deposits are \nArqueros, Chimberos and Teterita. Arqueros was \npreviously mined on a limited scale by under- \nground methods and Chimberos was exploited \nas an open pit mine, delivering about 40 million \nounces of silver in 1998/99. All three deposits \ncurrently have a combined Mineral Resources of \nabout 93 million ounces of silver equivalent or \n1.6 million ounces of gold equivalent (EQ60)1. \n\nA feasibility study for a decision to mine the \nArqueros portion of Nueva Esperanza was \ncompleted in late 2012, demonstrating that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible. Work remained \nto integrate the Teterita and Chimberos deposits \ninto the project, as well as to test lower cost \noptions for processing. Continued metallurgical \ntestwork has shown that mineralisation from all \nthree deposits by heap leaching is technically and \neconomically feasible and the preferred alterna- \ntive for development. \n\n\n\n\n\n\n\n\n\n\n\n\n\nEnvironmental approvals to commence \nconstruction and mining at Nueva Esperanza \nwere granted in July 2013 for the original \nArqueros project. Work is underway to modify \nand update the environmental assessment to \nincorporate the heap leach process. \n\n\n\n\n\n\n\n1 \n\n Equivalence is based on gold/silver price ratio \nof 60. Gold equivalence = gold content plus \n(silver content*divided*by 60), whereas Silver \nequivalent silver content plus (gold content \nmultiplied by 60).", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "50.0 \n**OFFSHORE NORTHERN AUSTRALIA**\n50.0 \n**Carnarvon Basin**\n\nEP 61 \n\nAlkina 72.0 PL176 \n\nAquitaine A (PLs 86, 131, 146, \n177 & 208) \nATP 553P*\n52.5 \nATP 685P (Cockatoo Creek) \n\nAquitaine B (PLs 59-61, 81, 83, 85, 97, \n106, 108, 111, 112, 132, 135, 139, 147, \n151, 152, 155, 205 & 207) \n\n**Facilities**\n\n55.0 \nMoonie to Brisbane Pipeline*\nAquitaine C (PLs 138 & 154) 47.8 \n\n50/40/10 (PL 55) 60.0 \n\nSWQ Unit (PLs 12-13, 16-18, 31, 34, \n36-40, 46-48, 62, 64-72, 78-82, 84, \n86, 94-96, 98, 100, 101 & 105 and \nin South Australia PLs 5, 9 & 15) \n\n**VICTORIA**\n\n**Otway Basin (Onshore)**\n60.1 \nPEP 160 \n\nATP 267P (Nockatunga) (PLs 33, \n50 & 51) \n**Otway Basin (Offshore)**\n\n59.1 \nVIC/P44 (Casino)*\n\nATP 299P (Tintaburra) (PLs 29, 38, 39, \n52, 57, 95, 169 & 170) VIC/P51* 89.0 \n\nAnnual Report 2004 \n\n\n \n \n \n \n [html]\n
Carnarvon Basin
EP 6128.6
50.0EP 62
28.6100.0
EP 35735.7
82.8L1H ( Barrow Island )
28.6L10
28.6L12 ( Crest )
35.760.0
L13 ( Crest )35.7
TL / 2 ( Airlie )15.0
", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "We additionally perform non-parametric multidimensional scaling \n(MDS) on outgroup-*f*3 statistics44 computed using Twigstats, the results \nof which do not depend on any modelling assumptions and which show \nincreased resolution compared with conventional outgroup-*f*3 sta- \ntistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). \nEncouragingly, the MDS model supports regional fine-scale genetic \nstructures reflected in our source groups, such as the separation of \npredominantly Norwegian and northern Swedish EIA individuals from \nsouthern Peninsular Scandinavia (Fig. 2a); this relationship is not \ndetected without Twigstats. In this MDS analysis, we note a close affinity \nof wide-ranging individuals from Portugal, France, Germany, Austria \nand Britain. We hypothesize that this corresponds to areas associated \nwith the Celtic-speaking world, and that their close genetic affinity is \ndue to earlier expansions. Sparse sampling limits our understanding \nof the full extent of regional ancestry variation in central Europe and \nsome other regions, but the continental ancestries differentiated in \nthe MDS model suggests that major ancestry variation across Europe \nin this period is relatively well captured. \n\nWe next test the Twigstats time-restricted genealogy approach \non a range of empirical examples. First, we boost pairwise outgroup \n*f*3-statistics44 to quantify fine-scale population structure; we demon- \nstrate this improvement using a previously proposed simulation39 \n(Extended Data Fig. 5a). When applied to published genomes from \nNeolithic Europe (Methods and Supplementary Table 1), we can repli- \ncate the previously suggested fine-scale structure between individuals \nburied in megalithic structures in Ireland compared with others45, a \nrelationship that is not apparent from SNP data alone (Extended Data \nFig. 5b). For the well-studied example of three major ancestries contrib- \nuting to prehistoric Europe, that is, Mesolithic hunter-gatherers, early \nfarmers and steppe populations13–16, we obtain unbiased estimates and \nan approximately 20% improvement in standard errors in an already \nwell-powered qpAdm model46 (Extended Data Fig. 5c). \n\nFinally, we demonstrate that Twigstats can be used to resolve com- \npeting models of punctual admixture and long-standing gene flow, or \nconstrain the time of admixture. For instance, it has previously been \nsuggested that long-standing deep structure and gene flow between \nNeanderthals and early modern humans in Africa may produce genetic \npatterns that resemble a punctual admixture event some 60,000 years \nago47–49, casting doubt on the model of Neanderthal admixture into \nancestors of Eurasians49–51. However, whereas such long-standing deep \nsubstructure would confound SNP-based*f*-statistics to produce pat- \nterns similar to Neanderthal admixture, we demonstrate, in simula- \ntions, that Twigstats can clearly distinguish this history from recent \nadmixture (Extended Data Fig. 5d). Application of Twigstats on empiri- \ncal whole genomes produces results inconsistent with deep substruc- \nture alone, but consistent with punctual admixture. \n\n**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3).", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "First, we improved the database by splitting maize from the existing sector “other coarse grain”, following \nsimilar work using GTAP57–59 based on the routines from the Splitcom method60. In this procedure, the old flows \nof data both at national and trade levels are allocated between the new flows using weights. The national weights \ninclude the division of each unsplit user’s use of the original split commodity among the new commodities; the \ndivision of unsplit inputs to the original industry between the new industries; the splitting of new industry’s use \nof each new commodity. Maize use is mainly shared between feed, food, processing and others (seed, waste, etc.). \nTrade shares allocate the original slice of the split commodity into the new commodity for all elements of \nbasic price value, tax, and margin. Finally, we used the RAS method for balancing the newly created database. \nThe values for the national shares matrix were obtained from FAOSTAT. The trade shares matrix was calculated \nbased on the data from UN Comtrade Database. \n\nSecond, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors \nfor maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of \nproduction and both livestock and households are major users of maize. For regional aggregation, we kept the \ndetails for all the main producing, consuming, and trading regions, for maize.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "Hunter-gatherers, early European farmers, and Yamnaya Steppe people46. \nWe show results for Twigstats-5000. Bias is measured as the difference in \nadmixture proportions obtained from Twigstats-5000 and all SNPs, and \nwe show standard errors of the latter. We plot two standard errors around \nthe mean. The standard error improvement shown is one minus the ratio of \nstandard errors obtained from Twigstats-5000 and using all SNPs.**d**, Neanderthal \nadmixture proportion inferred using an*f*4-ratio of the form*f*4(outgroup, Altai, \ntarget, Mbuti)/*f*4(outgroup, Altai, Vindija, Mbuti). We compute these on genetic \nvariation data from the Simon’s Genome Diversity Project (SGDP)75 and use the \nhigh-coverage Altai and Vindija Neanderthals78,79. We also compute equivalent \n*f*4-ratio statistics in a simulation emulating Neanderthal admixture 50,000 years \nago and a second simulation involving no Neanderthal admixture but deep \nstructure that leads to a similar inference unless deep coalescences are ignored \nby Twigstats. We plot two standard errors around the mean. \n\n**Extended Data Fig. 5 | Three examples of applying Twigstats. a**Fine-scale \npopulation structure simulation emulating ref. 39 (see Methods for simulation \ndetails). First two principal components are computed from pairwise outgroup \n*f*3 statistics on the genotypes directly and on Relate trees inferred from the \n50 target individuals. Labels in plots show the average coordinates of members \nof that population. For each panel, we calculate a separation index (SI) as in39, \nwhich we define as the proportion of individuals for which the closest \nindividual (by the Euclidean distance in PC space) is in the same population. \n**b**, Fine-scale genetic structure in Neolithic Europe quantified using an MDS \ncalculated on a symmetric matrix that contains all pairwise outgroup*f*3 \nstatistics (outgroup: YRI) between individuals. These are either calculated \ndirectly on genotypes or calculated using Twigstats on Relate genealogies \nwith a cutoff of 1000 generations. Individuals were selected by filtering based \non Steppe and Western Hunter-gatherer ancestry (Methods).**c**, Admixture \nproportions inferred using qpAdm with three distal sources of Western", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed3.pdf" + }, + { + "text": "Community Environment \n\nThe remoteness of Challenger mine – 310 kilo- \nmetres by road from the nearest town at Coober \nPedy – reduces the capacity for local involve- \nment with surrounding communities. Challenger \ncontinued to support its nearest communities \nwith local sponsorships including: \n\nFull details of all environmental monitoring \nreports and a detailed review of all environ- \nmental issues are contained within the 2013 \nMining and Rehabilitation Compliance Report \n(MARCR). The MARCR can be downloaded from \nDMITRE’s website www.minerals.dmitre.sa.gov. \nau and can be found using the search word \n“Challenger”. \n〉〉 The Umoona Community Council; \n\n〉〉 Glendambo Pastoralists Ball; \n〉〉 The Royal Flying Doctor Service; and \nWater usage \n\nEmployees \n\nThe Challenger workforce totalled 272 at \nthe end of the financial year comprising 100 \nKingsgate personnel (employees and casual \ncontractors to fill vacancies); and 172 contrac- \ntors. Contractors on site include: Leighton with \n154 personnel providing mining services; \nSodexo, 12 personnel providing catering and \ncleaning services; Powerwest, 2 personnel for \npower supply services; and AWG, 4 personnel \nfor air leg and rise mining services. \n〉〉 The Coober Pedy Football Club. \n\nTurnover for Challenger permanent employees \nduring the financial year was 23%, with 23 \nterminations and 22 new starters. New \nemployees recruited on a casual basis with a \nview to permanency accounted for 19 positions. \n\nA supplementary groundwater extraction bore \n(Gusher 3) was commissioned at Challenger to \nincrease the supply of potable water made \navailable to the accommodation camp. A third \nreverse osmosis plant was also commissioned to \naccommodate the increase in volume of water \nthat needs to be filtered for potable use. \nChallenger is located within the Commonwealth \nGovernment, Woomera Prohibitive Area (WPA). \nThe Department of Defence (DOD) continues to \nutilise the area for rocket testing and other \ncommercial activities. In the last 10 years DOD \nhave not impacted on mine operations. \n\nDuring the year Kingsgate have rebuilt the \nChallenger management team improving the \ndepth of mining engineering experience. The \nnew management, combined with targeted \ntraining has brought about a cultural change \nwith the emphasis now being on proper plan- \nning, appropriate contractor management, \naccountability. To encourage staff retention, \nthere was a focus on improving the site facilities \nwith an upgrade to the mining office as well as \nsite communications to allow employees to \ncommunicate with their families while on site. \nChallenger Mine has fostered strong relations \nwith the University of Adelaide over the past \nnine years. Each year selected students from the \nSchools of Geology and Mining Engineering \nundertake field trips to Challenger, where they \nexperience a very detailed and hands-on intro- \nduction to mining. Kingsgate offers academic \nBursaries and Prizes to students in both \ndisciplines. \n\nA total of 436,175 tonnes of water was used to \nprocess 556,631 tonnes of ore during the finan- \ncial year with a ratio of 0.78 tonnes of water to \none tonne of ore. Water usage was reduced \nonsite via recycling of supernatant water from \nTailings Storage Facility (TSF) 2 via the decant \nwater return system. \n\n\n\nCHALLENGER SUSTAINABILITY", + "page_start": 25, + "page_end": 25, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Nick Morgan, Daniel Heap, Amy Elliott, Tim Millar \n\n\n \n \n \n \n [html]\n
January 2016
", + "page_start": 0, + "page_end": 0, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "In 2018, what was the global proportion of maize grown in the US ?", + "target_page": 5, + "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Figure 4.**Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: \nNorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using \nArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nsecurity of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. \n\n\n \n \n \n \n [html]\n
Patients with modelStatesStatementControlStatementControlStatementTableTablePatientsSpecificationsStatesTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 7", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 3.**Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- \nCM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS \n10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. \n\n\n \n \n \n \n [html]\n
TablePatientsStatementSpeciesStateStatestedStatementTableStatementStateSpeciesStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 6", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Simulation of maize yield using DSSAT.**According to the data of global warming by 1.5 °C and 2.0 °C \nselected above, we simulated global maize yield changes compared with the average yield during 1986–2005 on \ngrid level using CERES-Maize, which is part of DSSAT version 4.649. \n\nThe inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- \nagement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- \nperformance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- \nperatures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability \nand Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are \ngridded formatted at a resolution of 5 min50. For management information, fertilizer applications, irrigation \nand other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application \nfor the world was developed by integrating national and subnational fertilizer application data from a variety of \nsources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters \nare from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon \ncontent and fraction of calcium carbonate for each of five 20 cm thick soil layers51. All the soil data is allocated \nto be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were \nadopted from FAO soil dataset. \n\nFirst maize yields across the world during the historical period 1986–2005 were simulated at the 0.5° × 0.5° \ngrid scale with two main production systems, including Spring maize and Summer maize. Historical national \nmaize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from \nthe gridded global dataset by combining two data products47. Second, genetic parameters of specific cultivars of \nmaize from previous works were adopted for the initial parameters; model parameters related to crop genotype \ncharacteristics were calibrated and tuned following the method in Xiong et al.52, in which the simulated yields \nfrom 1986–2005 were comparable to the statistical data. Third, maize yields across the world were simulated \nunder global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- \nded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, \ncomparing maize yield average for 1986–2005. \n\n**Simulation of market price using GTAP.**The yield changes for maize from the DSSAT models under \n1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes \nin production, market price, and self-sufficiency ratio of maize at national and global levels53,54. For this study, we \nuse a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of \nthe major food crops under current economic conditions. Utilizing current economic conditions has the advan- \ntage of minimizing assumptions and model uncertainties related to future economic conditions55,56. \n\nThe original GTAP database doesn’t include maize as a separate sector, rather it is combined with other coarse \ngrains to form an “other coarse grain” sector. For this study, we updated the GTAP database by splitting maize \nfrom the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the \noriginal database. The detailed method is given as follows:", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. \n\nIn response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. \n\n**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 5.**Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C. \n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should \nbe taken from now on. Food security would be a significant challenge in this century. \n\n**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. \n\n\n \n \n \n \n [html]\n
StatementTableTableTableofofTableTableofofofofTableTableCasesTableTableofofTableTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 8", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed9.pdf" + }, + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**\n\n**Climate change is becoming more and more remarkable which has an obvious impact on crop yields**\n**all over the world. Future climate scenario data was simulated by 5 climate models recommended**\n**by ISI-MIP under 4 RCP scenarios, in which the approximate scenarios with global warming by 1.5 °C**\n**and 2 °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the**\n**world under global warming by 1.5 °C and 2.0 °C were analyzed and the market prices of maize at**\n**national and global levels were simulated. The results showed that, the risk of maize yield reduction**\n**under 2.0 °C scenario was much more serious than 1.5 °C scenario; the ratios of yield changes were**\n**separately 0.18% and − 10.8% under 1.5 °C and 2.0 °C scenarios. The reduction trend of total maize**\n**production is obvious in the top five countries and the main producing regions of the world, especially**\n**under the 2.0 °C scenario. The market price of maize would increase by around 0.7% and 3.4% under**\n**1.5 °C and 2.0 °C scenarios. With the quickly increasing population in the world, it is urgent for all**\n**countries to pay enough attention to the risk of maize yield and take actions of mitigation and**\n**adaptation to climate change.**\n\nIn the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "of flowering time. PNAS**115**(42), 10642–10647 (2018). \n 35. Yang, C. Y., Fraga, H., Ieperen, W. V. & Santos, J. A. Assessment of irrigated maize yield response to climate change scenarios in \nPortugal. Agric. Water Manag.**184**, 178–190 (2017). \n 36. Miller, S. A. & Moore, F. C. Climate and health damages from global concrete production. Nat. Clim. Change https:// doi. org/ 10. \n1038/ s41558- 020- 0733-0 (2020). \n 37. Kassie, B. T. et al. Exploring climate change impacts and adaptation options for maize production in the Central Rift Valley of \nEthiopia using different climate change scenarios and crop models. Clim. Change**129**, 145–158 (2015). \n 38. Tao, F. & Zhang, Z. Climate change, high-temperature stress, rice productivity, and water use in Eastern China: A new superensem- \nble-based probabilistic projection. J. Appl. Meteorol. Climatol.**52**, 531–551 (2013). \n\n 39. Glotter, M. & Elliott, J. Simulating US agriculture in a modern Dust Bowl drought. Nat. Plants**3**, 16193 (2016). \n 40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whitfield, S. & Das, B. Current warming will reduce yields unless maize \nbreeding and seed systems adapt immediately. Nat. Clim. Change**6**, 954–958 (2016). \n 41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the South- \neastern US. Clim. Change**134**, 311–326 (2016). \n\n 42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS**116**(10), 4194–4199 (2019). \n 43. Urban, D. W., Sheffield, J. & Lobell, D. B. The impacts of future climate and carbon dioxide changes on the average and variability \nof US maize yields under two emission scenarios. Environ. Res. Lett.**10**, 045003 (2015). \n\n 44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C \nAbove Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global \nResponse to the Threat of Climate Change, Sustainable Development, and Efforts to Eradicate Poverty 32 (World Meteorological \nOrganization, 2018). \n 45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for \ngap-filling and historical climate series estimation. Agr. For. Meteorol.**200**, 233–248 (2015). \n 46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth \nSyst. Dyn.**4**, 219–236 (2013). \n 47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological \n\ntypes, and net primary production in the year 2000. Glob. Biogeochem. Cycles**22**, 1022 (2008). \n\n 48. You, L.Z., et al. Spatial Production Allocation Model (SPAM) 2000 Version 3.2. http:// mapsp am. info (2015). \n 49. Hoogenboom, G., et al. Decision Support System for Agrotechnology Transfer (DSSAT) Version 4.6 (DSSAT Foundation, 2015). \nhttp:// dssat. net (2015). \n 50. Sacks, W. J., Deryng, D., Foley, J. A. & Ramankutty, N. Crop planting dates: An analysis of global patterns. Glob. Ecol. Biogeogr.**19**, \n607–620 (2010). \n 51. Batjes, H.N. A Homogenized Soil Data File for Global Environmental Research: A Subset of FAO. ISRIC and NRCS Profiles (Version \n1.0). Working Paper and Preprint 95/10b (International Soil Reference and Information Centre, 1995). \n\nhttps://doi.org/10.1038/s41598-022-22228-7", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "First, we improved the database by splitting maize from the existing sector “other coarse grain”, following \nsimilar work using GTAP57–59 based on the routines from the Splitcom method60. In this procedure, the old flows \nof data both at national and trade levels are allocated between the new flows using weights. The national weights \ninclude the division of each unsplit user’s use of the original split commodity among the new commodities; the \ndivision of unsplit inputs to the original industry between the new industries; the splitting of new industry’s use \nof each new commodity. Maize use is mainly shared between feed, food, processing and others (seed, waste, etc.). \nTrade shares allocate the original slice of the split commodity into the new commodity for all elements of \nbasic price value, tax, and margin. Finally, we used the RAS method for balancing the newly created database. \nThe values for the national shares matrix were obtained from FAOSTAT. The trade shares matrix was calculated \nbased on the data from UN Comtrade Database. \n\nSecond, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors \nfor maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of \nproduction and both livestock and households are major users of maize. For regional aggregation, we kept the \ndetails for all the main producing, consuming, and trading regions, for maize.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Data availability**\nThe historical weather data (1986–2005) that support the analysis with ESMs in this study are publicly available \nonline at https:// data. giss. nasa. gov/ impac ts/ agmip cf/; the future climate scenario data (2006–2099) that support \nthe analysis with ESMs in this study are publicly available online at https:// pcmdi. llnl. gov/? cmip5 and https:// \nesgf- node. llnl. gov/ proje cts/ esgf- llnl/. The spatial data of harvest area, yield, crop calendar, irrigation portion \nand chemical N input for maize that support the simulation with crop model (DSSAT) in this study are publicly \navailable at http:// mapsp am. info/ (SPAM) and http:// www. sage. wisc. edu (SAGE); the soil data that support the \nsimulation with crop model (DSSAT) in this study are publicly available from the WISE database (https:// www. \nisric. online/ index. php/) and the Digital Soil Map of the World (DSMW) (http:// www. fao. org/ land- water/ land/ \nland- gover nance/ land- resou rces- plann ing- toolb ox/ categ ory/ detai ls/ en/c/ 10265 64/). All other relevant data are \navailable from the corresponding authors. \n\n\n \n \n \n \n [html]\n
Species
Alternatives. The consists. Therefolds. Therefolds. Therefolds. They deference systems : mustsis of resistand terms : r ( H10 ) Rechmond such as and emotional
P ‐ Difficult
Derminan, D : VIPS 100.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.0000
Assessment
Global Allobal. Allobal EAF. BB, FITP - 007 ( 2017 ). ( Crommunity ). ( Y ) & B - bibmeter ) $ A reversele of sessions )
0.000
", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "**117**(4), 1935–1940 (2020). \n\n 16. Challinor, A. J. et al. A meta-analysis of crop yield under climate change and adaptation. Nat. Clim. Change**4**, 287–291 (2014). \n 17. Lobell, D. B. et al. Prioritizing climate change adaptation needs for food security in 2030. Science**319**, 607–610 (2017). \n 18. Lv, S. et al. Yield gap simulations using ten maize cultivars commonly planted in Northeast China during the past five decades. \nAgric. For. Meteorol.**205**, 1–10 (2015). \n 19. Chao, W., Kehui, C. & Shah, F. Heat stress decreases rice grain weight: Evidence and physiological mechanisms of heat effects prior \nto flowering. Int. J. Mol. Sci.**23**(18), 10922 (2022). \n 20. Chao, W. et al. Estimating the yield stability of heat-tolerant rice genotypes under various heat conditions across reproductive \nstages: A 5-year case study. Sci. Rep.**11**, 13604 (2021). \n\n 21. IPCC. Food security and food production systems. In Climate Change 2014: Impacts, Adaptation, and Vulnerability. Part A: Global \nand Sectoral Aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel of Climate \nChange 485–533 (Cambridge University Press, 2014). \n 22. Tigchelaar, M., Battisti, D. S., Naylor, R. L. & Ray, D. K. Future warming increases probability of globally synchronized maize \nproduction shocks. PNAS**115**(26), 6644–6649 (2018). \n 23. Zhao, C. et al. Temperature increase reduces global yields of major crops in four independent estimates. PNAS**114**, 9326–9331 \n(2017). \n 24. Diffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy \nfutures. Nat. Clim. Change**2**, 514–518 (2012). \n 25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World \n\nBank Econ. Rev.**31**, 158–175 (2017). \n\n 26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. “Vulnerability hotspots”: Integrating socio-economic and \nhydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. \nFor. Meteorol.**170**, 195–205 (2013). \n 27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett.**10**, \n024007 (2015). \n\n 28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science**341**(6145), 508–513 (2013). \n 29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, \nplausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag.**13**, 1–9 (2016). \n 30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global fluctuations in maize and wheat \nyields. Sci. Adv.**4**(11), eaat4517 (2018). \n 31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. \nAgric. Syst.**159**, 275–281 (2017). \n\n 32. Tack, J., Barkley, A. & Nalley, L. L. Effect of warming temperatures on US wheat yields. Proc. Natl. Acad. Sci.**112**, 6931–6936 (2015). \n 33. Tao, F., Zhang, Z., Liu, J. & Yokozawa, M. Modelling the impacts of weather and climate variability on crop productivity over a \nlarge area: A new super-ensemblebased probabilistic projection. Agric. For. Meteorol.**149**, 1266–1278 (2009). \n 34. Parent, B. et al. Maize yields over Europe may increase in spite of climate change, with an appropriate use of the genetic variability", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", + "target_page": 10, + "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**\n\n**Climate change is becoming more and more remarkable which has an obvious impact on crop yields**\n**all over the world. Future climate scenario data was simulated by 5 climate models recommended**\n**by ISI-MIP under 4 RCP scenarios, in which the approximate scenarios with global warming by 1.5 °C**\n**and 2 °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the**\n**world under global warming by 1.5 °C and 2.0 °C were analyzed and the market prices of maize at**\n**national and global levels were simulated. The results showed that, the risk of maize yield reduction**\n**under 2.0 °C scenario was much more serious than 1.5 °C scenario; the ratios of yield changes were**\n**separately 0.18% and − 10.8% under 1.5 °C and 2.0 °C scenarios. The reduction trend of total maize**\n**production is obvious in the top five countries and the main producing regions of the world, especially**\n**under the 2.0 °C scenario. The market price of maize would increase by around 0.7% and 3.4% under**\n**1.5 °C and 2.0 °C scenarios. With the quickly increasing population in the world, it is urgent for all**\n**countries to pay enough attention to the risk of maize yield and take actions of mitigation and**\n**adaptation to climate change.**\n\nIn the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. \n\nIn response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. \n\n**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "**30**\n\n**25**\n\n**20**\n\n**15**\n\n**e**\n**g**\n**n**\n**a**\n**h**\n**c**\n**%**\n\n**10**\n\n**5**\n\n**0**\n\n**-5**\n\n**-10**\n\n**-15**\n\n**-20**\n\n**In dia**\n\n**R est of W orld**\n**C a n a d a**\n\n**C hin a**\n**M exic o**\n\n**Arg e ntin a**\n**S o uth Africa**\n**R u ssia**\n**R est of Africa**\n\n**U krain e**\n**Ja p a n**\n**A U S/N Z L**\n**U S A**\n\n**Figure 7.**Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C. \n\n\n\nmeantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. \n\nIn this study, 5 climate models are selected, which are recommended by ISI-MIP (The Inter-Sectoral Impact \nModel Intercomparison Project); compared with other climate models, the five models could more effectively \nsupport impact assessment in different sectors and provide more reliable results. Based on the simulation results", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 5.**Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C. \n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should \nbe taken from now on. Food security would be a significant challenge in this century. \n\n**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. \n\n\n \n \n \n \n [html]\n
StatementTableTableTableofofTableTableofofofofTableTableCasesTableTableofofTableTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 8", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 3.**Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- \nCM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS \n10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. \n\n\n \n \n \n \n [html]\n
TablePatientsStatementSpeciesStateStatestedStatementTableStatementStateSpeciesStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 6", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 4.**Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: \nNorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using \nArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com. \n\nsecurity of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. \n\n\n \n \n \n \n [html]\n
Patients with modelStatesStatementControlStatementControlStatementTableTablePatientsSpecificationsStatesTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 7", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 2.**Distribution of temperature and precipitation changes under global warming by 1.5 °C and 2.0 °C \n(**a**) temperature, 1.5 °C; (**b**) temperature, 2.0 °C; (**c**) precipitation, 1.5 °C; (**d**) precipitation, 2.0 °C. The figure \nhas been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear \nthdata. com. \n\nThird, yield shocks for maize were incorporated into the GTAP model via changes in land efficiency for the \nproduction of the respective in each region. \n\n**Results**\n**Climate change under global warming by 1.5 °C and 2.0 °C.**There are apparent change trends of \ntemperature and precipitation relative to the baseline (1986–2005) under global warming by 1.5 °C and 2.0 °C. \nThe most remarkable characteristics is the rising of mean temperature in the worldwide (Fig. 2a, b); meanwhile, \nthe rainfall would increase in most regions of the world. The distributions of temperature changes under global \nwarming by 1.5 °C and 2.0 °C are similar (Fig. 2c, d). There are few regions in which the temperature would go \ndown under the two scenarios; the temperature goes up more seriously in the Northern Hemisphere than the \nSouthern regions; especially in the high-latitude area the temperature rises more quickly than the other regions. \nUnder global warming by 1.5 °C the area is 54.4% in whole world in which the temperature would go up between \n1.0 and 1.5 °C than the baseline, located in the middle and low latitude regions; the area is 29.2% of the whole \nworld in which the temperature would go up more than 1.5 °C, most located in the high latitude regions of \nNorthern Hemisphere; the area is 16.4% of the whole world in which the temperature would go up between 0 \nand 1.0 °C , mostly located in the Southern Hemisphere and the low latitude regions of Northern Hemisphere. \nUnder global warming by 2.0 °C the area is 12.3% in which the temperature would go up between 1.0 and 1.5 °C \nthan the baseline, located in the middle and low latitude regions; the area is 69.8% in which the temperature \nwould go up between 1.5 and 3.0 °C than the baseline, located in the middle and high latitude regions; the area", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed9.pdf" + }, + { + "text": "There are also several uncertainties and limitations. Firstly, there is no unified understanding of how to cal- \nculate the temperature rise of 1.5 °C and 2.0 °C relative to pre-industrial levels in the worldwide. At present the \nresearch on climate prediction and impact assessment under global warming 1.5 °C and 2.0 °C usually adopts \nmulti-mode ensemble average methods61,62, which could obtain the warming response under the condition of \ninstantaneous change, rather than the warming process under the stable state expected by the long-term goal. If \nwe expect to obtain the accurate results, the model prediction test should be estimated to form proprietary sce- \nnarios for global warming by 1.5 °C and 2.0 °C63,64, which could support for the impacts assessment on different \nsectors. Some institutions are carrying out climate change predictions under the lower emission scenarios (global \nwarming 1.5 °C or 2.0 °C). At the same time, in order to achieve the goal of controlling temperature by 1.5 °C at \nthe end of the twenty-first century, it is urgent to take actions to reduce emissions and develop along the track \nof low energy consumption65,66; but it is a great challenge for human society to achieve this goal. \n\nSecondly, our methodological approach in this study also has some important limitations, including our use \nof a single crop model to estimate maize yields. There are some limitations for the DSSAT model to simulate \nyield loss caused by climate extreme events67, in which the impacts of pests and diseases are also ignored68. \nHowever, the DSSAT model has been applied in a lot of researches to simulate historical maize yield69–71, in \nwhich the results are reliable and credible72. The results of this research could be an important reference to the \nother studies which simulate global maize yield in the future, applying crop models such as APSIM, WOFOST, \nORYZA and so on. \n\nThirdly, there are relatively more researches on the prediction of climate change trend under the background \nof 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in \nworldwide is few. In the meantime, we do not assess the effect of future changes on agriculture, such as increases \nin farm productivity due to new technology. The maize planting area in the future is assumed to be the same as \nthe current situation of maize cultivation in the world. \n\n**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 2.**(continued) \n\nis 16.9% in which the temperature would go up more than 3.0 °C, most located in the high latitude regions of \nNorthern Hemisphere; the area is rarely in which the temperature would go up between 0 and 1.0 °C. \n\nThere are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. \n\n\n \n \n \n \n [html]\n
State global warming by 1.5 ° C. The dutributions of maize yield loss under the two scenarios are similar to each otherTableStatementStatesticsPatientsSpecificationStatestratesTableStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 5", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed9.pdf" + }, + { + "text": "of flowering time. PNAS**115**(42), 10642–10647 (2018). \n 35. Yang, C. Y., Fraga, H., Ieperen, W. V. & Santos, J. A. Assessment of irrigated maize yield response to climate change scenarios in \nPortugal. Agric. Water Manag.**184**, 178–190 (2017). \n 36. Miller, S. A. & Moore, F. C. Climate and health damages from global concrete production. Nat. Clim. Change https:// doi. org/ 10. \n1038/ s41558- 020- 0733-0 (2020). \n 37. Kassie, B. T. et al. Exploring climate change impacts and adaptation options for maize production in the Central Rift Valley of \nEthiopia using different climate change scenarios and crop models. Clim. Change**129**, 145–158 (2015). \n 38. Tao, F. & Zhang, Z. Climate change, high-temperature stress, rice productivity, and water use in Eastern China: A new superensem- \nble-based probabilistic projection. J. Appl. Meteorol. Climatol.**52**, 531–551 (2013). \n\n 39. Glotter, M. & Elliott, J. Simulating US agriculture in a modern Dust Bowl drought. Nat. Plants**3**, 16193 (2016). \n 40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whitfield, S. & Das, B. Current warming will reduce yields unless maize \nbreeding and seed systems adapt immediately. Nat. Clim. Change**6**, 954–958 (2016). \n 41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the South- \neastern US. Clim. Change**134**, 311–326 (2016). \n\n 42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS**116**(10), 4194–4199 (2019). \n 43. Urban, D. W., Sheffield, J. & Lobell, D. B. The impacts of future climate and carbon dioxide changes on the average and variability \nof US maize yields under two emission scenarios. Environ. Res. Lett.**10**, 045003 (2015). \n\n 44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C \nAbove Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global \nResponse to the Threat of Climate Change, Sustainable Development, and Efforts to Eradicate Poverty 32 (World Meteorological \nOrganization, 2018). \n 45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for \ngap-filling and historical climate series estimation. Agr. For. Meteorol.**200**, 233–248 (2015). \n 46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth \nSyst. Dyn.**4**, 219–236 (2013). \n 47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological \n\ntypes, and net primary production in the year 2000. Glob. Biogeochem. Cycles**22**, 1022 (2008). \n\n 48. You, L.Z., et al. Spatial Production Allocation Model (SPAM) 2000 Version 3.2. http:// mapsp am. info (2015). \n 49. Hoogenboom, G., et al. Decision Support System for Agrotechnology Transfer (DSSAT) Version 4.6 (DSSAT Foundation, 2015). \nhttp:// dssat. net (2015). \n 50. Sacks, W. J., Deryng, D., Foley, J. A. & Ramankutty, N. Crop planting dates: An analysis of global patterns. Glob. Ecol. Biogeogr.**19**, \n607–620 (2010). \n 51. Batjes, H.N. A Homogenized Soil Data File for Global Environmental Research: A Subset of FAO. ISRIC and NRCS Profiles (Version \n1.0). Working Paper and Preprint 95/10b (International Soil Reference and Information Centre, 1995). \n\nhttps://doi.org/10.1038/s41598-022-22228-7", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is a formal fallacy ?", + "target_page": 8, + "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "burglar broke into the house last night, got hungry on the job, and had a midnight snack, would also \nexplain the state of the kitchen. But this conclusion is not justified because it is not the best or most likely \nexplanation.[82][83] \n\n**Fallacies**\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually \nreferred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw \nwith the reasoning leading to this conclusion.[84] So the argument \"it is sunny today; therefore spiders \nhave eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, \ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct.[85] \nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. \nThis explains why people tend to commit fallacies: because they have an alluring element that seduces \npeople into committing and accepting them.[86] However, this reference to appearances is controversial \nbecause it belongs to the field of psychology, not logic, and because appearances may be different for \ndifferent people.[87] \n\n\n\nYoung America's dilemma: Shall I be wise and great, or \nrich and powerful? (poster from 1901) This is an \nexample of a false dilemma: an informal fallacy using a \ndisjunctive premise that excludes viable alternatives. \n\nFallacies are usually divided into formal and \ninformal fallacies.[38] For formal fallacies, the \nsource of the error is found in the*form*of the \nargument. For example, denying the antecedent \nis one type of formal fallacy, as in \"if Othello is a \nbachelor, then he is male; Othello is not a \nbachelor; therefore Othello is not male\".[88] But \nmost fallacies fall into the category of informal \nfallacies, of which a great variety is discussed in \nthe academic literature. The source of their error \nis usually found in the*content*or the*context*of \nthe \nare \nsometimes categorized as fallacies of ambiguity, \nfallacies of presumption, or \nfallacies of \nthe \nrelevance. For \nambiguity and vagueness of natural language are \nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot \nbe dark\".[90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise.[91] \nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not \nrelevant to it.[92] \n\nargument.[89] Informal fallacies \n\n**Definitory and strategic rules**\n\nThe main focus of most logicians is to study the criteria according to which an argument is correct or \nincorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known \nas*rules of inference*.[93] They are definitory rules, which determine whether an inference is correct or \nwhich inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which \ninferential moves are necessary to reach a given conclusion based on a set of premises. This distinction \ndoes not just apply to logic but also to games. In chess, for example, the definitory rules dictate that \nbishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or \n\nArguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Paraconsistent logics are logical systems that can deal with contradictions. They are formulated to avoid \nthe principle of explosion: for them, it is not the case that anything follows from a contradiction.[139] \nThey are often motivated by dialetheism, the view that contradictions are real or that reality itself is \ncontradictory. Graham Priest is an influential contemporary proponent of this position and similar views \nhave been ascribed to Georg Wilhelm Friedrich Hegel.[140] \n\n**Informal**\n\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like \ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some \nframeworks of informal logic have also been presented that try to provide a systematic characterization of \nthe correctness of arguments.[141] \n\nThe*pragmatic*or*dialogical approach*to informal logic sees arguments as speech acts and not merely as \na set of premises together with a conclusion.[142] As speech acts, they occur in a certain context, like a \ndialogue, which affects the standards of right and wrong arguments.[143] A prominent version by Douglas \nN. Walton understands a dialogue as a game between two players. The initial position of each player is \ncharacterized by the propositions to which they are committed and the conclusion they intend to prove. \nDialogues are games of persuasion: each player has the goal of convincing the opponent of their own \nconclusion.[144] This is achieved by making arguments: arguments are the moves of the game.[145] They \naffect to which propositions the players are committed. A winning move is a successful argument that \ntakes the opponent's commitments as premises and shows how one's own conclusion follows from them. \nThis is usually not possible straight away. For this reason, it is normally necessary to formulate a \nsequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's \nintended conclusion. Besides these positive arguments leading one closer to victory, there are also \nnegative arguments preventing the opponent's victory by denying their conclusion.[144] Whether an \nargument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other \nhand, are violations of the standards of proper argumentative rules.[146] These standards also depend on \nthe type of dialogue. For example, the standards governing the scientific discourse differ from the \nstandards in business negotiations.[147] \n\nThe*epistemic approach*to informal logic, on the other hand, focuses on the epistemic role of \narguments.[148] It is based on the idea that arguments aim to increase our knowledge. They achieve this \nby linking justified beliefs to beliefs that are not yet justified.[149] Correct arguments succeed at \nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their \nconclusion.[150] For example, the fallacy of begging the question is a*fallacy*because it fails to provide \nindependent justification for its conclusion, even though it is deductively valid.[151] In this sense, logical \nnormativity consists in epistemic success or rationality.[149] The Bayesian approach is one example of an \nepistemic approach.[152] Central to Bayesianism is not just whether the agent believes something but the \ndegree to which they believe it, the so-called*credence*. Degrees of belief are seen as subjective \nprobabilities in the believed proposition, i.e. how certain the agent is that the proposition is true.[153] On \nthis view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "new formal systems have been proposed. \nThere are disagreements about what makes a \nformal system a logic.[22] For example, it has \nbeen suggested that only logically complete \nsystems, like first-order logic, qualify as \nlogics. For such reasons, some theorists deny \nthat higher-order logics are logics in the strict \nsense.[23] \n\nFormal logic needs to translate natural language \narguments into a formal language, like first-order logic, to \nassess whether they are valid. In this example, the letter \n\"c\" represents Carmen while the letters \"M\" and \"T\" stand \nfor \"Mexican\" and \"teacher\". The symbol \"∧\" has the \nmeaning of \"and\". \n**Informal logic**\n\nWhen understood in a wide sense, logic \nencompasses both formal and informal logic.[24] Informal logic uses non-formal criteria and standards to \nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse.[25] Its \ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language \narguments.[26] In this regard, it considers problems that formal logic on its own is unable to address.[27] \nBoth provide criteria for assessing the correctness of arguments and distinguishing them from \nfallacies.[28] \n\nMany characterizations of informal logic have been suggested but there is no general agreement on its \nprecise definition.[29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the \nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal \nor natural language.[30] Formal logic can only examine them indirectly by translating them first into a \nformal language while informal logic investigates them in their original form.[31] On this view, the \nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is \n; (2) \nexamined by informal logic. But the formal translation \"(1) \n\" is studied by formal logic.[32] The study of natural language \narguments comes with various difficulties. For example, natural language expressions are often \nambiguous, vague, and context-dependent.[33] Another approach defines informal logic in a wide sense as \nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes \nquestions about the role of rationality, critical thinking, and the psychology of argumentation.[34] \n\n; (3) \n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "argument is made up of a chain of simple arguments. This means that the conclusion of one argument acts \nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be \nsuccessful.[43] \n\nArguments and inferences are either \ncorrect or incorrect. If they are correct \ntheir \ntheir premises support \nthen \nconclusion. In the incorrect case, this \nsupport \ntake \ndifferent forms corresponding to the \ndifferent types of reasoning.[62] The \nstrongest form of support corresponds \nto deductive reasoning. But even \narguments that are not deductively \nvalid may still be good arguments \ntheir premises offer non- \nbecause \ndeductive support to their conclusions. \nFor such cases, the term*ampliative*or \nused.[63] \n*inductive*\nDeductive arguments are associated \nwith formal logic in contrast to the \nrelation between ampliative arguments and informal logic.[64] \n\nis missing. It can \n\nArgument terminology used in logic \n\n**Deductive**\nA deductively valid argument is one whose premises guarantee the truth of its conclusion.[11] For \ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are \nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the \nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) \ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises.[65] \n\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) \nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a \npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that \nthey hold by logical necessity for the given propositions, independent of any other circumstances.[66] \n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of \ninference.[67] Rules of inference specify the form of the premises and the conclusion: how they have to be \nstructured for the inference to be valid. Arguments that do not follow any rule of inference are \ndeductively invalid.[68] The modus ponens is a prominent rule of inference. It has the form \"*p*; if*p*, then \n*q*; therefore*q*\".[69] Knowing that it has just rained ( ) and that after rain the streets are wet ( \n), one \ncan use modus ponens to deduce that the streets are wet ( ).[70] \n\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is \nimpossible for the premises to be true and the conclusion to be false.[71] Because of this feature, it is often \nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new \ninformation not already present in the premises.[72] But this point is not always accepted since it would \nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions \nbehind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant \nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the \nbasic laws of logic. \n\n**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] \n\n**Formal logic**\n\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal \napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the \nlogical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is \nonly concerned with the abstract structure of arguments and not with their concrete content.[10] \n\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] \n\nFormal logic uses formal languages to express and analyze arguments.[17] They normally have a very \nlimited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to \nconstruct sentences, so-called well-formed formulas.[18] This simplicity and exactness of formal logic \nmake it capable of formulating precise rules of inference. They determine whether a given argument is \nvalid.[19] Because of the reliance on formal language, natural language arguments cannot be studied \ndirectly. Instead, they need to be translated into formal language before their validity can be assessed.[20] \n\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense,*a logic*is \na logical formal system. Distinct logics differ from each other concerning the rules of inference they \naccept as valid and the formal languages used to express them.[21] Starting in the late 19th century, many", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
21. MRIIMEBExSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSERSSSERSSERSSERSSER
22. Haseck 15F7B, pp. 1 – 2.4, Philosaphy of logics ; Himbke & Sandia 2005, pp. 15 – 17 ; Jacquette 2006, Introduction : Philosophy of logic today, pp. 1 – 12.
Z2. Heada : 3370, pp. 2 - 2.4, Philosophy of logacs ; 3acasyette : _DSK ; pp. 1 – 12, Introduction : Philosophy of logic today.
23. Heack 1597B, pp 5 - 71.9, Phliosophy of logics, Hintilkke & Sanda 2006, pp. 31 - 2, Hadek 1599b, pp. 220 – 30.
24. Heack 1.5570, pp : 1 - 10, Prilosophy of logics ; Grostic 2022, lead section ; 1.1 Formal and Informal Logic.
25. Johnson 2014, pp. 228 – 9.
Zn. Groather, Zfc2, lead section ; L. History Audi 13959a, Informal logic, Johnson 12993, pp. 255 - 274.
27. Craig 1996, Formal and informal logic, Johnson 1999, p. 267.
28.88air & Johnson 2000, pp. 53 – 97 ; Craig 1599, Formal and informal logic.
29. Johnssm 2999, pp. 265 – 270 ; van Eemeren et al., pp. 1 – 45, Informal Logic.
30. Groathe 2022.1. 1 Formal and Informal Logic, Audi 1599a, Informal logic, Honderich 2005, logic, informal.
31. Blein & Johnson : 2000, pp. 93 – 107, Groserke 2023, lead section ; 1.1 Formal and Informal Logic ; van Eemeren et al., p. 159.
32. Oaksford & Chater 2007, p. 47.
33. Craiga 1395, Formal and informal logic ; Wallon : 5957, pp. 2 – 3.6 – 5.1. A new model of argument ; Engel L992 ; pp. 59 – 92.2. The medium of language.
34. Blair & Johnson 1997, pp. 147 – 51.
St. Falkowork & Millis. ESCE, p. SR, VHsddle. Zr21L, p. 362 – 8.36. Informal logic and the educative - inductive distinction ; Blair 201L ; p. 47.
36. Vickers 2022 ; Nunes 2011, pp. 2060 – 9, Logical Reasoning and Learning.
37. Johnson 2014, p. 181, Johnson 1599, p. 257, Blair & Johnson 15937, pp. 147 – 51.
30. Vleet 2010, pp. ix - x, Introduction ; Dowden ; Stump.
39. Maltby, Day & Macaskill 2007, p. 564 ; Dowden.
40. Craig_1995, Formal and informal logic ; 3ohnson 1399, pp. 265 – 270.
41. Audi 1999b, Philosophy of logic ; Honderich 2005, philosophical logic.
42. Haack 1974, p. 51.
43. Audi 1999b, Philosophy of logic.
44. Falguera, Martinez - Vidal & Rosen 2021 ; Tondl 2012, p. 111.
45. Olk0M5ki β. Prin048kis 2023, pp. 55 – 50 [ https :// books. garogle. com / books? 55 – 59.85.0049.454.868597765 )
46. Audi 1999b, Philosophy of logic ; Pietroski 2021.
47. Audi 159990, Phl0sophy of logic ; Kusch 2020 ; Rush 2014 ; pp. 1 – 110.289 – 1590.
48. King 2019 ; Pickel 2020, pp. 2991 – 3006.
49. Honderich 2005, philosophical logic.
50. Pickel 2020, pp. 2991 – 3006.
52. Honderich 2005, philosophical logic, Craig 2995, Philosophy of logic ; Michaelson & Reimer 2013.
52. Michaelson & Reimer 2019.
53. Hintikka 2019, SNature and varieties of logic ; MacFarlate 2017.
54. Gomez - Torrente 20139 ; MacFatiane 2017 ; Honderich ZUD5, philosophical logic.
", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia1.pdf" + }, + { + "text": "logical constants for correct inferences while informal logic also takes the meaning of substantive \nconcepts into account. Further approaches focus on the discussion of logical topics with or without formal \ndevices and on the role of epistemology for the assessment of arguments.[40] \n\n**Premises, conclusions, and truth**\n\n**Premises and conclusions**\n\n*Premises*and*conclusions*are the basic parts of inferences or arguments and therefore play a central role \nin logic. In the case of a valid inference or a correct argument, the conclusion follows from the premises, \nor in other words, the premises support the conclusion.[41] For instance, the premises \"Mars is red\" and \n\"Mars is a planet\" support the conclusion \"Mars is a red planet\". For most types of logic, it is accepted \nthat premises and conclusions have to be truth-bearers.[41][a] This means that they have a truth value: they \nare either true or false. Contemporary philosophy generally sees them either as*propositions*or as \n*sentences*.[43] Propositions are the denotations of sentences and are usually seen as abstract objects.[44] \nFor example, the English sentence \"the tree is green\" is different from the German sentence \"der Baum ist \ngrün\" but both express the same proposition.[45] \n\nPropositional theories of premises and conclusions are often criticized because they rely on abstract \nobjects. For instance, philosophical naturalists usually reject the existence of abstract objects. Other \narguments concern the challenges involved in specifying the identity criteria of propositions.[43] These \nobjections are avoided by seeing premises and conclusions not as propositions but as sentences, i.e. as \nconcrete linguistic objects like the symbols displayed on a page of a book. But this approach comes with \nnew problems of its own: sentences are often context-dependent and ambiguous, meaning an argument's \nvalidity would not only depend on its parts but also on its context and on how it is interpreted.[46] Another \napproach is to understand premises and conclusions in psychological terms as thoughts or judgments. \nThis position is known as psychologism. It was discussed at length around the turn of the 20th century \nbut it is not widely accepted today.[47] \n\n**Internal structure**\n\nPremises and conclusions have an internal structure. As propositions or sentences, they can be either \nsimple or complex.[48] A complex proposition has other propositions as its constituents, which are linked \nto each other through propositional connectives like \"and\" or \"if...then\". Simple propositions, on the other \nhand, do not have propositional parts. But they can also be conceived as having an internal structure: they \nare made up of subpropositional parts, like singular terms and predicates.[49][48] For example, the simple \nproposition \"Mars is red\" can be formed by applying the predicate \"red\" to the singular term \"Mars\". In \ncontrast, the complex proposition \"Mars is red and Venus is white\" is made up of two simple propositions \nconnected by the propositional connective \"and\".[49] \n\nWhether a proposition is true depends, at least in part, on its constituents. For complex propositions \nformed using truth-functional propositional connectives, their truth only depends on the truth values of \ntheir parts.[49][50] But this relation is more complicated in the case of simple propositions and their", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
56. Magnus 2005, pp. 35 – 38.2. Truth tables ; Angel 1.584, p. 154, HaB & CrDomell 2000, p. 49 [ Mtps :// books. gaogle. com / books? 651e = P. MUS0C - 2bp. days - P. 449 ].57. Magnus 2005, pp. 35 – 45.3. Truth tables ; Angell 1964, p. 164.
58. Tarski 1994, p. 40.59. Hintikez029, lead section,< underline > SNature and varieties of logic Audi 1999b, Philosophy of logic.
60. Blackburn 2008, argument ; Stairs 2017, p. 343.61. Copi, Cohen & Rodych 2013, p. 30 ( Intps :// books. poope. com / books?/ dc - 30bADwAAOBAJ6.92 - 92 - 92 - 930 ).
62. Hintikka & Sandu 2006, p. 20 ; Backmann 2019, pp. 235 – 255 ; IEP Staff.63. Hintikka & Sandu 2006, p. 16 ; Backmann 2013, pp. 235 – 255, IEP Staff.
64. Groarke 2021.1. 1 Formal and Informal Logic ; Weddle 2011, pp. 383 – 8.36. Informal logic and the eductive - inductive distinction ; van Eermeren iii Grarssen 2009, p. 191.65. Evance 2005.8. Deductive Reasoning, p. 159 [ https :// books google. com / books? itb < underline > https :// dnks crtbkHsaC @ QeMCAsp < underline > PALIS9
66. McKeon.67. Hintikka & Sandu 2006, pp. 13 – 4.
60. Hintikka & Sandu 2006, pp. 13 – 4 ; Blackburn 2016, rule of inference.69. Blackburn 2016, rule of inference.
70. Dick & Muller 2017, p. 157.71. Hintikia & Sandu Z006, p. 13 ; Backmann 2013 ; pp. 235 – 255 ; Douven 2021.
72. Hintikka & Sandu 2006, p. 14 ; DAgostino & Floridi 2009, pp. 271 – 315.73. Hintike 8. Satisticiz006, p. 14 ; Saquillo 2014, pp. 75 – 80 ; Hintikka 1370, pp. 135 – 152.
74. Hintike & Sandu 2006, pp. 13 – 6 ; Backmann 2013, pp. 235 – 255, IEP Staff.75. Rocci 2017, p. 26 ; Hintikka & Sandu 2006, pp. 13.16 ; Douven 2021.
76. IEP Staff ; Douven 2021 ; Hawthorne 2021.77.1EP Staff ; Hawthorne 2021 ; Wilbanks 2010, pp. 107 – 124.
78. Douven 2021.79. Groarke 2021.4. 1 AV Criteria ; Possin 2015, pp. 563 – 593.
B0. Scott & Marshall 2009, arashytic induction ; Houde & Camacho 2003, Induction.81. Borchert 2006b, Induction.
R2. Douven 2012 ; Koolowslii 2017 ; Abductive researching and explanation ( https :// www. tag / other cis. comfocoled / 212.424 / 3783.115725677 - 35 / abductive - treacming - explanation - bartae - kod ( 969 )83. Cummings 2010, Abduction, p. 1.
84. Hansen 2020 ; Chatfield 2017, p. 194.85 Walton 1997, pp. 7.1. A new model of argument ; Hansen 2020.
86. Hansen 2020.87. Hansen 2020 ; Walton 1987, pp. 63.3. Logic of propositions.
88. Sternberg ; Stone 2012, pp. 327 – 356.89. Walton 15957, pp. 2 – 4.1. A new model of argument, Dowden ; Hansen 2020.
90. Engel 1.982, pp. 50 – 92.2. The medium of language : Mackle 1967 ; Stump.91. Stump ; Engel 1.982, pp. 143 – 212.4. Fallacies of presumption.
92. Stump : Mackie 1967.93. Hintikka & Sandu 2006, p. 20.
94. Hintikka & Sandu 2006, p. 20 ; Pedemonte 2018, pp. 1 – 17 ; Hintikka 2023.
", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", + "target_page": 18, + "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of \nNames focused on the use of language and on paradoxes. For example, Gongsun Long proposed the \nwhite horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism \nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the \nrealm of ethics.[197] \n\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It \nwas not treated as a separate academic discipline and discussions of its topics usually happened in the \ncontext of epistemology and theories of dialogue or argumentation.[198] In Nyaya, inference is understood \nas a source of knowledge (pramāṇa). It follows the perception of an object and tries to arrive at \nconclusions, for example, about the cause of this object.[199] A similar emphasis on the relation to \nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the \nknowledge gained through other sources.[200] Some of the later theories of Nyaya, belonging to the \nNavya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense \nand reference and his definition of number.[201] \n\nThe syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when \ninterest in the foundations of mathematics stimulated the development of modern symbolic logic.[202] \nMany see Gottlob Frege's*Begriffsschrift*as the birthplace of modern logic. Gottfried Wilhelm Leibniz's \nidea of a universal formal language is often considered a forerunner. Other pioneers were George Boole, \nwho invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the \nlogic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these \ninsights in their work*Principia Mathematica*. Modern logic introduced novel concepts, such as functions, \nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language \nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on \nnatural language.[203] Of particular influence was the development of first-order logic, which is usually \ntreated as the standard system of modern logic.[204] Its analytical generality allowed the formalization of \nmathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model \ntheory possible and provided the foundation of modern mathematical logic.[205]", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia1.pdf" + }, + { + "text": "11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3. \nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat \no.stanford.edu/entries/chinese-logic-language/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Rautenberg, Wolfgang (1 July 2010).*A Concise Introduction to Mathematical Logic*. \nSpringer. p. 15. ISBN 978-1-4419-1221-3. \nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri \nes/logic-epistemic/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 11 March 2023. \nRestall, Greg; Standefer, Shawn (2023).*Logical Methods*. MIT Press. p. 91. ISBN 978-0- \n262-54484-9. \nRichardson, Alan W. (1998).*Carnap's Construction of the World: The Aufbau and the*\n*Emergence of Logical Empiricism*. Cambridge University Press. p. 15. ISBN 978-0-521- \n43008-1. \nRini, Adriane (13 December 2010).*Aristotle's Modal Proofs: Prior Analytics A8-22 in*\n*Predicate Logic*. Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5. \nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d \noi.org/10.22329%2Fil.v28i4.2856).*Informal Logic*.**28**(4): 335. doi:10.22329/il.v28i4.2856 (h \nttps://doi.org/10.22329%2Fil.v28i4.2856). \nRocci, Andrea (8 March 2017).*Modality in Argumentation: A Semantic Investigation of the*\n*Role of Modalities in the Structure of Arguments with an Application to Italian Modal*\n*Expressions*. Springer. p. 26. ISBN 978-94-024-1063-1. \nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\".*Philosophy*\n*Compass*.**10**(5): 301–309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 \n6). \nRunco, Mark A.; Pritzker, Steven R. (1999).*Encyclopedia of Creativity*. Academic Press. \np. 155. ISBN 978-0-12-227075-8. \nRush, Penelope (2014). \"Introduction\".*The Metaphysics of Logic*(https://philpapers.org/rec/ \nRUSTMO-4). Cambridge University Press. pp. 1–10. ISBN 978-1-107-03964-3. Archived (htt \nps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the \noriginal on 7 December 2021. Retrieved 8 January 2022. \nSadegh-Zadeh, Kazem (2015).*Handbook of Analytic Philosophy of Medicine*. Springer. \np. 983. ISBN 978-94-017-9579-1. \nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\".*Teorema: Revista*\n*Internacional de Filosofía*.**33**(2): 75–88. ISSN 0210-1602 (https://search.worldcat.org/issn/ \n0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609). \nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022).*Handbook of Logical Thought in India*. \nSpringer Nature. pp. 117–8. ISBN 978-81-322-2577-5. \nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic).*Encyclopædia*\n*Britannica*. Retrieved 23 September 2022. \nSchechter, Joshua. \"Epistemology of Logic – Bibliography\" (https://philpapers.org/browse/ep \nistemology-of-logic).*PhilPapers*. Retrieved 11 September 2022. \nSchlesinger, I. M.; Keren-Portnoy, Tamar; Parush, Tamar (1 January 2001).*The Structure of*\n*Arguments*. John Benjamins Publishing. p. 220. ISBN 978-90-272-2359-3. \nSchreiner, Wolfgang (2021).*Thinking Programs: Logical Modeling and Reasoning About*\n*Languages, Data, Computations, and Executions*. Springer Nature. p. 22. ISBN 978-3-030- \n80507-4. \nScott, John; Marshall, Gordon (2009). \"analytic induction\".*A Dictionary of Sociology*(https:// \nwww.oxfordreference.com/view/10.1093/oi/authority.20110803095410661). Oxford \nUniversity Press. ISBN 978-0-19-953300-8. Archived (https://web.archive.org/web/2022010 \n8173225/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095410661) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nShapiro, Stewart; Kouri Kissel, Teresa (2022). \"Classical Logic\" (https://plato.stanford.edu/e \nntries/logic-classical/#Sema).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Retrieved 19 July 2023.", + "page_start": 34, + "page_end": 34, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Top row: Aristotle, who established the canon of western philosophy;[108] and Avicenna, who replaced \nAristotelian logic in Islamic discourse.[180] Bottom row: William of Ockham, a major figure of medieval \nscholarly thought;[181] and Gottlob Frege, one of the founders of modern symbolic logic.[182] \n\nIbn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the \ndominant system of logic in the Islamic world.[189] It influenced Western medieval writers such as \nAlbertus Magnus and William of Ockham.[190] Ibn Sina wrote on the hypothetical syllogism[191] and on \nthe propositional calculus.[192] He developed an original \"temporally modalized\" syllogistic theory, \ninvolving temporal logic and modal logic.[193] He also made use of inductive logic, such as his methods \nof agreement, difference, and concomitant variation, which are critical to the scientific method.[191] Fakhr \nal-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and \nformulated an early system of inductive logic, foreshadowing the system of inductive logic developed by \nJohn Stuart Mill.[194] \n\nDuring the Middle Ages, many translations and interpretations of Aristotelian logic were made. The \nworks of Boethius were particularly influential. Besides translating Aristotle's work into Latin, he also \nproduced textbooks on logic.[195] Later, the works of Islamic philosophers such as Ibn Sina and Ibn \nRushd (Averroes) were drawn on. This expanded the range of ancient works available to medieval \nChristian scholars since more Greek work was available to Muslim scholars that had been preserved in \nLatin commentaries. In 1323, William of Ockham's influential*Summa Logicae*was released. It is a \ncomprehensive treatise on logic that discusses many basic concepts of logic and provides a systematic \nexposition of types of propositions and their truth conditions.[196]", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Marenbon, John (2021). \"Anicius Manlius Severinus Boethius\" (https://plato.stanford.edu/ent \nries/boethius/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. \nMcKeon, Matthew. \"Logical Consequence\" (https://iep.utm.edu/logcon/).*Internet*\n*Encyclopedia of Philosophy*. Archived (https://web.archive.org/web/20211112071437/https:// \niep.utm.edu/logcon/) from the original on 12 November 2021. Retrieved 20 November 2021. \nMichaelson, Eliot; Reimer, Marga (2019). \"Reference\" (https://plato.stanford.edu/entries/refe \nrence/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20211207184705/https://plato.stanford.ed \nu/entries/reference/) from the original on 7 December 2021. Retrieved 4 December 2021. \nMills, Ethan (2018).*Three Pillars of Skepticism in Classical India: Nagarjuna, Jayarasi, and*\n*Sri Harsa*. Rowman & Littlefield. p. 121. ISBN 978-1-4985-5570-8. \"... for Nyāya all \ninference is ultimately rooted in perception ... Naiyāyikas typically accept four means of \nknowledge: perception, inference, comparison, and testimony.\" \nMonk, J. Donald (1976). \"Introduction\" (https://link.springer.com/chapter/10.1007/978-1-468 \n4-9452-5_1).*Mathematical Logic*. Springer. pp. 1–9. doi:10.1007/978-1-4684-9452-5_1 (http \ns://doi.org/10.1007%2F978-1-4684-9452-5_1). ISBN 978-1-4684-9452-5. Archived (https://w \neb.archive.org/web/20220109131251/https://link.springer.com/chapter/10.1007/978-1-4684- \n9452-5_1) from the original on 9 January 2022. Retrieved 9 January 2022. \nMoore, Kevin; Cromby, John (8 August 2016).*How Best to 'Go On'? Prospects for a*\n*'Modern Synthesis' in the Sciences of Mind*. Frontiers Media SA. p. 60. ISBN 978-2-88919- \n906-8. \nMoore, Terence; Carling, Christine (1982).*Understanding Language: Towards a Post-*\n*Chomskyan Linguistics*. Springer. p. 53. ISBN 978-1-349-16895-8. \nMoschovakis, Joan (2022). \"Intuitionistic Logic\" (https://plato.stanford.edu/entries/logic-intuiti \nonistic/).*The Stanford Encyclopedia of Philosophy: Introduction*. Metaphysics Research \nLab, Stanford University. Retrieved 11 March 2023. \nNolt, John (2021). \"Free Logic: 1. The Basics\" (https://plato.stanford.edu/entries/logic-free/# \n1).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Retrieved 10 September 2022. \nNunes, Terezinha (2011). \"Logical Reasoning and Learning\". In Seel, Norbert M. (ed.). \n*Encyclopedia of the Sciences of Learning*. Springer Science & Business Media. pp. 2066– \n2069. ISBN 978-1-4419-1427-9. \nO'Regan, Gerard (2016).*Introduction to the History of Computing: A Computing History*\n*Primer*. Springer. p. 49. ISBN 978-3-319-33138-6. \nOaksford, Mike; Chater, Nick (2007).*Bayesian Rationality: The Probabilistic Approach to*\n*Human Reasoning*. OUP Oxford. p. 47. ISBN 978-0-19-852449-6. \nOlkowski, Dorothea; Pirovolakis, Eftichis (31 January 2019).*Deleuze and Guattari's*\n*Philosophy of Freedom: Freedom's Refrains*. Routledge. pp. 65–66. ISBN 978-0-429-66352- \n9. \nOlsson, Erik J. (2018). \"Bayesian Epistemology\".*Introduction to Formal Philosophy*(https:// \nphilpapers.org/rec/OLSBE). Springer. pp. 431–442. ISBN 978-3-030-08454-7. Archived (http \ns://web.archive.org/web/20210516095057/https://philpapers.org/rec/OLSBE) from the \noriginal on 16 May 2021. Retrieved 4 January 2022. \nOnline Etymology Staff. \"Logic\" (https://www.etymonline.com/word/logic?ref=etymonline_cro \nssreference).*etymonline.com*. Archived (https://web.archive.org/web/20211229134626/http \ns://www.etymonline.com/word/logic?ref=etymonline_crossreference) from the original on 29 \nDecember 2021. Retrieved 29 December 2021. \nPartee, Barbara H. (2016). Aloni, Maria; Dekker, Paul (eds.).*The Cambridge Handbook of*\n*Formal Semantics*. Cambridge University Press. ISBN 978-1-107-02839-5.", + "page_start": 32, + "page_end": 32, + "source_file": "wikipedia1.pdf" + }, + { + "text": "170. Clocksin & Mellish 2003, pp. 237–238, 252–255, 257, The Relation of Prolog to Logic; \n\nDaintith & Wright 2008, Logic Programming Languages (https://www.encyclopedia.com/com \nputing/dictionaries-thesauruses-pictures-and-press-releases/logic-programming-languages). \n\n171. O'Regan 2016, p. 49; Calderbank & Sloane 2001, pp. 768. \n172. Daintith & Wright 2008, Logic Gate (https://www.encyclopedia.com/computing/dictionaries-th \n\nesauruses-pictures-and-press-releases/logic-gate). \n\n173. Janssen & Zimmermann 2021, pp. 3–4; Partee 2016; King 2009, pp. 557–8; Aloni & Dekker \n\n2016, pp. 22–23 (https://books.google.com/books?id=ltSgDAAAQBAJ&pg=PT22). \n\n174. Warren 2020, 6. The Epistemology of Logic; Schechter. \n175. Warren 2020, 6. The Epistemology of Logic. \n176. Schechter. \n177. Gómez-Torrente 2019. \n178. Warren 2020, 6. The Epistemology of Logic; Gómez-Torrente 2019; Warren 2020, 1. What is \n\nConventionalism. \n\n179. Chua 2017, pp. 631–636; Wilce 2021; Putnam 1969, pp. 216–241. \n180. Lagerlund 2018. \n181. Spade & Panaccio 2019. \n182. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4), 1. \n\nIntroduction; Hintikka & Spade, Modern logic, Logic since 1900. \n\n183. Kline 1972, \"A major achievement of Aristotle was the founding of the science of logic\", p. \n\n53; Łukasiewicz 1957, p. 7; Liu & Guo 2023, p. 15. \n\n184. Lear 1980, p. 34. \n185. Knuuttila 1980, p. 71; Fisher, Gabbay & Vila 2005, p. 119. \n186. Berman 2009, p. 133. \n187. Frede; Groarke. \n188. Ewald 2019; Smith 2022. \n189. Hasse 2008; Lagerlund 2018. \n190. Washell 1973, pp. 445–50; Kneale & Kneale 1962, pp. 229, 266. \n191. Goodman 2003, p. 155. \n192. Goodman 1992, p. 188. \n193. Hintikka & Spade, Arabic Logic (https://www.britannica.com/topic/history-of-logic/Medieval-lo \n\ngic#ref65928). \n\n194. Iqbal 2013, pp. 99–115, The Spirit of Muslim Culture. \n195. Marenbon 2021, Introduction; 3. The Logical Text-Books; Hintikka & Spade. \n196. Hintikka & Spade; Hasse 2008; Spade & Panaccio 2019. \n197. Willman 2022; Rošker 2015, pp. 301–309. \n198. Sarukkai & Chakraborty 2022, pp. 117–8. \n199. Dasti, Lead section; 1b. Inference; Mills 2018, p. 121 (https://books.google.com/books?id=s \n\nGhqDwAAQBAJ&pg=PA121). \n\n200. Emmanuel 2015, pp. 320–2; Vidyabhusana 1988, p. 221. \n201. Chakrabarti 1976, pp. 554–563. \n202. Groarke; Haaparanta 2009, pp. 3–5 (https://books.google.com/books?id=0jXavKsArnIC&pg \n\n=PA3), 1. Introduction. \n\n203. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4); \n\nHintikka & Spade, Modern logic, Logic since 1900. \n\n204. Ewald 2019. \n205. Ewald 2019; Schreiner 2021, p. 22.", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Gamut, L.T.F. (1991).*Logic, Language and Meaning Vol 1: Introduction to Logic*. University \nof Chicago Press. 5.5. ISBN 978-0-226-28085-1. \nGarson, James (2023). \"Modal Logic\" (https://plato.stanford.edu/entries/logic-modal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nGensler, Harry J. (2006).*The A to Z of Logic*. Scarecrow Press. pp. xliii–xliv. ISBN 978-1- \n4617-3182-5. \nGoble, Lou (2001). \"Introduction\".*The Blackwell Guide to Philosophical Logic*(https://philpa \npers.org/rec/GOBTBG-2). Wiley-Blackwell. pp. 1–8. ISBN 978-0-631-20692-7. Archived (htt \nps://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2) from the \noriginal on 7 December 2021. Retrieved 4 January 2022. \nGoodman, Lenn Evan (1992).*Avicenna*. Routledge. p. 188. ISBN 978-0-415-01929-3. \nGoodman, Lenn Evan (2003).*Islamic Humanism*. Oxford University Press. p. 155. \nISBN 978-0-19-513580-0. \nGroarke, Louis F. \"Aristotle: Logic\" (https://iep.utm.edu/aris-log/).*Internet Encyclopedia of*\n*Philosophy*. Archived (https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris \n-log/) from the original on 29 December 2021. Retrieved 1 January 2022. \nGroarke, Leo (2021). \"Informal Logic\" (https://plato.stanford.edu/entries/logic-informal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nArchived (https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/lo \ngic-informal/) from the original on 12 January 2022. Retrieved 31 December 2021. \nGómez-Torrente, Mario (2019). \"Logical Truth\" (https://plato.stanford.edu/entries/logical-trut \nh/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20211002190110/https://plato.stanford.ed \nu/entries/logical-truth/) from the original on 2 October 2021. Retrieved 22 November 2021. \nGödel, Kurt (1984). \"Russell's mathematical logic\". In Benacerraf, Paul; Putnam, Hilary \n(eds.).*Philosophy of Mathematics: Selected Readings*(https://www.cambridge.org/core/boo \nks/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03 \nEF1EF5BE7E4) (2nd ed.). Cambridge University Press. pp. 447–469. ISBN 978-0-521- \n29648-9. Archived (https://web.archive.org/web/20220111091740/https://www.cambridge.or \ng/core/books/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE \n06149D03EF1EF5BE7E4) from the original on 11 January 2022. Retrieved 9 January 2022. \nHájek, Petr (3 September 2006). \"Fuzzy Logic\" (https://plato.stanford.edu/Archives/Win201 \n2/entries/logic-fuzzy/).*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 19 July 2023. \nHájek, Alan; Lin, Hanti (2017). \"A Tale of Two Epistemologies?\" (https://philpapers.org/rec/H \nJEATO).*Res Philosophica*.**94**(2): 207–232. doi:10.11612/resphil.1540 (https://doi.org/10.1 \n1612%2Fresphil.1540). S2CID 160029122 (https://api.semanticscholar.org/CorpusID:16002 \n9122). Archived (https://web.archive.org/web/20220104182746/https://philpapers.org/rec/HJ \nEATO) from the original on 4 January 2022. Retrieved 4 January 2022. \nHall, Cordelia; O'Donnell, John (2000).*Discrete Mathematics Using a Computer*. Springer \nScience & Business Media. p. 48. ISBN 978-1-85233-089-7. \nHoude, R.; Camacho, L. (2003). \"Induction\".*New Catholic Encyclopedia*(https://www.encycl \nopedia.com/science-and-technology/computers-and-electrical-engineering/electrical-engine \nering/induction). ISBN 978-0-7876-4004-0. Archived (https://web.archive.org/web/20220108 \n171720/https://www.encyclopedia.com/science-and-technology/computers-and-electrical-en \ngineering/electrical-engineering/induction) from the original on 8 January 2022. Retrieved \n8 January 2022. \nHaack, Susan (1974).*Deviant Logic: Some Philosophical Issues*. CUP Archive. p. 51. \nISBN 978-0-521-20500-9.", + "page_start": 28, + "page_end": 28, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
cy7 ) from the original on 29 April 2010. Fetrieved 19 March 2021
van Externeren, Frass H., Garssen, Bari ( 2009 ), Pondering on Problems of Argumentation : Trienty Etsays on Theoretical Issues. Springer Science & Business Media, p. I3L ISDN IFTB - 1 - 4029 - 926 - 0.95 - 0.95 - 0.
var Exmercise, Frace is Harce, Bart, Foatible, EtiA, C, Sinceal, Herdemanria, A, Functica, Vorbep, Bart, Vogemans, Journ 1.2011, Yohymal Lygaca, Typtosyl, gonogenica, Commercipancing Gu ( Local Four - Foley - Follow - up - 7 ), Partiale
var Exmerer, Frans H2, Grootendorat, Rob, 2ohnson, Ralph H, Plantin, Christian ; Willand, Chalelet A, DDD33 ). Fundamerbida of Appamentation Theory ; A Heardbook of Helitorial Backgrounds and Contemporary Developments. Routiledgel
Emmanuel, Steven M. ( 2015 ), A Companion to Buddhist Philosophy, John Wiley & Stins. pp. 320 – 2.1520 % 970 - 2.14490 - 3.
Enderton, Herbert ( 2001 ). A Mathematical Introduction to Logic. Elsevier. IS20.978 – 9 : 12 – 220.452 – 3.
Engal. 5. Moritis ( LSRID ). With Cood Becauson an introduction to Informal Faillaceies ( https :// ghill papers. org / necENOQIQIF ). St. Matrit ' s Press. GSRI ( TIF4 - 3.12.9347.4. Acthled ) fittps :// lyth. archive. org / nebr202.035 / pe2
Evares, Jonathan St. B. T. ( 2005 ). Y. Deductive Reasoning ”. In Monison, Robent ( ed.). The Cambridge Handbook of Thinking and Reasoning. Cambridge University Press. p. 159. SSBN 979 - 9.9. 924.17 - 0.
Evald, William ( 2029 ), “ The Emergence of First - Order Logic ” ( https :// plato. startford edu / entri es / logic - fratorder - emergence ), The Stanford Encyclopedia of Piliosophy. MetaphysicsResearch Lab. Stanford University. Retrier
Failures, 2reak : 1, Matrines Hab, Contricular, Coldern, Coldern ( 222 ), “ Adeptace, Chlysector,”[ Migrs ]/ platez, startfant, edu / entrieroldestract - objects ( s )]. The Stanford Encycliquandia of Philososis [ hyperlaphycics Relar
Falkowski, Anthony ; Mills, Susan ( 2022 ), Experiencing Phlosqohy ( 2nd ed.), Broadview Press. p. 98.1SEN? E?,+ 77048 - B41 - 3.
Fisher, Michael David ; Gabbay, Dov M.; Vila, Lluis ( Z005 ), Handbook of Temporal Reasoning in Artificial Intelligence. Elsevier. p. 1.13.1SBN 370 - 06 - 05335 - 0.
Fitch, G. W. ( 18 December 2014 ). SauI Kripke. Routledge. p. 17.1SDN 97B - 1 - 3217 - 49927.7.
Fistyfiski, Jakub ( 7 December 2020 ). Knowledge - Based Explorable Extended Reality Environments. Springer Nature. p. 33.153.970 - 3 - G33 - 53955 - 2.
Forti, Josep Mariac, Jansana, Ramon ( 20127 ). A General Algebraeic Semantics for Sentential Logics. Cambridge University Press. p. 8. ( SBN 970 - 2 - 207 - 25737 - 2.
Frede, Michael. “ Aristofie ” (“ Mtps :// pages. mtu. edul = pcharles / SCH / STOPY / laristofe. html ]. Michigan Technological University. Retrieved 1 November 2022.
Friend, Michele ( 2014 ). Introducing Philosophy of Mathematics. Routledge, p. 101.1SBN 978 - 1 - 327 - 99379 - 2.
", + "page_start": 27, + "page_end": 27, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is considered a deductively valid argument regarding logic ?", + "target_page": 6, + "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "argument is made up of a chain of simple arguments. This means that the conclusion of one argument acts \nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be \nsuccessful.[43] \n\nArguments and inferences are either \ncorrect or incorrect. If they are correct \ntheir \ntheir premises support \nthen \nconclusion. In the incorrect case, this \nsupport \ntake \ndifferent forms corresponding to the \ndifferent types of reasoning.[62] The \nstrongest form of support corresponds \nto deductive reasoning. But even \narguments that are not deductively \nvalid may still be good arguments \ntheir premises offer non- \nbecause \ndeductive support to their conclusions. \nFor such cases, the term*ampliative*or \nused.[63] \n*inductive*\nDeductive arguments are associated \nwith formal logic in contrast to the \nrelation between ampliative arguments and informal logic.[64] \n\nis missing. It can \n\nArgument terminology used in logic \n\n**Deductive**\nA deductively valid argument is one whose premises guarantee the truth of its conclusion.[11] For \ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are \nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the \nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) \ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises.[65] \n\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) \nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a \npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that \nthey hold by logical necessity for the given propositions, independent of any other circumstances.[66] \n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of \ninference.[67] Rules of inference specify the form of the premises and the conclusion: how they have to be \nstructured for the inference to be valid. Arguments that do not follow any rule of inference are \ndeductively invalid.[68] The modus ponens is a prominent rule of inference. It has the form \"*p*; if*p*, then \n*q*; therefore*q*\".[69] Knowing that it has just rained ( ) and that after rain the streets are wet ( \n), one \ncan use modus ponens to deduce that the streets are wet ( ).[70] \n\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is \nimpossible for the premises to be true and the conclusion to be false.[71] Because of this feature, it is often \nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new \ninformation not already present in the premises.[72] But this point is not always accepted since it would \nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or \n\nArguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Notes**\n\na. However, there are some forms of logic, like imperative logic, where this may not be the \n\ncase.[42] \n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the \n\nreasons are strong enough to decisively support the conclusion. \n\n**Citations**\n\n\n \n \n \n \n [html]\n
3. Nunes 2011, pp. 2066 – 2069.
4. Pepin 2004, Logos ; Online Etymology Staff.
5. Hintika_2019, lead section, SNature and varieties of logic.
6. Hintikka 2013_SNature and varieties of logic ; Haack 2.978, pp. 2 – 20, Phliosophy of logics ; Schleezinger, Kensn - Portnoy & Parush 2001, p. 220.
7. Hintikka & Sandu 2006, p. 13 ; Audi 1999b, Philosophy of logic ; McKeon.
8. Blair & Johnson 2000, pp. 93 – 95 ; Craig 1996 ; Formal and informal logic.
9. Craig 1B95, Formal and informal logic Barres 2007, p. 274, Plasty - Borjour 2012, p. 62 ( https :// fooles. goode. com / books / n5 = 5Eyp / μl / 26AJ / 26AJ / 26A2 ). Fsfri. 2013, p. 25 ( https :// fss. goode. comboks? n5 = 66244 / gCapp? P25 ).
10. MacFarlane 2017 ; Cohum 2015, pp. 763 – 767 ; Blair & Johnson 2000, pp. 95 ; Magnus 2005, pp. 12 – 4.1. 5 Formal languages.
11. McKeon ; Craig 1996, Formal and informal logic.
12. Hintikka & Sandu 2006, p. 13.
13. Magnus 2005, Proofs, p. 102.
14. Himtlika & Sandu Z006, pp. 13 - 16 ; Makridis 2022, pp. 1 - 2 ; Runco & Pritzker 1999, p. 155.
15. Gomez - Torrente 2019 ; Magnus 2005.1. 5 Other logical notions, p. 10.
16. Hintikka & Sandu 2006, p. 16.
LT. Honderich 2005, logic, informal ; Craig 15989, Formal and informal logic ; Johnson 1599.1pp 255 – 258.
18. Craig 1996, Formal languages and systems ; Simpson 2008, p. 14.
", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia1.pdf" + }, + { + "text": "propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions \nbehind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant \nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the \nbasic laws of logic. \n\n**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] \n\n**Formal logic**\n\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal \napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the \nlogical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is \nonly concerned with the abstract structure of arguments and not with their concrete content.[10] \n\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] \n\nFormal logic uses formal languages to express and analyze arguments.[17] They normally have a very \nlimited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to \nconstruct sentences, so-called well-formed formulas.[18] This simplicity and exactness of formal logic \nmake it capable of formulating precise rules of inference. They determine whether a given argument is \nvalid.[19] Because of the reliance on formal language, natural language arguments cannot be studied \ndirectly. Instead, they need to be translated into formal language before their validity can be assessed.[20] \n\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense,*a logic*is \na logical formal system. Distinct logics differ from each other concerning the rules of inference they \naccept as valid and the formal languages used to express them.[21] Starting in the late 19th century, many", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Paraconsistent logics are logical systems that can deal with contradictions. They are formulated to avoid \nthe principle of explosion: for them, it is not the case that anything follows from a contradiction.[139] \nThey are often motivated by dialetheism, the view that contradictions are real or that reality itself is \ncontradictory. Graham Priest is an influential contemporary proponent of this position and similar views \nhave been ascribed to Georg Wilhelm Friedrich Hegel.[140] \n\n**Informal**\n\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like \ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some \nframeworks of informal logic have also been presented that try to provide a systematic characterization of \nthe correctness of arguments.[141] \n\nThe*pragmatic*or*dialogical approach*to informal logic sees arguments as speech acts and not merely as \na set of premises together with a conclusion.[142] As speech acts, they occur in a certain context, like a \ndialogue, which affects the standards of right and wrong arguments.[143] A prominent version by Douglas \nN. Walton understands a dialogue as a game between two players. The initial position of each player is \ncharacterized by the propositions to which they are committed and the conclusion they intend to prove. \nDialogues are games of persuasion: each player has the goal of convincing the opponent of their own \nconclusion.[144] This is achieved by making arguments: arguments are the moves of the game.[145] They \naffect to which propositions the players are committed. A winning move is a successful argument that \ntakes the opponent's commitments as premises and shows how one's own conclusion follows from them. \nThis is usually not possible straight away. For this reason, it is normally necessary to formulate a \nsequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's \nintended conclusion. Besides these positive arguments leading one closer to victory, there are also \nnegative arguments preventing the opponent's victory by denying their conclusion.[144] Whether an \nargument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other \nhand, are violations of the standards of proper argumentative rules.[146] These standards also depend on \nthe type of dialogue. For example, the standards governing the scientific discourse differ from the \nstandards in business negotiations.[147] \n\nThe*epistemic approach*to informal logic, on the other hand, focuses on the epistemic role of \narguments.[148] It is based on the idea that arguments aim to increase our knowledge. They achieve this \nby linking justified beliefs to beliefs that are not yet justified.[149] Correct arguments succeed at \nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their \nconclusion.[150] For example, the fallacy of begging the question is a*fallacy*because it fails to provide \nindependent justification for its conclusion, even though it is deductively valid.[151] In this sense, logical \nnormativity consists in epistemic success or rationality.[149] The Bayesian approach is one example of an \nepistemic approach.[152] Central to Bayesianism is not just whether the agent believes something but the \ndegree to which they believe it, the so-called*credence*. Degrees of belief are seen as subjective \nprobabilities in the believed proposition, i.e. how certain the agent is that the proposition is true.[153] On \nthis view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "burglar broke into the house last night, got hungry on the job, and had a midnight snack, would also \nexplain the state of the kitchen. But this conclusion is not justified because it is not the best or most likely \nexplanation.[82][83] \n\n**Fallacies**\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually \nreferred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw \nwith the reasoning leading to this conclusion.[84] So the argument \"it is sunny today; therefore spiders \nhave eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, \ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct.[85] \nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. \nThis explains why people tend to commit fallacies: because they have an alluring element that seduces \npeople into committing and accepting them.[86] However, this reference to appearances is controversial \nbecause it belongs to the field of psychology, not logic, and because appearances may be different for \ndifferent people.[87] \n\n\n\nYoung America's dilemma: Shall I be wise and great, or \nrich and powerful? (poster from 1901) This is an \nexample of a false dilemma: an informal fallacy using a \ndisjunctive premise that excludes viable alternatives. \n\nFallacies are usually divided into formal and \ninformal fallacies.[38] For formal fallacies, the \nsource of the error is found in the*form*of the \nargument. For example, denying the antecedent \nis one type of formal fallacy, as in \"if Othello is a \nbachelor, then he is male; Othello is not a \nbachelor; therefore Othello is not male\".[88] But \nmost fallacies fall into the category of informal \nfallacies, of which a great variety is discussed in \nthe academic literature. The source of their error \nis usually found in the*content*or the*context*of \nthe \nare \nsometimes categorized as fallacies of ambiguity, \nfallacies of presumption, or \nfallacies of \nthe \nrelevance. For \nambiguity and vagueness of natural language are \nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot \nbe dark\".[90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise.[91] \nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not \nrelevant to it.[92] \n\nargument.[89] Informal fallacies \n\n**Definitory and strategic rules**\n\nThe main focus of most logicians is to study the criteria according to which an argument is correct or \nincorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known \nas*rules of inference*.[93] They are definitory rules, which determine whether an inference is correct or \nwhich inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which \ninferential moves are necessary to reach a given conclusion based on a set of premises. This distinction \ndoes not just apply to logic but also to games. In chess, for example, the definitory rules dictate that \nbishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Bibliography**\n\nAloni, Maria; Dekker, Paul (7 July 2016).*The Cambridge Handbook of Formal Semantics*. \nCambridge University Press. pp. 22–23. ISBN 978-1-316-55273-5. \nAngell, Richard B. (1964).*Reasoning and Logic*. Ardent Media. p. 164. OCLC 375322 (http \ns://search.worldcat.org/oclc/375322). \nAudi, Robert (1999a). \"Informal logic\".*The Cambridge Dictionary of Philosophy*(https://philp \napers.org/rec/AUDTCD-2). Cambridge University Press. p. 435. ISBN 978-1-107-64379-6. \nArchived (https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD- \n2) from the original on 14 April 2021. Retrieved 29 December 2021. \nAudi, Robert (1999b). \"Philosophy of logic\".*The Cambridge Dictionary of Philosophy*(http \ns://philpapers.org/rec/AUDTCD-2). Cambridge University Press. pp. 679–681. ISBN 978-1- \n107-64379-6. Archived (https://web.archive.org/web/20210414132344/https://philpapers.org/ \nrec/AUDTCD-2) from the original on 14 April 2021. Retrieved 29 December 2021. \nBackmann, Marius (1 June 2019). \"Varieties of Justification—How (Not) to Solve the \nProblem of Induction\" (https://doi.org/10.1007%2Fs12136-018-0371-6).*Acta Analytica*.**34**\n(2): 235–255. doi:10.1007/s12136-018-0371-6 (https://doi.org/10.1007%2Fs12136-018-037 \n1-6). ISSN 1874-6349 (https://search.worldcat.org/issn/1874-6349). S2CID 125767384 (http \ns://api.semanticscholar.org/CorpusID:125767384). \nBagaria, Joan (2021). \"Set Theory\" (https://plato.stanford.edu/entries/set-theory/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 23 September 2022. \nBarnes, Jonathan (25 January 2007).*Truth, etc.: Six Lectures on Ancient Logic*. Clarendon \nPress. p. 274. ISBN 978-0-19-151574-3. \nBenthem, Johan van. \"Modal Logic: Contemporary View: 1. Modal Notions and Reasoning \nPatterns: a First Pass\" (https://iep.utm.edu/modal-lo/#H1).*Internet Encyclopedia of*\n*Philosophy*. Retrieved 11 March 2023. \nBerlemann, Lars; Mangold, Stefan (10 July 2009).*Cognitive Radio and Dynamic Spectrum*\n*Access*. John Wiley & Sons. p. 194. ISBN 978-0-470-75443-6. \nBerman, Harold J. (1 July 2009).*Law and Revolution, the Formation of the Western Legal*\n*Tradition*. Harvard University Press. ISBN 978-0-674-02085-6. \nBimbo, Katalin (2 April 2016).*J. Michael Dunn on Information Based Logics*. Springer. \npp. 8–9. ISBN 978-3-319-29300-4. \nBlackburn, Simon (1 January 2008). \"argument\".*The Oxford Dictionary of Philosophy*(http \ns://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194756/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095423356) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlackburn, Simon (24 March 2016). \"rule of inference\".*The Oxford Dictionary of Philosophy*\n(https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990). Oxford \nUniversity Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 \n8194809/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nBlair, J. Anthony; Johnson, Ralph H. (1987). \"The Current State of Informal Logic\" (https://ph \nilpapers.org/rec/BLATCS).*Informal Logic*.**9**(2): 147–51. doi:10.22329/il.v9i2.2671 (https://d \noi.org/10.22329%2Fil.v9i2.2671). Archived (https://web.archive.org/web/20211230194638/ht \ntps://philpapers.org/rec/BLATCS) from the original on 30 December 2021. Retrieved \n2 January 2022.", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Rautenberg, Wolfgang (1 July 2010).*A Concise Introduction to Mathematical Logic*. \nSpringer. p. 15. ISBN 978-1-4419-1221-3. \nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri \nes/logic-epistemic/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 11 March 2023. \nRestall, Greg; Standefer, Shawn (2023).*Logical Methods*. MIT Press. p. 91. ISBN 978-0- \n262-54484-9. \nRichardson, Alan W. (1998).*Carnap's Construction of the World: The Aufbau and the*\n*Emergence of Logical Empiricism*. Cambridge University Press. p. 15. ISBN 978-0-521- \n43008-1. \nRini, Adriane (13 December 2010).*Aristotle's Modal Proofs: Prior Analytics A8-22 in*\n*Predicate Logic*. Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5. \nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d \noi.org/10.22329%2Fil.v28i4.2856).*Informal Logic*.**28**(4): 335. doi:10.22329/il.v28i4.2856 (h \nttps://doi.org/10.22329%2Fil.v28i4.2856). \nRocci, Andrea (8 March 2017).*Modality in Argumentation: A Semantic Investigation of the*\n*Role of Modalities in the Structure of Arguments with an Application to Italian Modal*\n*Expressions*. Springer. p. 26. ISBN 978-94-024-1063-1. \nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\".*Philosophy*\n*Compass*.**10**(5): 301–309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 \n6). \nRunco, Mark A.; Pritzker, Steven R. (1999).*Encyclopedia of Creativity*. Academic Press. \np. 155. ISBN 978-0-12-227075-8. \nRush, Penelope (2014). \"Introduction\".*The Metaphysics of Logic*(https://philpapers.org/rec/ \nRUSTMO-4). Cambridge University Press. pp. 1–10. ISBN 978-1-107-03964-3. Archived (htt \nps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the \noriginal on 7 December 2021. Retrieved 8 January 2022. \nSadegh-Zadeh, Kazem (2015).*Handbook of Analytic Philosophy of Medicine*. Springer. \np. 983. ISBN 978-94-017-9579-1. \nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\".*Teorema: Revista*\n*Internacional de Filosofía*.**33**(2): 75–88. ISSN 0210-1602 (https://search.worldcat.org/issn/ \n0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609). \nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022).*Handbook of Logical Thought in India*. \nSpringer Nature. pp. 117–8. ISBN 978-81-322-2577-5. \nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic).*Encyclopædia*\n*Britannica*. Retrieved 23 September 2022. \nSchechter, Joshua. \"Epistemology of Logic – Bibliography\" (https://philpapers.org/browse/ep \nistemology-of-logic).*PhilPapers*. Retrieved 11 September 2022. \nSchlesinger, I. M.; Keren-Portnoy, Tamar; Parush, Tamar (1 January 2001).*The Structure of*\n*Arguments*. John Benjamins Publishing. p. 220. ISBN 978-90-272-2359-3. \nSchreiner, Wolfgang (2021).*Thinking Programs: Logical Modeling and Reasoning About*\n*Languages, Data, Computations, and Executions*. Springer Nature. p. 22. ISBN 978-3-030- \n80507-4. \nScott, John; Marshall, Gordon (2009). \"analytic induction\".*A Dictionary of Sociology*(https:// \nwww.oxfordreference.com/view/10.1093/oi/authority.20110803095410661). Oxford \nUniversity Press. ISBN 978-0-19-953300-8. Archived (https://web.archive.org/web/2022010 \n8173225/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095410661) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nShapiro, Stewart; Kouri Kissel, Teresa (2022). \"Classical Logic\" (https://plato.stanford.edu/e \nntries/logic-classical/#Sema).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Retrieved 19 July 2023.", + "page_start": 34, + "page_end": 34, + "source_file": "wikipedia1.pdf" + }, + { + "text": "new formal systems have been proposed. \nThere are disagreements about what makes a \nformal system a logic.[22] For example, it has \nbeen suggested that only logically complete \nsystems, like first-order logic, qualify as \nlogics. For such reasons, some theorists deny \nthat higher-order logics are logics in the strict \nsense.[23] \n\nFormal logic needs to translate natural language \narguments into a formal language, like first-order logic, to \nassess whether they are valid. In this example, the letter \n\"c\" represents Carmen while the letters \"M\" and \"T\" stand \nfor \"Mexican\" and \"teacher\". The symbol \"∧\" has the \nmeaning of \"and\". \n**Informal logic**\n\nWhen understood in a wide sense, logic \nencompasses both formal and informal logic.[24] Informal logic uses non-formal criteria and standards to \nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse.[25] Its \ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language \narguments.[26] In this regard, it considers problems that formal logic on its own is unable to address.[27] \nBoth provide criteria for assessing the correctness of arguments and distinguishing them from \nfallacies.[28] \n\nMany characterizations of informal logic have been suggested but there is no general agreement on its \nprecise definition.[29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the \nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal \nor natural language.[30] Formal logic can only examine them indirectly by translating them first into a \nformal language while informal logic investigates them in their original form.[31] On this view, the \nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is \n; (2) \nexamined by informal logic. But the formal translation \"(1) \n\" is studied by formal logic.[32] The study of natural language \narguments comes with various difficulties. For example, natural language expressions are often \nambiguous, vague, and context-dependent.[33] Another approach defines informal logic in a wide sense as \nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes \nquestions about the role of rationality, critical thinking, and the psychology of argumentation.[34] \n\n; (3) \n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
56. Magnus 2005, pp. 35 – 38.2. Truth tables ; Angel 1.584, p. 154, HaB & CrDomell 2000, p. 49 [ Mtps :// books. gaogle. com / books? 651e = P. MUS0C - 2bp. days - P. 449 ].57. Magnus 2005, pp. 35 – 45.3. Truth tables ; Angell 1964, p. 164.
58. Tarski 1994, p. 40.59. Hintikez029, lead section,< underline > SNature and varieties of logic Audi 1999b, Philosophy of logic.
60. Blackburn 2008, argument ; Stairs 2017, p. 343.61. Copi, Cohen & Rodych 2013, p. 30 ( Intps :// books. poope. com / books?/ dc - 30bADwAAOBAJ6.92 - 92 - 92 - 930 ).
62. Hintikka & Sandu 2006, p. 20 ; Backmann 2019, pp. 235 – 255 ; IEP Staff.63. Hintikka & Sandu 2006, p. 16 ; Backmann 2013, pp. 235 – 255, IEP Staff.
64. Groarke 2021.1. 1 Formal and Informal Logic ; Weddle 2011, pp. 383 – 8.36. Informal logic and the eductive - inductive distinction ; van Eermeren iii Grarssen 2009, p. 191.65. Evance 2005.8. Deductive Reasoning, p. 159 [ https :// books google. com / books? itb < underline > https :// dnks crtbkHsaC @ QeMCAsp < underline > PALIS9
66. McKeon.67. Hintikka & Sandu 2006, pp. 13 – 4.
60. Hintikka & Sandu 2006, pp. 13 – 4 ; Blackburn 2016, rule of inference.69. Blackburn 2016, rule of inference.
70. Dick & Muller 2017, p. 157.71. Hintikia & Sandu Z006, p. 13 ; Backmann 2013 ; pp. 235 – 255 ; Douven 2021.
72. Hintikka & Sandu 2006, p. 14 ; DAgostino & Floridi 2009, pp. 271 – 315.73. Hintike 8. Satisticiz006, p. 14 ; Saquillo 2014, pp. 75 – 80 ; Hintikka 1370, pp. 135 – 152.
74. Hintike & Sandu 2006, pp. 13 – 6 ; Backmann 2013, pp. 235 – 255, IEP Staff.75. Rocci 2017, p. 26 ; Hintikka & Sandu 2006, pp. 13.16 ; Douven 2021.
76. IEP Staff ; Douven 2021 ; Hawthorne 2021.77.1EP Staff ; Hawthorne 2021 ; Wilbanks 2010, pp. 107 – 124.
78. Douven 2021.79. Groarke 2021.4. 1 AV Criteria ; Possin 2015, pp. 563 – 593.
B0. Scott & Marshall 2009, arashytic induction ; Houde & Camacho 2003, Induction.81. Borchert 2006b, Induction.
R2. Douven 2012 ; Koolowslii 2017 ; Abductive researching and explanation ( https :// www. tag / other cis. comfocoled / 212.424 / 3783.115725677 - 35 / abductive - treacming - explanation - bartae - kod ( 969 )83. Cummings 2010, Abduction, p. 1.
84. Hansen 2020 ; Chatfield 2017, p. 194.85 Walton 1997, pp. 7.1. A new model of argument ; Hansen 2020.
86. Hansen 2020.87. Hansen 2020 ; Walton 1987, pp. 63.3. Logic of propositions.
88. Sternberg ; Stone 2012, pp. 327 – 356.89. Walton 15957, pp. 2 – 4.1. A new model of argument, Dowden ; Hansen 2020.
90. Engel 1.982, pp. 50 – 92.2. The medium of language : Mackle 1967 ; Stump.91. Stump ; Engel 1.982, pp. 143 – 212.4. Fallacies of presumption.
92. Stump : Mackie 1967.93. Hintikka & Sandu 2006, p. 20.
94. Hintikka & Sandu 2006, p. 20 ; Pedemonte 2018, pp. 1 – 17 ; Hintikka 2023.
", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "What was the mean correctness score for LLM-generated handoff notes ?", + "target_page": 7, + "target_passage": "Correctness 4.52", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. \n\n**Models**\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred \nto as LLM 1)43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter \nreferred to as LLM 2) 7B44 for abstractive summarization. Further information about the models and \ntechnology specifications is provided in detail in eAppendix 1 in Supplement 1. \n\n**Data Processing**\nAs LLM 2 only has a context size of 4096 tokens,44 we used 2 steps to process the EM notes to both \nshorten the input size while maintaining content salience. First, we adopted a number of heuristic \n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) \n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1–based saliency \n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP \n\nhandoff notes. \n\n**Model Training and Inference**\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We \n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional \n\ninformation about the model training and inference process is provided in eAppendix 1 in \n\nSupplement 1. \n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of \n\nheuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "unique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested \n\n\n \n \n \n \n [html]βaULM ‐ generatedPhysician - writtenMean score ( SD )Likert rating 1 - 5, No. (%) aMean score ( SD )Likert rating 1 - 5, No. (%) a\n
123AS12345
Completeness4.00 ( 0.88 )012 ( 8 )31 ( 20.7 )69 ( 46 )38 ( 25.3 )4.16 ( 0.84 )03 ( 2 )31 ( 20.7 )48 ( 32 )68 ( 45.3 )
Curation4.24 ( 0.58 )01 ( 0.7 )13 ( 8.7 )85 ( 56.7 )51 ( 34 )4.76 ( 0.48 )006 ( 4 )39 ( 26 )105 ( 70 )
Readability4.00 ( 0.64 )08 ( 5.3 )17 ( 11.3 )87 ( 58 )38 ( 25.3 )4.64 ( 0.49 )005 ( 3.3 )38 ( 25.3 )107 ( 71.3 )
Correctness4.52 ( 0.64 )0013 ( 8.7 )39 ( 26 )98 ( 65.3 )4.90 ( 0.39 )002 ( 1.3 )12 ( 8 )136 ( 90.7 )
Usefulness4.04 ( 0.86 )012 ( 8 )30 ( 20 )59 ( 39.3 )49 ( 32.7 )4.36 ( 0.71 )05 ( 3.3 )13 ( 8.7 )53 ( 35.3 )79 ( 52.7 )
", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Original Investigation | Emergency Medicine**\nDeveloping and Evaluating Large Language Model–Generated Emergency Medicine \nHandoff Notes \n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA; \nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS \n\n**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n\n \n \n \n \n [html]( EM )- to - inpatient ( IP ) handoff notes that scale for EM care )Eindinasteria, buthin cohort ribioficients, but therapy, but therapy, but therapy, peripherapy, peripherapy, peripherapy, peripheral, peripheral, peripherapy, peripherapy, peripheral, peripheral, peripheral, peripheral, pEM patient medical records using a novel scaling fromounicals, etc.LLM - generated EM - to - IP handoff notes had a mean usefulness of 4.04 out of 5 ( compared with 4.35 forobvoirian - written ) andameannatientsafety of 4.06 out of 5 ( compared with4.50 for physician - written ) with no rritical natient safety risksMeaning These findings suggest thevalue of a manual, patient safety -focused clinical evaluation of LLMmodels and the potential ofLLM - generated handoff notes to create a new standard of care in EM.\n
Question Can a large language model ( 11 M ) Renerate emergency medicine
\n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a \n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the \n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician- \n\nwritten note (unmitigated). \n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the \n\nframework and evaluated 10 separate cases from the test dataset that were not included in the \n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to \n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was \n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for \n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software \n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity \n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 \nrepresents no agreement.52 Data were analyzed from October 2023 to March 2024. \n\n**Results**\n\n**Automated Tasks**\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In**Table 2**, \n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and \n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we \n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that \n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456, \n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician \n\nsummaries. \n\n**Clinical Evaluation Tasks**\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are \n\nshown in**Table 3**and**Table 4**. The mean clinical quality scores of the automated summaries are in a \n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries \n\nwere observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**43**. Liu Y, Ott M, Goyal N, et al. Roberta: a robustly optimized bert pretraining approach. arXiv. Preprint posted \nonline July 26, 2019. doi:10.48550/arXiv.1907.11692 \n\n\n \n \n \n \n [html]\n
45. World Health Organization Conceptual flamework for the international dasofication for patient safety version 1. finahechnical report January 2009.2009, Acressel Ortather 20.2024, Inttps ( Nwarwarks intiguotilatilational Un
45. Un CY. Rouge a peckage for automatic evaluation of summaries. 2004. Accessed October 23.2024. Intons / Jieclanthexlagy. org / W ( 24 – 50 / 3 )
47. Zhing T, Kishore V, Wu F. Weinberger KO, Artz Y. Berbscore. Evaluating test generation with bert. orilix. Pregnint proteel onfine February 24.2020. dbk30.48550.0x / 0904.09675
48. Lettimer BM, Chen 0 : Zhung X, Yang Y. Fast and accurate factual inconsistency detection over long documents. Presented at Conference on Empirical Methods in Natural Language Processing, December 6 – 90.2023. Singlapone.
49. Schayer V, Miler L, Kudilowith : D, et al. Development of a clinical researching documentation assessment tool for resident and hellow admission notes a shared mental model for feedback. J Gen intern Ment 2022.3703 : 507 - 502, dok 000,
SO : Zareoly J. Kin Jilliaharoun S. et al. Generative artifical intelligence to transform inpatient discharge summaries to patient friendly language and format. JAMA fertix Qorn. 2024.7 ( 3x - 240357 dsk / 030 ) jananetworksper, 2004.00
SI. Chouthury A. Choudhry Z. Large language motiels and user trust. comequence of self - referential learning brap and the deskilling of health care professionals. JMetintener Res. 2024.26 - e55764. dails / 32396 / 55764
S2. Govs Ni, Bell JS, Chen TF, Intersiter agreement and interrater reliability : leg concepts, approaches, and applications. Res Social Adm Phonn 2003 ; 92 ( 30 - 338, del301016 ); sapharm 2012 ; 04 : 004
S2. Baster Si, Longhurs CA, Millen M, Sitapati AM, Tai Seale M. Generative artificial intelligence responses to patient messages in the electronic health necord early lessoms learned. JAMA Dpen 2024, PQ2 - scae028, dox303.0050.0pmisa
54. Goodman KS, PaulHY, Morgan DLLLM generated dinical summaries require more than accuracy, JAMA. 2024.339 ( 8 )- ESF - 638. del10.000 ( Jama 2024.0555
SS. Achiam J. Adler 5, Agarwal 5, et al. Gpt 4 technical report. orliki Preprint posted online March 4.2024 dail 0.4855 ( Jantiva 2303.08774.
56. Chung HRI, Hou L, Longzre 5, et al. Scaling instruction - finetuned languagemodels. Misch Lesm Res. 2024.25 ( 70 ): A53.
StallmL : Delirit 1 : oligemdix 1. Technology Specifications, Model Training, and Inference el. gommitie 2. Automated Method of SCALE children. Definitions Prom the Clinical Assessment efficienc 2. Worship 2. Worship 2. Worship 2. Won
", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed8.pdf" + }, + { + "text": "EM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Evaluation**\nIt is critical to ensure that AI systems are safe, ethical, and without bias in the clinical domain. For the \n\nproposed approach, we performed comprehensive automatic evaluations and a novel, rigorous, \n\npatient safety-focused clinical evaluation. The unique clinical evaluation framework was designed to \n\n(1) screen for and identify the common, specific correctness issues in LLMs observed in longform \n\nclinical summarization and (2) assess the potential patient safety implications associated with any \n\nincorrectness identified using a modified version of the World Health Organization’s International \nClassification for Patient Safety.45 \n\n**Automated Evaluations**\nWe used the summarization evaluation metrics of recall-oriented understudy for gisting evaluation \n(ROUGE),46 bidirectional encoder representations from transformers score (BERTScore),47 and \nsource chunking approach for large-scale inconsistency evaluation (SCALE).48 ROUGE computes the \noverlap of n-grams between the generated and reference summaries. For longform document \n\nsummarization, the following ROUGE scores are considered to be close to the reference summaries: \nROUGE-1, above 0.4; ROUGE-2, above 0.2; and ROUGE-L, above 0.3.46 BERTScore leverages the \npretrained contextual embeddings from BERT and matches words to compute a similarity score for \neach token in the candidate sentence with each token in the reference sentence. We used SCALE,48 a \nnatural language inference–based approach, to measure the faithfulness between the source \n\ndocument and the generated text. Further background is provided about SCALE in eAppendix 2 in \n\nSupplement 1. \n\n**Statistical Analysis**\nBased on prior work, 3 board certified EM physician leaders (M.M., A.F., and P.S.) with experience in \n\nformal quality and patient safety review processes performed retrospective reviews of ED-based \nEHR records of 50 individual ED patient encounters, randomly selected from the test dataset.49 \nBased on prior published clinical evaluations of LLM, as well as the study feasibility of using EM \nphysician quality and patient safety leaders, 50 ED patient encounters were evaluated.50 Reviewers \n\nFigure. Data Flow of Generating Emergency Department (ED) Handoff Summary \n\nHPI \nExtract recent HPI \nEHR data \n\nRegex \nprocessing Regex \nprocessing \nTransition of \ncare notes Consult \nnotes \nCourse of treatment \n\nProgress \nnotes Procedure \nnotes \nSalience selection \n\nLLM 1 \ntransformer \n\nLLM 2 \ntransformer \nRemove duplicates \n\nRegex \nprocessing \n\nRadiology \nresults \nLabs \n\nGet most salient medications and \nlaboratory tests, vitals, consults, and \nimages with pattern-matching rules \n\nRegex \nprocessing \n\nAutomated summary \nHPI: \nPatient is a 64-year-old male with history of alcoholic hepatitis sent in \nfrom urgent care for hypotension in setting of N/V/D 3 days ago, also \nwith fall outside of ED \nEvents: \n• Presented to the ED on January 6, 1972, for hypotension in setting of \nN/V/D 4 days \n\n• On January 7, 1972, patient is to be admitted to medicine SDU \nPlans: \nLaboratory tests: CBC, CMP, trop, cultures, VBG, imaging: CTH. Aggressive \nIVF, monitor. \nDisposition: \nAdmit to medicine-general, intermediate care (stepdown), for dizziness \nMedications: \n• Calcium gluconate-NaCl 2-0.67 GM/100ML-% IV solution 2g \n• Octreotide acetate 100 mcg/mL solution (wrapper): 50mcg \nLabs: \nCBC: Hgb: 4.9 panic (!), Hct: 17.2 panic (!), WBC: 14.13 high (!), platelet: \n174 \nVitals: \n• HR: 105, BP: 94/62, RR: 18, SPO2: 100, temp 97.9F \nConsults: \n• IP consult to gastroenterology", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. \n\n**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", + "target_page": 1, + "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. \n\nRather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nWe ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed11.pdf" + }, + { + "text": "The SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with \nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a \nrange of outcomes for future climate change, including high and low climate sensitivity, different \nbiases in baseline precipitation climatology, and different global patterns of precipitation change. \nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global \nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global \nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected, \nwhich means that the results here may be sensitive to systematic errors arising from biases in the \npresent-day SST patterns. \n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5 \nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol \nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse \ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk \n\n\n\nChanges in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 \n\nextremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "In the present study, processing errors in the input data for one ensemble member, the \nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the \nHCVI are, therefore, not presented here. \n\n**7**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n\n(d) Freshwater resources: run-off \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. \n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming \n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed \nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there \nwere some differences in how these data were applied, with different approaches to the treatment \nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered \nimportant to assess changes in the raw climate model output, because this directly represents \nthe behaviour of the model itself. The main focus was on the changes relative to the present- \nday baseline climate, defined as 1981–2010, with absolute values in either the baseline or the \nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off \nanalyses, however, it was considered important to correct for systematic biases in the climate \nmodel output, because these can lead to unrealistic representations of the key quantities in the \npresent-day simulation [35]. A bias-correction methodology was, therefore, applied for these two \nparts of the analysis, whereby the model output was adjusted to make it consistent with an \nobserved climatology [36]. We used a multi-segment statistical bias-correction methodology for \nprecipitation [37], and a modification of this for other variables [37].", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**9**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n –2 –1 0 1 \n2 \n°C \n3 4 5 6 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 2.**Simulated changes in annual daily maximum temperature relative to 1981–2010 at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 4.**Time of reaching GWLs of 1.5°C and 2°C in each bias-corrected output from the HadGEM3 climate simulations, driven \nby different sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data \nis applied to the HCVI calculation and JULES simulations. \n\n\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20242035
GFDL - ESM2M20362051
HadGEM2 - ES20192033
IPSL - CM5A - MR20232036
MIROC - ESM - CHEM20202032
ACCESS1 - 020262040
\n\nland surface sees an increase in annual daily maximum temperature which is similar to the global \nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially \nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By \ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases \nin annual daily maximum temperature larger than the global mean warming. Much of the mid- \nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more \nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the \nMIROC and ACCESS models. \n\nThe percentage of days exceeding the 90th percentile of daily maximum temperature increase \nmore in tropical areas (figure 3). Some areas show over 60% of days above this level at 2°C global \nwarming compared with present day, whereas in the mid-latitudes between 20% and 30% of days \nexceed this level. The global mean is between 20% and 30% in all ensemble members (table 3).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", + "target_page": 2, + "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20152030
GFDL - ESM2M20402055
HadGEM2 - ES20272039
IPSL - CM5A - MR20202034
MIR0C - ESM - CHEM20232035
ACCESS1 – 020342046
\n\n**Table 3.**Time of reaching GWLs of 1.5°C and 2°C in the raw output from the HadGEM3 climate simulations, driven by different \nsets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied \nto the calculation of the ClimPACT indices. \n\n**8**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nup to present-day plus model-projected warming thereafter (table 4). While this does lead to \ninconsistent definitions of dates of the GWLs for applications of the climate model output with \nand without bias correction, the focus here is on the level of warming relative to pre-industrial \nrather than the timing of this warming. Therefore, priority is given to an accurate quantification \nof GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming \nlevels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on \nthe model and warming level. This inconsistency would have consequences if these results were \napplied to time-dependent impacts and adaptation assessments, but that is not the case here so \nthis concern does not apply. However, one issue is that the time-dependent nature of the aerosol \nforcing means that the spatial pattern of regional climate responses varies over time, so this will \nlead to some degree of inconsistency between the analysis of the ClimPACT extremes and the \nHCVI and JULES impacts projections. \n\n3. Results \n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the \nlevel of agreement between models for a particular projected change, and hence an indication \nof potential robustness of the projected changes for informing adaptation. We then make a \ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would \nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in \nregional climate outcomes, we address this in a number of ways. For individual realizations, we \ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C, \neven if the sign of the change is uncertain. We also compare the range of outcomes at different \nGWLs, to see if the regional-scale uncertainty itself increases with global warming. \n\n(a) Climate-change impacts at 2°C global warming", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "[html][ 6 ]David Anthoff, Robert [ Nicholls, and Richanl S ] Tol. 2010. The economic of nubstantial sea - level rise. Mitigation and Adaptation Strutegies for Change 15.4 ( 2010 ), X21 – 335.[ 7 ]Mikhail J Ataliah, Victor Raskin, Christian F Hompelmann, Mercan Ka Radh Sion, Unuti Topkeara, and Katrina E Tricozomborg, 2002. Natural Lan Waternualizing and Tamperpreveling In International Werkshop on Informational Springiong[ 8 ]Alexoi Barvoki and Abdeleahman Mobamed. 2020. Effectiveness Supervised Pre - Training for ASB. In ICASSP 2020 - 2020 EEE Interni Conference on Acoustics, Sjeech and Signal Processing ( EASSP ). T694 – 76[ 9 ]Michael Barera. 2013. Mind the Gap. Addressing Stroctural Equity and h on W & ipedia. ( 2000 ). Accessible at http :// bdl. hondle net / 10106 / 29572.[ 10 ]Russel Barsh. 1990. Indigenous peoples, racism and the environment. M49.4 ( 1990 ), 723.[ 11 ]Christine Basta, Marta R Coste - Junsi, and Noe Cosses 2019. Evaluatin Underlying Grade Bias in Contextualized Word Enheddings In Proceedle the Pirst Workshop on Gender Bias in National Langaage Processing. 33 – 39.[ 12 ]It Behaps : Knee - Lo, and Amount Cohan 2010 ScBRT : A Pertrained Lut Model for Scientific Test In Precesdings of the 2019 Conference on Depirus on in Skinaria Language Precessing and the W6 betreational Joint Onlineal Language Precessingu[ 13 ]Emily M. Bender and Batya Friednun. 2018. Data statements for notugue processing. Toward mitigating system bias and enabling better s Trensactions of the Asseciation for Comparational Longuintion 6 ( 2018 ). SK[ 14 ]Emily M, Bensler and Alexander Koller, 2000. Climbing towards NI, Nissaning From, and Understanding in the Age of Data In Processing of 6 Amaal Monitoring of the Associature for Computational Limpasition. Assess for Computational Lina[ 15 ]Buha Benjumin. 2019. Race After Technology : Alvelitionist Tusls for the Ni Code. Polity Preos, Cambridge, UK.[ 16 ]Elettra Bistti and Renana Vatanpurast. 20120. Data Waste. Harvard Intern Leve Jeurnal 61 ( 2020 ).[ 17 ]Steven Bird 2016. Social Mobile Technologies for Recommecting Indig and Immigrant Communities. In Fospic Polecy / Plue : Somiur Northere In Charles Diavexin University. Duren, Australia. Inttps :// www. chs ols. ofasalt / filles / the -[ 18 ]Absthu Birhane and Vimay Uday Prabbus 2021. Large Image Datasets A F Win for Computer Vasion? In Procedings of the EEE / CVF Winter Confers Applications of Compater Vision : 1537 – 1547.[ 19 ]So Lin Biologytt, Solon Burocae, Edia Dumani III, and Hamas Walkeh, 2010 gsage ( Technology ) is Power : A Critical Survey of “ Bus ” in NUb. In pus of the WH Amound Meeting of the Association bye Computational Litex. Anocation for Congustativ[ 20 ]Thoroten Brants, Askek C. Poput, Trug Xis, Trans J Och, and Jeffivy 2007, Lungs Language Models in Machine Translation, Is Provenlings : 267, Joint Cardiomes on Empirisal Ibitsks in Natural Langage Process Competentional Natural Lengu[ 21 ]Ronan Le Bras, Swabba Swayandipta, Chandra Bhagavatula, Rowan Z Marthew E Peren, Ashis Subhanwal, and Yeipin Cheit, 2000 Adversontal of Dataset Buses. In Preceoling of the 378 bremational Conjierence on M Learning[ 22 ]Locker Restfollex Ensiblex Duested baggens, and Volus Toorkers 2019. INXcroaggensions in the Strikl A Case for Lecating Enstor Phenomena in Media Proxter, In Presendings of the 2010 Cophromo or Depiriod Howboh and Language Presence St[ 23 ]Susun E Bremnan and Herbert H Clark 1996. Conceptual pacts and lexical in", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed11.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**9**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n –2 –1 0 1 \n2 \n°C \n3 4 5 6 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 2.**Simulated changes in annual daily maximum temperature relative to 1981–2010 at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 4.**Time of reaching GWLs of 1.5°C and 2°C in each bias-corrected output from the HadGEM3 climate simulations, driven \nby different sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data \nis applied to the HCVI calculation and JULES simulations. \n\n\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20242035
GFDL - ESM2M20362051
HadGEM2 - ES20192033
IPSL - CM5A - MR20232036
MIROC - ESM - CHEM20202032
ACCESS1 - 020262040
\n\nland surface sees an increase in annual daily maximum temperature which is similar to the global \nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially \nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By \ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases \nin annual daily maximum temperature larger than the global mean warming. Much of the mid- \nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more \nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the \nMIROC and ACCESS models. \n\nThe percentage of days exceeding the 90th percentile of daily maximum temperature increase \nmore in tropical areas (figure 3). Some areas show over 60% of days above this level at 2°C global \nwarming compared with present day, whereas in the mid-latitudes between 20% and 30% of days \nexceed this level. The global mean is between 20% and 30% in all ensemble members (table 3).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
ModelResearch instituteCountryHorizontal resolution
GFDL - ESM2MGeophysical Fluid Dynamics LaboratoryThe United States144 × 90
HadGEM2 - ESHodley Center for Climate Prediction and ResearchThe United Kingdom192 × 145
IPSL - CM5A - LR1. Institute Pierre - Simon LaplaceFrance96 × 96
NorESM1 - MNorway Climate CenterNorway144 × 96
MIROC - ESMCenter for Clinate System Research, National Institute for Environmental Studies and Prontier Research Center for Global ChangeJapan128 × 64
\n\n\n\n**Figure 1.**Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs \nunder 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black \nvertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models \nand scenarios. \n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. \n\n**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk \n\n\n\nChanges in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 \n\nextremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", + "target_page": 4, + "target_passage": "1981-2080", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n\n\n\n\nWhat is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. \n\nWhat improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. \n\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. \n\n**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed.", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "FIG. 2: Crab light curve. Horizontal scale is in modified \nJulian days over the 490 day GBM exposure period. Ver- \ntical scale is in photons/cm2/sec/keV averaged over daily \nintervals. Horizontal lines show the average flux in each of \nfive energy bands increasing from top to bottom \n\nThe shape of the individual occultation steps de- \npends on energy and occultation angle. Transmis- \nsion as a function of time is modeled as T (t) = \nexp[−µ(E)A(h)], where µ(E) is the mass attenuation \ncoefficient of gamma rays at energy E in air and A(h) \nis the air mass along the line of sight at a given alti- \ntude h(t). Account is taken of the detector response \nas it changes as a function of angle across the fit win- \ndow. For each source, occultation times are predicted. \nEach step is fit over a 4-minute window along with a \nquadratic background and using an assumed spectrum \nto determine the detector count rate due to the source. \nThe instrument response is used to convert the count \nrate to a flux. Up to 31 steps are possible for a given \nsource in a day, and these steps are summed to get a \nsingle daily average flux. The GBM occultation sensi- \ntivity exceeds that of BATSE at energies below ∼ 25 \nkeV and above ∼ 1.5 MeV [5]. \n\neral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. \n\nIII. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. \n\nRather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nWe ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045)", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed11.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "SURFACE TUFT PHOTOGRAHS FOR \nA SWEPT, TAPERED WlNG \n60° DELTA, AR=2.31, A=0 \n\n\n\n\n\n\n\n\n\na = 0 DEGEES \n\n\n\n\n\n\n\n\n\n\n\n/STALL \n\n d \n. \n\na =32 DEGREES \n\nFROM NACA TN 2674", + "page_start": 102, + "page_end": 102, + "source_file": "00-80T-80.pdf" + }, + { + "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "How many articles compose the Syntec French collective bargaining agreement ?", + "target_page": 2, + "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\n \n \n \n \n [html]\n
DatasetSyntecHALSummEvalFr
Samples100 queries 90 documents26233 samples 10 classes100 texts1100 human summaries1600 machine summaries
Creation processScraping of Syntec collective bargaining agreement with articles as documents. Writing queries corresponding to articles.Scraping of HAL articles with id. title and domain. Further cleaning with deduplication, language filtering and class subsampling.Translation from English to French with Deepl of the SummEval dataset.
Annotation process4 annotators divided into 2 groups. Each group was given half of the articles and asked to choose an article and ask a question about it. Each annotator wrote 25 questions.Annotations provided by authors when submitting their paper. They choose the domain between existing academic fields.Detailed annotation process provided in Fabbri et al. ( 2021 ).
Quality checksHuman verification of annotations.Baseline models for classification and topic modeling.CorrelationBLEUse of scores of the French and the original English datasets. LLM as - a - judge translationrating and human verification.
\n\nlyMail dataset. Each article has 11 human-written \nsummaries and 16 machine-generated summaries \nannotated by 8 people with a score for coherence, \nconsistency, fluency, and relevance. We trans- \nlated it from English to French using DeepL API6. \nSince MTEB evaluation is based on the embedding \nsimilarity between machine-generated and human- \ngenerated summaries, we propose to compute the \nROUGE (Lin, 2004) and BLEU (Papineni et al., \n2002) metrics between machine and human sum- \nmaries for both French and English version. In Ta- \nble 2, we report the average of the scores as well as \ntheir correlations between the two languages. The \ncorrelation is high (above 0.7), showing that the \nword and n-gram overlap between human and ma- \nchine summaries is highly preserved in the French \nversion. One may argue that computing the met- \nric on fully translated texts (human and machine \nsummaries are both translated from English) may \nintroduce biases and not assess the quality of the \ntranslations. For this purpose, we ensure the French \nhuman summaries are correctly translated from En- \nglish. We use an LLM as-a-judge (Zheng et al., \n\n• Samples belonging to domain classes with \nless than 500 samples were removed, which \nleads us to keep only 10 classes. \n\n• Subsampling was performed on 2 classes con- \ntaining more than 10k samples each to lower \nthe number of samples and mitigate the unbal- \nance of the dataset. \n\nMore details about this process are provided in the \nappendix A.2 along with some extracts in Figure \n6. We make the dataset publicly available in both \ntheir raw and clean versions. We use this dataset in \na clustering setup to cluster publications by their \ntitle and use the domain as ground truth. To ensure \nthe quality of this dataset, we run 3 baseline mod- \nels for classification: TF-IDF + SVM, a fine-tuned \nCamembert (Martin et al., 2019) and GPT-4 lever- \naging In-Context Learning (ICL). Furthermore, we \nrun one baseline model for topic modeling: Latent \nDirichlet Allocation (LDA) (Blei et al., 2003) and \nreport scores in the appendix A.2. \n\n3.1.3 SummEvalFr (Summarization) \nThe original SummEval dataset (Fabbri et al., 2021) \nconsists of 100 news articles from the CNN/Dai-", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Document \n\nid \nurl \n\narticle-14 \nhttps://www.syntec.fr/convention- \ncollective/resiliation-du-contrat- \nde-travail/#article-14 \nArticle 14 : Préavis pendant la péri- \node d’essai \n\nsection Résiliation du contrat de travail \ncontent Modification Avenant n° 7 du \n5/07/1991 Au cours de cette péri- \node, les deux parties peuvent se sé- \nparer avec un préavis d’une journée \nde travail pendant le premier mois. \nAprès le premier mois, le temps \nde préavis réciproque sera d’une \nsemaine par mois complet passé \ndans l’entreprise. Après le pre- \nmier mois, le temps de préavis ré- \nciproque sera d’une semaine par \nmois passé dans l’entreprise. Le \npréavis donne droit au salarié de \ns’absenter pour la recherche d’un \nemploi dans les conditions fixées à \nl’article 16. Le salarié sera payé au \nprorata du temps passé pendant la \npériode d’essai. \nQuery \n\narticle \narticle-14 \nquestion Quel est \nd’essai ? \n\n\"\"\" \nYou will be given a couple of texts in \nEnglish and their translation in French. \n\nYour task is to provide a 'rating' score on \nhow well the system translated the \nEnglish text into French. \n\nGive your answer as a float on a scale of 0 \n\nto 10, where 0 means that the \nsystem_translation is bad and does not \nrepresent what is being said in the \noriginal English text, and 10 means that \nthe translation is good and represents \n\nle préavis en période \n\nthe original English text. \n\nNo need to mind the quality of the text as \noriginal English text may be of bad \nquality. \n\n\n \n \n \n \n [html]\n
hal_idDomainTitle
hal - 02899209shsLa transformation digitale du management des ressources humaines et de ses enjeux pourentreprises
tel - 03993881mathSur l ’ approximation numerique quelques problemes en mecanique des fluides
\n\nProvide your feedback as follows: \n\nFeedback::: \nTotal rating: (your rating, as a float \nbetween 0 and 10) \n\nNow here are the English and French texts. \n\nOriginal text in English: {english_text} \nTranslation in French: {french_translation} \n\nFeedback::: \nTotal rating: \n\"\"\" \n\nFigure 8: Prompt used for LLM as-judge evaluation of \nSummEval dataset translation. \nFigure 6: Extracts of HAL dataset.", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "\n \n \n \n \n [html]ContentsList of figuresList of tablesForeword by Nicolas Schmit, European Commissioner for Jobs and Social RightsAcknowledgements12Status of working conditionsPsychosocial risks at workWorking time in hours and at atypical timesWork intensityPhysical health risks at workContract types and work locationsMobile work, home as workplace and domestic workWorker groups with specific risks and needsConclusionsTrends in outcomes – safety, health and wellbeingTrends in safety outcomes – work accidentsNon - fatal work accidentsSerious non - fatal and fatal work accidentsTrends in health outcomesStatistical picture of mortality and morbidityAttributable fractions, risk pairs and burden of diseaseExamples of specific prevalence estimatesWellbeing and health statusSatisfaction at workHealth affected – overall opinionReported health problemsWorking life perspective – healthSummary of survey results on wellbeing and health statusConclusionsMajor context developments and their influence on working conditionsChanges from industrial to service sectorsTechnological developments – influence on OSH.Workforce structureGlobalisation and OSHOSH legislation and OSH infrastructure in the EUFoundation, legislation, compliance and supervisionEU and national OSH strategiesAgency for Safety and Health at Work – EU - OSHA\n
5
7
8
9
Executive summary10
Setting the scene20
323
3.124
3.1. 129
3.1. 233
3.238
3.345
3.449
3.554
3.659
461
4.161
4.1. 164
4.1. 271
4.273
4.2. 177
4.2. 281
4.2. 386
4.389
4.3. 189
4.3. 291
4.3. 392
4.3. 496
4.3. 598
4.499
5101
5.1101
5.2103
5.3109
5.4114
6118
6.1118
6.2124
Europ3
", + "page_start": 2, + "page_end": 2, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Federation) \nSME \nhttps://www.smeunited.eu/policies/policies/employment/health-safety , EFBWW European Federation of \nBuilding and Woodworkers (Trade Union), https://efbww.eu/activities/occupational-health-and-safety \n400 OSHWiki: Section ‘OSH System at national level’, descriptions of the social dialogue in each EU Member State \n\n Two of \n\nhttps://oshwiki.eu/wiki/Category:OSH_systems_at_national_level \n\n401 DG Employment: Website on ‘Social Dialogue’, https://ec.europa.eu/social/main.jsp?catId=329&langId=en \n402 \n Eurofound ‘Database of wages, working time and collective disputes’, see: \n\nhttps://www.eurofound.europa.eu/data/database-of-wages-working-time-and-collective-disputes \n403 E.g.: Prevent (Sweden), DGUV (Germany) AUVA (Austria), see for all EU Member Stress the OSHWiki article \non ‘OSH-systems at national level’ https://oshwiki.eu/wiki/Category:OSH_systems_at_national_level \n404 European Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and \nhealth regulations: an overarching review - Executive summary, https://osha.europa.eu/en/publications/summary- \nimproving-compliance-occupational-safety-and-health-regulations-overarching \nEuropean Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and health \nregulations: an overarching review, Literature review; Chapter 3: Societal norms, social reporting, corporate social \nresponsibility and support for securing compliance, https://osha.europa.eu/en/publications/literature-review- \nimproving-compliance-occupational-safety-and-health-regulations-0 \nPodgorski, D., 2015: Measuring operational performance of OSH management systems – A demonstration of \nAHP-based selection of leading key performance indicators, in Safety Science, Vol. 73, March 2015, p146-166, \nhttps://doi.org/10.1016/j.ssci.2014.11.018", + "page_start": 155, + "page_end": 155, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "71. \"Statistiques locales - Métropole de Lyon : Intercommunalité-Métropole - Population municipale (historique \n\ndepuis 1876)\" (https://statistiques-locales.insee.fr/#c=indicator&i=pop_depuis_1876.pop&s=2021&selcodgeo= \n200046977&t=A01&view=map4). INSEE. Retrieved 12 July 2024. \n\n72. \"IMG1B - Population immigrée par sexe, âge et pays de naissance en 2020 − Recensement de la population \n\n– Résultats pour toutes les communes, départements, régions, intercommunalités... −Étrangers - Immigrés en \n2020 | Insee\" (https://www.insee.fr/fr/statistiques/7633127?sommaire=7633727&geo=COM-69123).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia4.pdf" + }, + { + "text": "77. \"Eurolines - Lyon Tourist Office\" (https://en.visiterlyon.com/stay/access-come-and-move-in-lyon/transport-and- \ntransfers/eurolines).*en.visiterlyon.com*. Retrieved 28 January 2024. \n\n78. \"Le réseau TCL | TCL\" (https://www.tcl.fr/a-propos-de-tcl/le-reseau-tcl).*www.tcl.fr*. Retrieved 28 January 2024. \n79. \"Plan interactif - Carte de Lyon et ses environs | TCL\" (https://www.tcl.fr/se-deplacer/plan-interactif). \n*www.tcl.fr*. Retrieved 28 January 2024. \n\n80. \"Discover the service | Rhônexpress\" (https://www.rhonexpress.fr/en_GB/discover-the-service). \n*www.rhonexpress.fr*. Retrieved 28 January 2024. \n\n81. \"RhônExpress\" (https://www.railway-technology.com/projects/rhonexpress/).*Railway Technology*. Retrieved \n28 January 2024. \n\n82. \"Lyon Public Transportation Statistics\" (https://moovitapp.com/insights/en/Moovit_Insights_Public_Transit_Ind \nex_France_Lyon-3483). Global Public Transit Index by Moovit. Retrieved 19 June 2017. \n Material was \ncopied from this source, which is available under a Creative Commons Attribution 4.0 International License (ht \ntps://creativecommons.org/licenses/by/4.0/). \n\n83. Council of Europe (2011). \"Intercultural city: Lyon, France\" (http://www.coe.int/t/dg4/cultureheritage/culture/Citi \nes/lyon_en.asp).*coe.int*. Retrieved 22 May 2011. \n\n84. \"Jumelage\" (http://www.economie.grandlyon.com/tous-les-partenariats-internationaux-villes.html). \n*economie.grandlyon.com*(in French). Grand Lyon économie. Retrieved 14 November 2019. \n\n85. \"World Trade Center Saint Louis\" (https://worldtradecenter-stl.com/st-louis-sister-cities-program/lyon-france/). \n*worldtradecenter-stl.com*. World Trade Center Saint Louis. Retrieved 18 May 2020. \n\n**External links**\n\nOfficial website (http://www.lyon.fr)(in French) \nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/) \nLyon’s English Language News and Information (https://thisislyon.fr/) \nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French) \n\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we \nb/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback \nMachine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. \norg/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback \nMachine, The National Library of Israel \n\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Table 17: Self-reported work accidents during the last 12 months (EU27) – LFS Ad hoc modules**\n\n\n \n \n \n \n [html]\n
UFS Ad hoc modulesSelf - reported work accidents200720132020
Percentage of respondents reporting one work accident3.20 %2.80 %2.30 %
Percentage of respondents reporting more than one work accident, Estimate EU - OSHA : 2.2 accidentsNot askedNot asked0.40 %
Persons in labour force ( EU - 27 )/ to ( former name : Active persons )184 m183 m194 m
- 2006- 2012
- 2019Extrapolated number of accidents ( in millions ) For 2020 also added 0.4 % with two or more accidents5.89 m5.12 m
1.94 × 2.3 = 4.461.94 × 0.4 = 0.785.24 mESAW Registered non - fatal accidents **( four days or more of obsence, 2006.2012.2019.6, 0.27 )**3.96 m2.94 m
3.14 m- 2006- 2012- 2019
\n\n\n\nIn 2007, 3.2% of the respondents reported an accident, in 2013 this fell to 2.8%, and in 2020 2.3% of \nthe ‘Person in labour force’, aged 15-64, responded with a ‘Yes’. This corresponds to a decline of 28% \nfrom 2007 to 2020. The decline of the total estimated number of work accidents shows a similar trend, \na 24% decrease from 5.89 million to 4.46 million (if the persons with more than one accident from the \n2020 survey are not taken into account to achieve a better comparability with 2007 and 2013). \n\nFor 2020,**an estimate of the number of accidents based on the Ad hoc module results in a figure**\n**of 5.24 million**. The number of ESAW-registered non-fatal accidents in 2019 was 3.14 million, \napproximately 60% of the self-reported. One reason for this difference surely is that the respondents to \nthe question in the LFS Ad hoc module**might refer to every work accident**, including those resulting \nin under four days of absence.153 \n\n**Estimations**\nEurostat itself estimated in 1999 that approximately 37% of the non-fatal accidents did not need to be \nregistered because they resulted in fewer than four days of absence:*‘Around 37% of accidents at work*\n*in the EU result in fewer than 4 days’ loss of work.’*154 .In the estimate above the figures are in a similar \nrange. The**LFS surveys also reveal strong differences between occupational groups**. The ISCO \ngroups 1-3 have less than half the accidents compared to groups 6-7 and 8-9.155", + "page_start": 67, + "page_end": 67, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158", + "page_start": 157, + "page_end": 157, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Assessment).396 Many good examples of support for micro and small enterprises (MSEs) are available \nas identified in the comprehensive EU-OSHA reports on OSH in MSEs.397 \n\nOften, guidance documents show the difference between good practice in prevention and risky \npractices, for example, the SLIC guidance on measures against exposure to respirable crystalline silica \nat construction sites.398 There are many of these good or best practice examples in literature, but there \nis rarely a**quantitative estimate of the occurrence of good**(or moderate)**versus poor practice**\n**before and after**the publication and promotion of such guidance documents, which would be crucial to \nestimate the impact of guidance and tools. \n\nOften the support of a proper implementation is done by European national, sectoral and regional \nemployers’ and workers’ associations. They contribute to supervision and implementation by \nconsultation or participation in steering committees and so on. Some of them produce specific OSH \ninformation or guidance for their members, adapted to the main topics of the organisation. 399 They \nparticipate in the development of national strategic approaches or OSH campaigns. In all EU Member \nStates there exist fora for social dialogue at regional, sectoral or national level (overview in OSHWiki \narticles on OSH national systems400). At EU level more than 40 sectoral Social Dialogue Committees \nand a cross-industry social dialogue committee is working on topics of EU-wide relevance.401 \n\nIn the frame of social dialogue, employer federations and trade unions agree on the regulation of \n**working conditions in collective agreements**without intervention or close reference to state \nregulations, for example, on working time or telework rules. The Eurofound ‘Database of wages, working \ntime and collective disputes’ provides an EU-wide overview on such agreements.402 \n\nIn some countries,**employers’ and workers’ associations are governing widely independent OSH**\n**institutions**(e.g. Austrian AUVA or German Berufsgenossenschaften) that act in the frame of state \nregulation but with quite considerable independent decision power.403 In some cases they dispose of \nsignificant resources and are major players for some areas, like training of OSH professionals, or \ncompensation of occupational diseases. They can even implement financial incentives to initiate better \nOSH practices.404 \n\n**Management systems**and policies contribute to better prevention; they include ethical considerations \n(corporate responsibility programmes, sustainability and environmental reports), or quality objectives \n(quality management) particularly in global and large companies. Most of them cover all aspects of the \nbusiness activities and**OSH is one of these aspects**. Well known are the standards of the International \nOrganisation for Standardization (ISO), namely ISO 9001, Quality management systems, ISO 14001 \nEnvironmental management systems - Requirements with guidance for use, and ISO 31000, Risk \nmanagement - Principles and guidelines. 405 \n\nIf the OSH aspects in such systems are not sufficiently covered, enterprises can introduce**specific OSH**\n**management**systems. ISO published the global standard ISO 45.000-2018*Occupational health and*\n*safety management systems - Requirements with guidance for use*developed by ISO. According to ISO, \nthese systems have the following function: \n*‘OH&S management controls the conditions and factors that affect, or could affect, the health and safety*\n*of workers (including temporary workers and contractor personnel), visitors, or any other person in the*\n*workplace, to avoid their ill health and/or injury.’406*", + "page_start": 125, + "page_end": 125, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**6 OSH legislation and OSH infrastructure in the EU**\n**6.1 Foundation, legislation, compliance and supervision**\nThe**ethical and economic importance of safe and healthy working conditions**led to an integration \nof this target in international conventions and agreements; it is also embedded in the treaties of the EU. \n\n**UN**has included**‘Safe and secure work environment’**as an indicator for**Goal 8**of their 17 global \n**‘Sustainable Development Goals**’ for 2030. Goal 8 aims to*‘Promote sustained, inclusive and*\n*sustainable economic growth, full and productive employment and decent work for all’*. 334 It requests in \nits target 8.8 to*‘Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment.’*\n\nThe**Preamble to the Constitution**335**of the ILO**includes as an objective*‘*…*the protection of the*\n*worker against sickness, disease and injury arising out of his employment ...’*. In 2022, the objective of \na safe and healthy working environment became part of the ‘Declaration on Fundamental Principles and \nRights at Work’, adding OSH to the existing four basic principles, that is, 1) freedom of association and \nright to collective bargaining, 2) the elimination of all forms of forced or compulsory labour, 3) the \neffective abolition of child labour, and 4) the elimination of discrimination. Between the year of the \nfoundation in 1919 and today, the ILO agreed on more than 40 conventions and recommendations \naddressing OSH, be it either general provisions or provisions for specific groups and sectors or specific \nrisks.336 \n\nThe**EU and its predecessors**have enshrined health and safety of workers in their**founding treaties**. \nAlready in 1951, it was stated in Article 3 of the European Coal and Steel Community (ECSC) Treaty \nthat*‘The institutions of the Community shall, within the limits of their respective powers, in the common*\n*interest … promote improved working conditions and an improved standard of living for the workers in*\n*each of the industries for which it is responsible …’*. 337 During the development of the European \ninstitutions and the EU from those years until today, references to working conditions and safety and \nhealth were always part of the treaties, and also in the latest Treaty of Lisbon from 2009.338 \n\nIn**Article 151 of the Lisbon Treaty,**it is stated that*‘The Union and the Member States, shall have as*\n*their objectives the promotion of employment, improved living and working conditions …’*. The areas of \nsuch promotion are set out in**Article 153**, where two bullet points refer to OSH: (a)*improvement in*\n*particular of the working environment to protect workers’ health and safety; (b) working conditions.*In \n2017, the European Commission launched an initiative to agree on the**‘European Pilar of Social**\n**Rights’**(EPSR), comprising 20 key principles guiding the EU in the field of social policy.339 These pillars \nwere agreed by the Member States;**Principle 10 refers to a**‘**Healthy, safe and well-adapted work**\n**environment**and data protection.’ \n\nThese European and international agreements and treaties regard**safety and health**as essential for \nhuman development, a**basic human right**. The main reasoning is to eliminate or reduce as much as \npossible suffering, sickness, disability and death of workers. Often the reasoning refers to intertwined \nobjectives, that is, to economic growth (UN), or to reduce the economic burden of incomplete health and \nsafety at work, be it the burden for enterprises or the society as a whole, that is, by*‘Promotion of*\n*employment’*(Lisbon Treaty) or by*‘Prolongation of the participation in the labour market’*(EPSR) or \n*‘Data protection’*(EPSR).", + "page_start": 117, + "page_end": 117, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "In the context of research publication, what is HAL ?", + "target_page": 3, + "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Reporting for specific materials, systems and methods \n\nWe require information from authors about some types of materials, experimental systems and methods used in many studies. Here, indicate whether each material, \nsystem or method listed is relevant to your study. If you are not sure if a list item applies to your research, read the appropriate section before selecting a response.", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed4.pdf" + }, + { + "text": "Paulson, Lawrence C. (February 2018). \"Computational Logic: Its Origins and Applications\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832843).*Proceedings of the Royal Society*\n*A: Mathematical, Physical and Engineering Sciences*.**474**(2210): 1–14. arXiv:1712.04375 \n(https://arxiv.org/abs/1712.04375). Bibcode:2018RSPSA.47470872P (https://ui.adsabs.harv \nard.edu/abs/2018RSPSA.47470872P). doi:10.1098/rspa.2017.0872 (https://doi.org/10.109 \n8%2Frspa.2017.0872). PMC 5832843 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832 \n843). PMID 29507522 (https://pubmed.ncbi.nlm.nih.gov/29507522). S2CID 3805901 (http \ns://api.semanticscholar.org/CorpusID:3805901). \nPedemonte, Bettina (25 June 2018). \"Strategic vs Definitory Rules: Their Role in Abductive \nArgumentation and their Relationship with Deductive Proof\" (https://www.ejmste.com/article/ \nstrategic-vs-definitory-rules-their-role-in-abductive-argumentation-and-their-relationship-with \n-5539).*Eurasia Journal of Mathematics, Science and Technology Education*.**14**(9): 1–17. \ndoi:10.29333/ejmste/92562 (https://doi.org/10.29333%2Fejmste%2F92562). ISSN 1305- \n8215 (https://search.worldcat.org/issn/1305-8215). S2CID 126245285 (https://api.semantics \ncholar.org/CorpusID:126245285). Archived (https://web.archive.org/web/20211207195246/h \nttps://www.ejmste.com/article/strategic-vs-definitory-rules-their-role-in-abductive-argumentati \non-and-their-relationship-with-5539) from the original on 7 December 2021. Retrieved \n8 January 2022. \nPickel, Bryan (1 July 2020). \"Structured Propositions and Trivial Composition\" (https://doi.or \ng/10.1007%2Fs11229-018-1853-1).*Synthese*.**197**(7): 2991–3006. doi:10.1007/s11229- \n018-1853-1 (https://doi.org/10.1007%2Fs11229-018-1853-1). hdl:20.500.11820/3427c028- \nf2cb-4216-a199-9679a49ce71c (https://hdl.handle.net/20.500.11820%2F3427c028-f2cb-42 \n16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964). \nS2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020). \nPietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri \nes/logical-form/#pat).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta \nnford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved \n4 December 2021. \nPlanty-Bonjour, Guy (2012).*The Categories of Dialectical Materialism: Contemporary Soviet*\n*Ontology*. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0. \nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. \norg/rec/POSCAW-4).*Informal Logic*.**36**(4): 563–593. doi:10.22329/il.v36i4.4527 (https://do \ni.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht \ntps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved \n8 January 2022. \nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan \nford.edu/entries/logic-paraconsistent/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021. \nPépin, Jean (2004). \"Logos\".*Encyclopedia of Religion*(https://www.encyclopedia.com/philo \nsophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02- \n865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi \na.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the \noriginal on 29 December 2021. Retrieved 29 December 2021. \nPutnam, H. (1969). \"Is Logic Empirical?\".*Boston Studies in the Philosophy of Science*. \nVol. 5. pp. 216–241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94- \n010-3381-7_5). ISBN 978-94-010-3383-1. \nQuine, Willard Van Orman (1981).*Mathematical Logic*. Harvard University Press. p. 1. \nISBN 978-0-674-55451-1.", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia1.pdf" + }, + { + "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "[html]Hown - research - research - research - research - research - research - research - research## Metrics Serverflow - up -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Enable Metrics Serveropensh1ft_metr ' ics_server_instal1 • Trueflow - up -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------## Service Catalogflow - up -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# default • Trueopensh1ft_enab1e_service_cata1og • True# default ‐ Truetemp1ate_service_broker_insta11 - Trueopenshift_temp7ate_serv1ce_broker_namespaces +[\" openshift \"]temp1ate serv1ce < underline > aroker selector (\" node - role. kubernetes. 1o / 1nfra *:\" true \")# default ‐ Trueans1b1e_service_broker_insta11 = Trueans1b1e_service_broker_loca1_reg1stry_wh1te11st +[ 1,*- apb51 ]flow - up -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Prometheus Cluster Mon1toringflow - up -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------#https :// docs. opensith † tt. con / container => 1at form / 3... 12 // resta11_conf1 / g / prometcheass. c - 1uster_man1torf / mg,. httnlopensh1ft_cluster_monitor1ng_pperator_1nsta11 = Fa1seopenshift_oronetheus_node_selector ~|\" node - role. kubernetes.. 10 / 1nfra \": \" true \")H Enable pers ' stent storage of Pronetheus tine - series data ( default Fa1se )opensh1ft_cluster_noni toring_operator_pronetheus_storage_enabled • TrueF Enable pers ' stent : storage of Alertmanager notif ' cattons { default Fa ' se }opensh1ft_cluster_mon1tar1ng_operator_alertmanager_storage_enab1ed - True# Dynamic storage a11ocation for Pronetheus servicesopensh1ft_cluster_mon1torring_operator_pronetheus_storage_capacity = 3251opensh1ft_cluster_non1tor1ng_operator_alertmanager_storage_capac1ty - 461# Storage class to use 1f pers1stent storage enabledHIDTE : 1t will use storageclass default 1f storage cluss not spec1f1edopensh1ft_cluster_rani tarring_sperator_pranethesi_storuge_class_nigner_10te - powervc - kBs - volume- default *opersh1 ↑, cluster_rani tarring_sperstor_alertnanager_storage_clus_name - 1 / br - powervic - kBs -- volune - defasi1tHown - research inservention - research insertest## OpenSh1ft HostsHown - research inservention - research insertest[ 0SEv3 : ch11dren ]mastersetcdnodes# host group for masters[ masters ]ms tnode01. doma1n. example. com# host group for etcd[ etcd ]ms tnode01. doma1n. example.", + "page_start": 142, + "page_end": 142, + "source_file": "sg248459.pdf" + }, + { + "text": "131. Lyakhova, U.A.; Lyakhov, P.A. (2024). \"Systematic review of approaches to detection and \n\nclassification of skin cancer using artificial intelligence: Development and prospects\" (https:// \nlinkinghub.elsevier.com/retrieve/pii/S0010482524008278).*Computers in Biology and*\n*Medicine*.**178**: 108742. doi:10.1016/j.compbiomed.2024.108742 (https://doi.org/10.1016%2 \nFj.compbiomed.2024.108742). PMID 38875908 (https://pubmed.ncbi.nlm.nih.gov/3887590 \n8). \n\n132. Alqudaihi, Kawther S.; Aslam, Nida; Khan, Irfan Ullah; Almuhaideb, Abdullah M.; Alsunaidi, \nShikah J.; Ibrahim, Nehad M. Abdel Rahman; Alhaidari, Fahd A.; Shaikh, Fatema S.; \nAlsenbel, Yasmine M.; Alalharith, Dima M.; Alharthi, Hajar M.; Alghamdi, Wejdan M.; \nAlshahrani, Mohammed S. (2021). \"Cough Sound Detection and Diagnosis Using Artificial \nIntelligence Techniques: Challenges and Opportunities\" (https://www.ncbi.nlm.nih.gov/pmc/a \nrticles/PMC8545201).*IEEE Access*.**9**: 102327–102344. Bibcode:2021IEEEA...9j2327A (htt \nps://ui.adsabs.harvard.edu/abs/2021IEEEA...9j2327A). doi:10.1109/ACCESS.2021.3097559 \n(https://doi.org/10.1109%2FACCESS.2021.3097559). ISSN 2169-3536 (https://search.world \ncat.org/issn/2169-3536). PMC 8545201 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC854 \n5201). PMID 34786317 (https://pubmed.ncbi.nlm.nih.gov/34786317). \n\n133. Bax, Monique; Thorpe, Jordan; Romanov, Valentin (December 2023). \"The future of \n\npersonalized cardiovascular medicine demands 3D and 4D printing, stem cells, and artificial \nintelligence\" (https://doi.org/10.3389%2Ffsens.2023.1294721).*Frontiers in Sensors*.**4**. \ndoi:10.3389/fsens.2023.1294721 (https://doi.org/10.3389%2Ffsens.2023.1294721). \nISSN 2673-5067 (https://search.worldcat.org/issn/2673-5067). \n\n134. Jumper, J; Evans, R; Pritzel, A (2021). \"Highly accurate protein structure prediction with \n\nAlphaFold\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8371605).*Nature*.**596**(7873): \n583–589. Bibcode:2021Natur.596..583J (https://ui.adsabs.harvard.edu/abs/2021Natur.596.. \n583J). doi:10.1038/s41586-021-03819-2 (https://doi.org/10.1038%2Fs41586-021-03819-2). \nPMC 8371605 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8371605). PMID 34265844 \n(https://pubmed.ncbi.nlm.nih.gov/34265844). \n\n135. \"AI discovers new class of antibiotics to kill drug-resistant bacteria\" (https://www.newscientis \n\nt.com/article/2409706-ai-discovers-new-class-of-antibiotics-to-kill-drug-resistant-bacteria/). \n20 December 2023. Archived (https://web.archive.org/web/20240916014421/https://www.ne \nwscientist.com/article/2409706-ai-discovers-new-class-of-antibiotics-to-kill-drug-resistant-ba \ncteria/) from the original on 16 September 2024. Retrieved 5 October 2024. \n\n136. \"AI speeds up drug design for Parkinson's ten-fold\" (https://www.cam.ac.uk/research/news/a \ni-speeds-up-drug-design-for-parkinsons-ten-fold). Cambridge University. 17 April 2024. \nArchived (https://web.archive.org/web/20241005165755/https://www.cam.ac.uk/research/ne \nws/ai-speeds-up-drug-design-for-parkinsons-ten-fold) from the original on 5 October 2024. \nRetrieved 5 October 2024. \n\n137. Horne, Robert I.; Andrzejewska, Ewa A.; Alam, Parvez; Brotzakis, Z. Faidon; Srivastava, \n\nAnkit; Aubert, Alice; Nowinska, Magdalena; Gregory, Rebecca C.; Staats, Roxine; Possenti, \nAndrea; Chia, Sean; Sormanni, Pietro; Ghetti, Bernardino; Caughey, Byron; Knowles, \nTuomas P. J.; Vendruscolo, Michele (17 April 2024). \"Discovery of potent inhibitors of α- \nsynuclein aggregation using structure-based iterative learning\" (https://www.ncbi.nlm.nih.go \nv/pmc/articles/PMC11062903).*Nature Chemical Biology*.**20**(5). Nature: 634–645. \ndoi:10.1038/s41589-024-01580-x (https://doi.org/10.1038%2Fs41589-024-01580-x). \nPMC 11062903 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11062903). \nPMID 38632492 (https://pubmed.ncbi.nlm.nih.gov/38632492). \n\n138. Figueiredo, Mayara Costa; Ankrah, Elizabeth; Powell, Jacquelyn E.; Epstein, Daniel A.;", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Thomas Scialom, Paul-Alexis Dray, Sylvain Lamprier, \nBenjamin Piwowarski, and Jacopo Staiano. 2020. \nMLSUM: The multilingual summarization corpus. \nIn Proceedings of the 2020 Conference on Empirical \nMethods in Natural Language Processing (EMNLP), \npages 8051–8067, Online. Association for Computa- \ntional Linguistics. \n\nNandan Thakur, Nils Reimers, Andreas Rücklé, Ab- \nhishek Srivastava, and Iryna Gurevych. 2021. BEIR: \nA heterogenous benchmark for zero-shot evalu- \nCoRR, \nation of information retrieval models. \nabs/2104.08663. \n\nAshish Vaswani, Noam M. Shazeer, Niki Parmar, Jakob \nUszkoreit, Llion Jones, Aidan N. Gomez, Lukasz \nKaiser, and Illia Polosukhin. 2017. Attention is all \nyou need. In Neural Information Processing Systems.", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv4.pdf" + }, + { + "text": "***Acknowledgements***\n\nAuthored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello \n(Proteus Strategies) in collaboration with Creative Commons. \n\nWe are grateful to participants in the workshops, including Luis Villa, Tidelift and openml.fyi; \nJonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, Cornell; Lila Bailey, Internet \nArchive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, Library Futures/ \nNYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik \nStallman, UC Berkeley School of Law. The paper represents the views of the authors, \nhowever, and should not be attributed to the workshop as a whole. All mistakes or errors are \nthe authors’. \n\nThis report is published under the terms of the Creative Commons Attribution \nLicense.", + "page_start": 21, + "page_end": 21, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "[html]ResearchSensorResearchSensorEndocrinologyResearchMean=Alternativebge - m30.680.950.690.430.770.810.650.810.31distilbert - base - 25lang - cased0.430.650.460.370.690.340.100.530.31distilbert - base - en - fr - cased0.430.650.460.380.690.340.100.540.31distilbert - base - fr - cased0.410.450.460.380.690.340.100.540.31sentence - camembert - large0.650.900.660.430.770.720.560.820.31sentence - flaubert - base0.590.800.610.410.760.650.430.790.31Solon - embeddings - base - 0.10.640.950.670.430.760.780.410.780.31Solon - embeddings - large - 0.10.670.960.690.420.770.790.630.800.30sentence - croissant - llm - base0.620.910.650.430.770.680.520.760.29bert - base - multilingual - cased0.440.750.460.340.700.380.100.500.29bert - base - multilingual - uncased0.490.760.480.410.700.460.190.560.31camembert - base0.350.180.420.340.680.310.020.570.30camembert - large0.370.260.490.360.650.340.070.590.17sentence - camembert - base0.570.720.570.360.740.660.430.780.29embed - multilingual - light - v3.00.630.890.610.390.740.760.550.780.31embed - multilingual - v3.00.660.940.670.410.770.790.540.810.31flaubert_base_cased0.340.230.250.270.670.360.080.520.31flaubert_base_uncased0.310.120.230.220.680.400.090.430.29flaubert_large_cased0.270.110.250.250.650.300.010.330.29e5 - mistral - 7b - instruct0.680.950.640.500.760.820.640.790.31multilingual - e5 - base0.650.950.650.430.750.750.560.780.31multilingual - e5 - large0.660.950.660.400.760.760.590.810.31multilingual - e5 - small0.630.940.600.390.750.730.520.780.32udever - bloom -", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
DatasetSyntecHALSummEvalFr
Samples100 queries 90 documents26233 samples 10 classes100 texts1100 human summaries1600 machine summaries
Creation processScraping of Syntec collective bargaining agreement with articles as documents. Writing queries corresponding to articles.Scraping of HAL articles with id. title and domain. Further cleaning with deduplication, language filtering and class subsampling.Translation from English to French with Deepl of the SummEval dataset.
Annotation process4 annotators divided into 2 groups. Each group was given half of the articles and asked to choose an article and ask a question about it. Each annotator wrote 25 questions.Annotations provided by authors when submitting their paper. They choose the domain between existing academic fields.Detailed annotation process provided in Fabbri et al. ( 2021 ).
Quality checksHuman verification of annotations.Baseline models for classification and topic modeling.CorrelationBLEUse of scores of the French and the original English datasets. LLM as - a - judge translationrating and human verification.
\n\nlyMail dataset. Each article has 11 human-written \nsummaries and 16 machine-generated summaries \nannotated by 8 people with a score for coherence, \nconsistency, fluency, and relevance. We trans- \nlated it from English to French using DeepL API6. \nSince MTEB evaluation is based on the embedding \nsimilarity between machine-generated and human- \ngenerated summaries, we propose to compute the \nROUGE (Lin, 2004) and BLEU (Papineni et al., \n2002) metrics between machine and human sum- \nmaries for both French and English version. In Ta- \nble 2, we report the average of the scores as well as \ntheir correlations between the two languages. The \ncorrelation is high (above 0.7), showing that the \nword and n-gram overlap between human and ma- \nchine summaries is highly preserved in the French \nversion. One may argue that computing the met- \nric on fully translated texts (human and machine \nsummaries are both translated from English) may \nintroduce biases and not assess the quality of the \ntranslations. For this purpose, we ensure the French \nhuman summaries are correctly translated from En- \nglish. We use an LLM as-a-judge (Zheng et al., \n\n• Samples belonging to domain classes with \nless than 500 samples were removed, which \nleads us to keep only 10 classes. \n\n• Subsampling was performed on 2 classes con- \ntaining more than 10k samples each to lower \nthe number of samples and mitigate the unbal- \nance of the dataset. \n\nMore details about this process are provided in the \nappendix A.2 along with some extracts in Figure \n6. We make the dataset publicly available in both \ntheir raw and clean versions. We use this dataset in \na clustering setup to cluster publications by their \ntitle and use the domain as ground truth. To ensure \nthe quality of this dataset, we run 3 baseline mod- \nels for classification: TF-IDF + SVM, a fine-tuned \nCamembert (Martin et al., 2019) and GPT-4 lever- \naging In-Context Learning (ICL). Furthermore, we \nrun one baseline model for topic modeling: Latent \nDirichlet Allocation (LDA) (Blei et al., 2003) and \nreport scores in the appendix A.2. \n\n3.1.3 SummEvalFr (Summarization) \nThe original SummEval dataset (Fabbri et al., 2021) \nconsists of 100 news articles from the CNN/Dai-", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Newell, Allen; Simon, H. A. (1976). \"Computer Science as Empirical Inquiry: Symbols and \n\nSearch\" (https://doi.org/10.1145%2F360018.360022).*Communications of the ACM*.**19**(3): \n113–126. doi:10.1145/360018.360022 (https://doi.org/10.1145%2F360018.360022). \n\nNicas, Jack (7 February 2018). \"How YouTube Drives People to the Internet's Darkest Corners\" \n(https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1 \n518020478).*The Wall Street Journal*. ISSN 0099-9660 (https://search.worldcat.org/issn/009 \n9-9660). Archived (https://web.archive.org/web/20241005171230/https://www.wsj.com/articl \nes/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) from the \noriginal on 5 October 2024. Retrieved 16 June 2018. \n\nNilsson, Nils (1983). \"Artificial Intelligence Prepares for 2001\" (https://ai.stanford.edu/~nilsson/O \n\nnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF).*AI Magazine*.**1**(1). \nArchived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin \nePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August \n2020. Retrieved 22 August 2020. Presidential Address to the Association for the \nAdvancement of Artificial Intelligence. \n\nNRC (United States National Research Council) (1999). \"Developments in Artificial \n\nIntelligence\".*Funding a Revolution: Government Support for Computing Research*. National \nAcademy Press. \n\nOmohundro, Steve (2008).*The Nature of Self-Improving Artificial Intelligence*. presented and \n\ndistributed at the 2007 Singularity Summit, San Francisco, CA. \n\nOudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from \n\ninsect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD \nOudeyer10.pdf) (PDF).*IEEE Transactions on Autonomous Mental Development*.**2**(1): 2– \n16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057). \nS2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web. \narchive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) \n(PDF) from the original on 3 October 2018. Retrieved 4 June 2013. \n\nPennachin, C.; Goertzel, B. (2007). \"Contemporary Approaches to Artificial General \n\nIntelligence\".*Artificial General Intelligence*. Cognitive Technologies. Berlin, Heidelberg: \nSpringer. pp. 1–30. doi:10.1007/978-3-540-68677-4_1 (https://doi.org/10.1007%2F978-3-54 \n0-68677-4_1). ISBN 978-3-5402-3733-4. \n\nPinker, Steven (2007) [1994],*The Language Instinct*, Perennial Modern Classics, Harper, \n\nISBN 978-0-0613-3646-1 \n\nPoria, Soujanya; Cambria, Erik; Bajpai, Rajiv; Hussain, Amir (September 2017). \"A review of \n\naffective computing: From unimodal analysis to multimodal fusion\" (http://researchrepository. \nnapier.ac.uk/Output/1792429).*Information Fusion*.**37**: 98–125. \ndoi:10.1016/j.inffus.2017.02.003 (https://doi.org/10.1016%2Fj.inffus.2017.02.003). \nhdl:1893/25490 (https://hdl.handle.net/1893%2F25490). S2CID 205433041 (https://api.sem \nanticscholar.org/CorpusID:205433041). Archived (https://web.archive.org/web/20230323165 \n407/https://www.napier.ac.uk/research-and-innovation/research-search/outputs/a-review-of- \naffective-computing-from-unimodal-analysis-to-multimodal-fusion) from the original on 23 \nMarch 2023. Retrieved 27 April 2021. \n\nRawlinson, Kevin (29 January 2015). \"Microsoft's Bill Gates insists AI is a threat\" (https://www.b \nbc.co.uk/news/31047780).*BBC News*. Archived (https://web.archive.org/web/20150129183 \n607/http://www.bbc.co.uk/news/31047780) from the original on 29 January 2015. Retrieved \n30 January 2015. \n\nReisner, Alex (19 August 2023), \"Revealed: The Authors Whose Pirated Books are Powering", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "What is the effect of embedding dimension on embedding representation quality ?", + "target_page": 6, + "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "tation and, in practical applications, the under- \nlying storage and compute costs. We selected \nmodels with embedding dimensions ranging \nfrom 384 to 4096. \n\net al., 2019), their variants optimized for semantic \nsimilarity (Reimers and Gurevych, 2019), numer- \nous multilingual models performing at the top on \nMTEB (e.g E5 and T5), Bloom variants (Zhang \net al., 2023), models based on very recent power- \nful LLMs (Wang et al., 2023; Faysse et al., 2024) \nand finally the proprietary models of OpenAI, Co- \nhere and Voyage. Certain models were selected in \nmultiple sizes to isolate the dimensionality effect \neffectively. We provide information on the mod- \nels’ licenses as reported in the Hugging Face hub10. \nHowever, we encourage readers to conduct further \nresearch before utilizing a model. \n• Sequence length: Being the number of to- \nkens that a model can consider as input, the \nsequence length is important as it impacts the \nunit that can be encoded (sentence, paragraph, \ndocument). However, encoding overly long \nsequences requires efficiently storing the rele- \nvant information into a single vector. Among \nthe selected methods, this criterion varies \nfrom 128 tokens to 32768. \n\n3.3 Evaluation \n\n• Model parameters: Often correlated with the \ntwo first characteristics, parameter count is im- \nportant for practical applications as it affects \nusability on resource-efficient machines. The \nselected models have a number of parameters \nranging from 20 million (∼100Mb in float32) \nto 7 billion (∼28Gb). \n\nFor the sake of homogeneity, models are evalu- \nated using the same metrics per task as in MTEB \n(Muennighoff et al., 2022): Classification (Accu- \nracy), Bitext mining (F1 score), Pair classification \n(AP), Clustering (V measure), Reranking (MAP), \nRetrieval (NDCG@10), Summarization and STS \n(Spearman correlation based on cosine similarity). \nBitextMining tasks are excluded from the aver- \nage performance scores and therefore the figures, \nas this task evaluates 2 languages instead of one, \nand this benchmark focuses only on one language \n(French). We present the results for both DiaBlaBi- \ntextMining and FloresBitextMining in Table 12. \n\n• Language: This is a major feature of lan- \nguage models. Some are monolingual, and \nothers are multilingual. Language is usually \nacquired during pre-training, but sometimes, \nmodels familiarize themselves with new lan- \nguages at tuning. For the benchmark, we \nselected French models, as well as bilingual \nor multilingual models. We also included a \nfew ones that claimed to be English (e.g. all- \nMiniLM-L12-v29). \n\nUsing the overall benchmark results, our goal \nwill be to answer the following research questions: \nQ1: Is a model outstanding on all tasks? \nAs we are trying to find out whether one embed- \nding model is statistically better than the others for \nFrench, the objective will also be to analyze the \nperformance of the models by tasks to facilitate \nmodel choice for specific applications. \nQ2: Are there any links between the model charac- \nteristics and performance? \nIn section 3.2, we undertook the substantial task of \ngathering the characteristics of all evaluated mod- \nels. The goal here will be to analyze their impact \non performance and draw conclusions about, for \nexample, the relationship between embedding di- \nmension and model ranking on the benchmark. \nQ3: Do monolingual models have multilingual ca- \npabilities? \nWe interrogate the ability of a model trained exclu- \nsively in one language to perform well in another \nlanguage. \nQ4: Are there any correlations between datasets", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv4.pdf" + }, + { + "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. \n\nBut this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. \n\nSince BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. \n\n4 Localizing linguistic knowledge \n\n4.1 BERT embeddings", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\n\n \n \n \n \n [html]TargetArch.Frozen Evaluation\n
Fine - Tuning
K400 ( 16 × 1 × 1 )SSv2 ( 36 × 1 × 1 )IN1KK400 - ft ( 16 × 5 × 3 )
PixelsViT - L / 1668.666.073.385.4
FeaturesViT - L / 1673.766.274.885.6
\n\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\n\n \n \n \n \n [html]Frozen EvaluationArch.Data# SamplesK400 ( 96 × 1 × 1 )ViT - L / 16ViT - H / 16\n
SSv2 ( 15 × 1 × 1 )IN1KAvg.
K710700K75.863.273.770.9
K710 + SSv2900K72.967.472.871.0
K710 + HT1900K74.564.274.871.1
VideoMix2M2000K73.766.274.871.5
K710 + SSv2900K75.766.873.772.0
VideoMix2M2000K74.068.575.972.8
\n\nversus pixel prediction objective, b) the construction of \nthe pretraining data distribution, c) the feature pooling \nstrategy for leveraging the model’s representations in \ndownstream tasks, and d) the masking strategy, towards \nidentifying: what to predict from what?", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "• The top 10 documents that are not labeled as \n\nrelevant constitute the negative samples. \n\nWe recognize that this process leads to a high cor- \nrelation between the retrieval and reranking tasks. \nWe still think it is essential to make the latter avail- \nable, with an open door to future improvement8. \n• Variety: Diverse model types were included \nto offer an insightful analysis across vari- \nous model characteristics (dimension, training \nstrategy, etc.). \n\nIn line with the third objective, we explicit below \nthe studied characteristics of embedding models \nthat will be discussed with the results. \n\n7SummEvalFr available at: https://huggingface.co/ \ndatasets/lyon-nlp/summarization-summeval-fr-p2p \nhttps: \n8SyntecReranking \n\nat: \n//huggingface.co/datasets/lyon-nlp/ \nmteb-fr-reranking-syntec-s2p \ning available at: \nlyon-nlp/mteb-fr-reranking-alloprof-s2p \n\navailable \n\nand AlloprofRerank- \nhttps://huggingface.co/datasets/ \n\n• Embedding dimension: This critical element \ninfluences the expressiveness of the represen-", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
DatasetBLEUROUGE - 1ROUGE - 2ROUGE - L
SummEval0.2050.2920.0990.193
SummEvalFr0.2760.3020.1170.194
Correlation En - Fr0.700.850.800.84
\n\n3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\nTable 2: Average ROUGE and BLUE scores computed \nbetween machine summaries and human summaries \nfor the original English SummEval and its translation \nto French. The correlations of the individual scores \nbetween English and French are also reported. \n\nThe reranking task, as evaluated in MTEB, requires \ndatasets composed of a set of queries, each as- \nsociated with relevant and irrelevant documents. \nDespite our efforts, we found no French dataset \nthat natively exhibits such a structure. Thus, to \nevaluate this task, we built data for the reranking \ntask based on the Syntec and Alloprof (Lefebvre- \nBrossard et al., 2023) datasets. These already fea- \nture queries and labeled relevant documents. Irrele- \nvant ones were added using the following process: \n\n3.2 Models \n\nFor comparison on our benchmark, we selected \nvarious models to fulfil three objectives. \n\nIt was imperative to include \ntop performers from the MTEB benchmark \n(Muennighoff et al., 2022). We mainly se- \nlected multilingual models and some English \nmodels to asses their language-transferring \nabilities. Additionally, we integrated natively \nFrench transformer-based models such as \nCamemBERT (Martin et al., 2019), FlauBERT \n(Le et al., 2020) and even the very recent \nCroissantLLM (Faysse et al., 2024). \n\n• Quantity: The aim was to compare a substan- \ntial number of models (51 in total) to provide \ncomprehensive results, facilitating the com- \nmunity in selecting effective French models. \n\n• Relevance: \n\n• To avoid bias, we use the BM25 algorithm \n(Robertson and Jones, 1976) (which is a deter- \nministic method) to rank documents in terms \nof relevance regarding each query. \n\n• The top 10 documents that are not labeled as", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "the other models. However, other models should be \nconsidered for their performance on specific tasks, \nbeing open source or having a small embedding \ndimension. \n\nThis work opens several doors for future im- \nprovements. By examining dataset diversity in \nterms of topics and model ranking, we observe \nthat the benchmark would benefit from additional \ndatasets that introduce higher diversity. Beyond \nclassification, many tasks focus on semantic simi- \nlarity, explaining the strong performance of models \ntrained for similarity. Exploring novel tasks in the \ngenerative spectrum or evaluating token embed- \ndings (contextualized or not) on tasks like Named \nEntity Recognition could be an interesting path \nfor future exploration. There are also opportuni- \nties for improvements on the model side. With \nnumerous existing models that could be added to \nthe leaderboard and many new proposals awaiting. \nFor instance, we can already see the promising ca- \npabilities of early variants of recent models (Faysse \net al., 2024) and expect that future proposals will \ncome to compete strongly with closed-source mod- \nels. Ultimately, we hope to see the emergence of \nother language-specific MTEB variants (e.g. for \nhigh-resource languages like Spanish and German), \nenabling a more comprehensive evaluation of mul- \ntilingual model performance. \n\nThe datasets correlation w.r.t model ranking are \npresented in appendix Figure 12. Except for \ntwo datasets (MasakhaNEWSClusteringP2P, Sum- \nmEvalFr), the correlations, on average, are high. \nThere is still enough diversity to make each dataset \ninteresting for the French MTEB benchmark. Two \ngroups (SyntecReranking/ SyntecRetrieval, Mas- \nsiveScenarioClassification/ MTOPDomainClassi- \nfication/ MassiveIntentClassification) exhibit no- \ntably high correlations (∼0.97). It is interesting \nto point out some sub-diagonal correlation blocks. \nThe datasets being arranged by task indicate that \nmodels behave slightly more similarly within the \nsame task than between two different tasks. This \nunderscores the importance of having multiple \ntasks in the benchmark to select general-purpose \nmodels. For readers interested in specific tasks, \nit is more relevant to examine task-specific rank- \nings rather than the overall one. The complemen- \ntary results of model correlations w.r.t to strengths \nand weaknesses on datasets are displayed in ap- \npendix Figure 11. Strong correlations in behavior \nemerge among the variants of the same models \n(e.g. DistilBERT, sentence-croissant, sentence-t5, \ne5, etc.). Correlations are also generally observed \namong numerous models trained using the sentence \ntransformers framework (Reimers and Gurevych, \n2019), as well as proprietary models, e.g. from \nCohere and OpenAI. Conversely, these models fine- \ntuned for sentence similarity, show minimal cor- \nrelation with pre-trained models for which token- \nembedding pooling techniques are employed.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv4.pdf" + }, + { + "text": "with respect to model ranking? \nTo go further than the correlation analysis among \ndatasets regarding their topics (see section 3.1.5), \nsubsequent analysis will be conducted regarding \nhow they rank models. Additionally, complemen- \ntary insights will be derived from examining cor- \nrelations of models relative to their strengths and \nweaknesses across different datasets. \n\nfollowing: \n\n• Tuned for sentence similarity: 0.727 \n\n• Finetuned vs pretrained: 0.544 \n\n• Model number of parameters: 0.49 \n\n• Embedding dimension: 0.452 \n\n4 Results and discussion • Closed source: 0.449 \n\nIn this section, we present the results through the \nprism of our research questions. \n• Max sequence length: 0.336 \n\n• Multilingual: 0.103 \n\n• English: 0.025 \n\n• English but tuned on other languages: -0.025 \n\n• French: -0.134 \n\n• Bilingual: -0.135 \n\nAdditionally, all cross-correlations between charac- \nteristics are reported in appendix Figure 10. \n\nQ1: Is there a model that outstands on all \ntasks? \n\nModels performances for each task are presented \nin appendix Tables 9, 10, 11, 12 and 13. Figure \n1 shows the critical difference diagram of average \nscore ranks. \n\nAs in MTEB (Muennighoff et al., 2022), no \nmodel claims state-of-the-art in all tasks even if \nthe text-embedding-3-large model is in first place \nIt ranks \non average on all tasks (see Table 9). \nfirst for the classification and reranking tasks. For \nthe clustering task, text-embedding-ada-002 is the \nbest model. The models voyage-code-2, \ntext- \nembedding-3-small and mistral-embed share the \ntop positions in the retrieval task ranking. For the \npair classification task, laser2 is ahead of its com- \npetitors. Finally, sentence-camembert-large leads \non the STS task and multilingual-e5-small has the \nbest results for summarization. \nAs expected, the score most strongly correlates \nwith whether the evaluated models were trained on \na sentence similarity task. Of course, this criterion \nis connected to the more general Finetuned one. \nThe only top-performing models solely pre-trained \nare from the E5 family, where the pre-training is, \nin fact, contrastive and optimized for similarity. \nConversely, models pre-trained on token-level tasks \nand generating embeddings via pooling appear less \nwell-suited for the benchmark tasks. \n\nFigure 1 shows a global model comparison \nacross all datasets. The models are arranged hori- \nzontally according to their performance, with the \nbest models on the left. The black bars repre- \nsent the statistical equivalence between the mod- \nels’ performances. The statistically equivalent \ntop performers for this benchmark are OpenAI’s \nmodels text-embedding-3-large, text-embedding-3- \nsmall and text-embedding-ada-002. Interestingly, \nmany models do not show a significant perfor- \nmance gap between their base and large flavours. \nSome French models stand out among the multi- \nlingual models, such as Solon-embeddings-large- \n0.1, sentence_croissant_alpha_v0.3 and sentence- \ncamembert-large. \nFurthermore, we observe a performance correla- \ntion with the embedding dimension and the model’s \nnumber of parameters, which are often correlated \nthemselves. This appears very clearly on the rela- \ntive ranking of E5 and T5 models (see Figure 1). \nHowever, some small models perform very well \non the benchmark, such as the standard version \nof the multilingual universal sentence encoder or \nSolon-embeddings-base-1.0. Notably, the maxi- \nmum sequence length, while an important criterion \nfor generative tasks with LLMs, is less correlated \nwith performance than the other dimensions. This \ncan be explained by many datasets containing rel- \natively small texts (see appendix Table 3 showing \nthat 14 datasets have less than 50 tokens). \n\nQ2: Are there any links between model \ncharacteristics and performance?", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv4.pdf" + }, + { + "text": "Niklas Muennighoff, Nouamane Tazi, Loic Magne, and \nNils Reimers. 2022. Mteb: Massive text embedding \nbenchmark. In Conference of the European Chapter \nof the Association for Computational Linguistics. \n\nLiang Wang, Nan Yang, Xiaolong Huang, Binxing \nJiao, Linjun Yang, Daxin Jiang, Rangan Majumder, \nand Furu Wei. 2022. Text embeddings by weakly- \nsupervised contrastive pre-training. arXiv preprint \narXiv:2212.03533. \n\nTomas Mikolov, Kai Chen, Gregory S. Corrado, and \nJeffrey Dean. 2013. Efficient estimation of word \nrepresentations in vector space. In International Con- \nference on Learning Representations. \nAlex Wang, Amanpreet Singh, Julian Michael, Felix \nHill, Omer Levy, and Samuel R. Bowman. 2018. \nGlue: A multi-task benchmark and analysis plat- \nform for natural language understanding. In Black- \nboxNLP@EMNLP. \nNiklas Muennighoff. 2022. \n\nSgpt: Gpt sentence \nembeddings for semantic search. arXiv preprint \narXiv:2202.08904. \n\nKexin Wang, Nils Reimers, and Iryna Gurevych. 2021. \nTSDAE: Using transformer-based sequential denois- \ning auto-encoderfor unsupervised sentence embed- \nIn Findings of the Association for \nding learning. \nComputational Linguistics: EMNLP 2021, pages \n671–688, Punta Cana, Dominican Republic. Associa- \ntion for Computational Linguistics. \n\nUsman Naseem, Imran Razzak, Shah Khalid Khan, \nand Mukesh Prasad. 2021. A comprehensive survey \non word representation models: From classical to \nstate-of-the-art word representation language models. \nTransactions on Asian and Low-Resource Language \nInformation Processing, 20(5):1–35. \n\nLiang Wang, Nan Yang, Xiaolong Huang, Linjun Yang, \nRangan Majumder, and Furu Wei. 2023. Improving \ntext embeddings with large language models. arXiv \npreprint arXiv:2401.00368. \n\nArvind Neelakantan, Tao Xu, Raul Puri, Alec Rad- \nford, Jesse Michael Han, Jerry Tworek, Qiming Yuan, \nNikolas Tezak, Jong Wook Kim, Chris Hallacy, et al. \n2022. Text and code embeddings by contrastive pre- \ntraining. arXiv preprint arXiv:2201.10005. \n\nSilvan Wehrli, Bert Arnrich, and Christopher Irrgang. \n2024. German text embedding clustering benchmark. \n\nJianmo Ni, Gustavo Hernández Ábrego, Noah Constant, \nJi Ma, Keith B. Hall, Daniel Cer, and Yinfei Yang. \n2021. Sentence-t5: Scalable sentence encoders from \npre-trained text-to-text models. \n\nShitao Xiao, Zheng Liu, Peitian Zhang, Niklas Muen- \nnighoff, Defu Lian, and Jian-Yun Nie. 2024. C-pack: \nPackaged resources to advance general chinese em- \nbedding. \n\nKishore Papineni, Salim Roukos, Todd Ward, and Wei- \nJing Zhu. 2002. Bleu: a method for automatic evalu- \nation of machine translation. In Proceedings of the \n40th Annual Meeting of the Association for Compu- \ntational Linguistics, pages 311–318, Philadelphia, \nPennsylvania, USA. Association for Computational \nLinguistics. \n\nYinfei Yang, Yuan Zhang, Chris Tar, and Jason \nBaldridge. 2019. PAWS-X: A cross-lingual adversar- \nial dataset for paraphrase identification. In Proceed- \nings of the 2019 Conference on Empirical Methods \nin Natural Language Processing and the 9th Inter- \nnational Joint Conference on Natural Language Pro- \ncessing (EMNLP-IJCNLP), pages 3687–3692, Hong \nKong, China. Association for Computational Linguis- \ntics. \n\nNils Reimers and Iryna Gurevych. 2019. Sentence-bert: \nSentence embeddings using siamese bert-networks. \nIn Conference on Empirical Methods in Natural Lan- \nguage Processing. \n\nXin Zhang, Zehan Li, Yanzhao Zhang, Dingkun Long, \nPengjun Xie, Meishan Zhang, and Min Zhang. 2023. \nLanguage models are universal embedders. ArXiv, \nabs/2310.08232. \n\nStephen E. Robertson and Karen Spärck Jones. 1976. \nRelevance weighting of search terms. J. Am. Soc. Inf. \nSci., 27:129–146. \n\nLianmin Zheng, Wei-Lin Chiang, Ying Sheng, Siyuan \nZhuang, Zhanghao Wu, Yonghao Zhuang, Zi Lin, \nZhuohan Li, Dacheng Li, Eric P. Xing, Hao Zhang, \nJoseph E. Gonzalez, and Ion Stoica. 2023. Judging \nllm-as-a-judge with mt-bench and chatbot arena.", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv4.pdf" + }, + { + "text": "computed from another part of the video, x. The pre- \ndictor network Pϕ( \n), which maps the representation of \n· \nx to the representation of y, is trained simultaneously \nwith the encoder, and is provided specification of the \nspatio-temporal positions of y through the conditioning \nvariable z \n\nFeature Prediction versus Pixel Reconstruction. \nApproaches that predict in pixel space must dedicate \nsignificant model capacity and compute to capture all \nthe low-level detail in the visual input. By contrast, ap- \nproaches that predict in latent space have the flexibility \nto eliminate irrelevant or unpredictable pixel-level details \nfrom the target representation (Vondrick et al., 2016). \nPredicting in representation space has been shown to \nlead to versatile representations that perform well across \nmany downstream tasks through linear probing or low- \nshot adaptation (Assran et al., 2023; Oquab et al., 2023; \nAssran et al., 2022), while demonstrating an efficiency \ngain during pretraining compared to pixel level recon- \nstruction (Assran et al., 2023; Baevski et al., 2022b,a). \nThe works of Baevski et al. (2022a,b) additionally show \nthat predicting in representation space results in compet- \nitive end-to-end fine-tuning performance in the image, \naudio and text domains. In this work, we extend these \nfindings to the video modality. \n\n∆y. \n← \nNaively implementing the objective using the regression \n\nminimizeθ,ϕ \nPϕ(Eθ(x), ∆y) \n∥ 1, \nEθ(y) \n∥ − \n\nwould admit a trivial solution, where the encoder out- \nputs a constant representation, regardless of its input. \nIn practice, we use the following modified objective to \nprevent representation collapse, \n\nminimizeθ,ϕ sg(Eθ(y)) \n(1) \nPϕ(Eθ(x), ∆y) \n1, \n∥ ∥ − \n\n) denotes a stop-gradient operation, which \nwhere sg( \n· \ndoes not backpropagate through its argument, and Eθ( \n) \n· \n). \nis an exponential moving average of the network Eθ( \n· \nThe use of an exponential-moving average feature ex- \ntractor along with a stop-gradient and a predictor has \nbeen used as a collapse prevention strategy for image pre- \ntraining (Grill et al., 2020), and studied empirically (Xie \net al., 2021) and theoretically (Tian et al., 2021). In \nfact, the objective in equation (1) is similar to the loss \nof Assran et al. (2023) used for image pretraining, but \nwe modify it to use an ℓ1 regression, which we found to \nbe more stable. \n\nTheoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. \n\nP ⋆(Eθ(x)) = argmin", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + }, + { + "text": "Figure 3 V-JEPA. Training operates on a video clip of T frames with spatial resolution H × W , flattened into a sequence \nof L tokens. (Left to right): We first obtain the input of the x-encoder by dropping tokens from the video clip. The \nx-encoder then processes the masked video sequence, and outputs an embedding vector for each input token. Next, the \noutputs of the x-encoder are concatenated with a set of learnable mask tokens containing positional embeddings of the masked \nspatio-temporal patches. The predictor network processes the combined token sequence, and outputs an embedding vector for \neach mask token. The outputs of the predictor are then regressed to the prediction targets using an L1 loss. The prediction \ntargets correspond to the output of the y-encoder. \n\nputs x and y correspond to masked regions of a video, we \napply the video masks by simply dropping a subset of the \ntokens. We apply masking at the input of the x-encoder, \nand at the output of the y-encoder to construct contex- \ntualized targets (Baevski et al., 2022b). The encoder is \nparameterized using standard ViT networks, while the \npredictor is a narrow transformer implemented using \n12 blocks with an embedding dimension of 384. Taking \ninspiration from masked autoencoders (He et al., 2021), \nour predictor takes as input the sequence of embeddings \nproduced by the x-encoder as well as a sequence of learn- \nable mask tokens with positional embeddings indicating \nthe spatio-temporal positions of the y tokens. The out- \nput of the predictor is an embedding vector for each \nmask token; see Figure 3 and refer to Appendix B for \nmore details. \n\n3.2 Prediction Task: Predicting y from x \nThe feature prediction task is based on a masked mod- \neling formulation (He et al., 2021; Tong et al., 2022); \ni.e., regions x and y from the video are sampled using \nmasking. To sample y from a video, we sample several \n(possibly overlapping) spatially continuous blocks with \nvarious aspect ratios and repeat the spatial blocks across \nthe entire temporal dimension of the video; x is taken to \nbe the complement. Masking a large continuous block \nthat covers the full temporal dimension limits informa- \ntion leakage due to the spatial and temporal redundancy \nof videos, and results in a harder prediction task (Tong \net al., 2022). \n\nWe leverage two types of masks: short-range masks, \nwhere we take the union of 8 randomly sampled target \nblocks covering 15% of each frame, and long-range masks, \nwhere we take the union of 2 randomly sampled target \nblocks covering 70% of each frame. In both cases, the \naspect ratio for all sampled blocks is randomly chosen in \nthe range (0.75, 1.5). Given that both short-range and \nlong-range masks are produced by sampling many blocks \nand taking their union, the result is an average masking \nratio of \n90%. We refer to our masking strategy as \nmulti-block, and compare it to other possible masking \nstrategies in Section 4. \n\n3.4 Pretraining Data and Evaluation Setup \n\n∼ \n\n3.3 Network Parameterization \n\nWe use a Vision Transformer (ViT) (Dosovitskiy et al., \n2020; Arnab et al., 2021) as our video backbone. To \nprocess a video with a transformer network, we split the \nvideo clip into a 3D grid of L spatio-temporal patches, \nwhere a patch consists of a 16 \n16 pixel block spanning \n2 consecutive frames; we refer to these spatio-temporal \npatches as tokens. This sequence of tokens is then di- \nrectly processed by the stack of transformer blocks. In- \n\n×", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", + "target_page": 6, + "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(a) travel, subsistence, accommodation and shipment expenses; and \n(b) any other expenses provided for in the tender specifications. \n\nThe daily subsistence allowance referred to in Article II.22.4 (d) and the accommodation \nflat-rate ceiling referred to in Article II.22.4(e) are listed in Annex IV \n\n**I.6. Payment arrangements**\n\n**I.6.1. Pre-financing**\n\nPre-financing is not applicable to this FWC. \n\n**I.6.2. Interim payments**\n\nInterim payment is not applicable to this FWC, unless it is provided for under a specific \ncontract. \n\nIf provided for, the contractor (or leader in the case of a joint tender) may claim the interim \npayment equal to the amount specified in the relevant specific contract in accordance with \nArticle II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for the interim payment as provided for in the tender specifications, \naccompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n the relevant progress report or deliverable accepted by ECHA \n\n statements of reimbursable expenses in accordance with Article II.22. \n\nThe contracting authority must approve the submitted documents or deliverables and pay \nwithin 30 days from receipt of the invoice. \n\n**I.6.3. Payment of the balance**\n\n1. The contractor (or leader in the case of a joint tender) may claim the payment of the \nbalance in accordance with Article II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for payment of the balance due under a specific contract, as provided for \nin the tender specifications and accompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n document of acceptance by ECHA of the deliverables as defined in the*tender*\n\n*specifications or specific contract*\n\n statements of reimbursable expenses in accordance with Article II.22. \n\n2. The contracting authority must approve the submitted documents and pay within 30 \ndays from receipt of the invoice. \n\n3. The contracting authority may suspend the time limit for payment specified in point 2 \nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority \nshall give its approval and pay within the remainder of the time-limit indicated in point 2 \nunless it rejects partially or fully the submitted documents. \n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC. \n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC. \n\n**I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank \naccount denominated in euro, identified as follows: \n\nName of bank: \n\nFull address of branch: \n\nExact denomination of account holder: \n\nFull account number including bank codes: \n\n[IBAN1 code:] \n\n**I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \nDirectorate and Unit D3, Risk Management I \nTelakkakatu 6 \n00150 Helsinki \nFinland \nE-mail: [insert functional mailbox]", + "page_start": 6, + "page_end": 6, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I. Special Conditions**\n\n**I.1. Order of priority of provisions**\n\nIf there is any conflict between different provisions in this FWC, the following rules must \nbe applied: \n\n(a) The provisions set out in the special conditions take precedence over those in the \n\nother parts of the FWC. \n\n(b) The provisions set out in the general conditions take precedence over those in the \n\n*order form*and specific contract (Annex III) \n\n(c) The provisions set out in the*order form*and specific contract (Annex III) take \n\nprecedence over those in the other annexes. \n\n(d) The provisions set out in the tender specifications (Annex I) take precedence over \n\nthose in the tender (Annex II). \n\n(e) The provisions set out in the FWC take precedence over those in the specific \n\ncontracts. \n\n(f) The provisions set out in the specific contracts take precedence over those in the \n\nrequests for services. \n\nAny reference to specific contracts applies also to order forms. \n\n**I.2. Subject matter**\n\nThe subject matter of the FWC is scientific support to ECHA for work on restrictions, \ndose-response functions, Annex XIV, POPs and dossier evaluation. \n\n**I.3. Entry into force and duration of the FWC**\n\n**I.3.3**The FWC is concluded for a period of 24 months with effect from the date of its \n\n\n \n \n \n \n [html]\n
L3A The parties must sign any specific contract before the FWC expires.The FWC continues to apply to such specific contracts after its expiry. The services relating to such specific contracts must be performed no later than six months after the expiry of the FWC.
1.3. 5 Renewal of the FWCThe FWC is renewed automatically 2 times for 12 months each, unless one of the parties receives formal notification to the contrary at least three months before the end of the ongoing duration. Renewal does not change or postpone any existi
", + "page_start": 4, + "page_end": 4, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Commission and published on the website indicated below, applicable on the day when it \nissues the payment order. \n\nThe contractor makes any conversion between the euro and another currency at the \nmonthly accounting exchange rate, established by the Commission and published on the \nwebsite indicated below, applicable on the date of the invoice. \n\nhttp://ec.europa.eu/budget/contracts_grants/info_contracts/inforeuro/inforeuro_en.cfm \n\n**II.21.4. Costs of transfer**\n\nThe costs of the transfer are borne as follows: \n\n(a) the contracting authority bears the costs of dispatch charged by its bank; \n(b) the contractor bears the costs of receipt charged by its bank; \n(c) the party causing repetition of the transfer bears the costs for repeated transfer. \n\nII.21.5. Pre-financing, performance and money retention guarantees \n\nIf, as provided for in Article I.6*,*a financial guarantee is required for the payment of pre- \nfinancing, as performance guarantee or as retention money guarantee, it must fulfil the \nfollowing conditions: \n\n(a) the financial guarantee is provided by a bank or a financial institution approved by \nthe contracting authority or, at the request of the contractor and with the \nagreement of the contracting authority, by a third party; and \n\n(b) the guarantee shall have the effect of making the bank or financial institution or the \nthird party provide irrevocable collateral security, or stand as first-call guarantor of \nthe contractor's obligations without requiring that the contracting authority has \nrecourse against the principal debtor (the contractor). \n\nThe contractor bears the cost of providing such guarantee. \n\nPre-financing guarantees must remain in force until the pre-financing is cleared against \ninterim payments or payment of the balance. Where the payment of the balance takes the \nform of a debit note, the pre-financing guarantee must remain in force for three months \nafter the debit note is sent to the contractor. The contracting authority must release the \nguarantee within the following month. \n\nPerformance guarantees cover compliance with substantial contractual obligations until the \ncontracting authority has given its final approval for the service. The performance \nguarantee must not exceed 10 % of the total price of the specific contract. The contracting \nauthority must release the guarantee fully after final approval of the service, as provided \nfor in the specific contract. \n\nRetention money guarantees cover full delivery of the service in accordance with the \nspecific contract including during the contract liability period and until its final approval by \nthe contracting authority. The retention money guarantee must not exceed 10 % of the \ntotal price of the specific contract. The contracting authority must release the guarantee \nafter the expiry of the contract liability period as provided for in the specific contract. \n\nThe contracting authority must not request a retention money guarantee for a specific \ncontract where it has requested a performance guarantee.", + "page_start": 33, + "page_end": 33, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "quality or continuity of the services. The parties may agree to draw up a transition plan \ndetailing the contractor’s assistance unless such plan is already detailed in other \ncontractual documents or in the tender specifications. The contractor must provide such \nassistance at no additional cost, except if it can demonstrate that it requires substantial \nadditional resources or means, in which case it must provide an estimate of the costs \ninvolved and the parties will negotiate an arrangement in good faith. \n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the \ntermination of the FWC or a specific contract, including the additional cost of appointing \nand contracting another contractor to provide or complete the services, except if the \ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article \nII.18.2. The contracting authority may claim compensation for such damage. \n\nThe contractor is not entitled to compensation for any loss resulting from the termination \nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was \ncaused by the situation specified in Article II.18.2. \n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and \ncancel or reduce its commitments. \n\nWithin 60 days of the date of termination, the contractor must submit any report, \ndeliverable or*result*and any invoice required for services that were provided before the \ndate of termination. \n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific \ncontract with each member of the group separately on the basis of points (d), (e) or (g) \nof Article II.18.1, under the conditions set out in Article II.11.2 \n\n**II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender) \nidentification data, the amount, the currency and the date, as well as the FWC reference \nand reference to the specific contract. \n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a \njoint tender) for value added tax (VAT) purposes and must specify separately amounts not \nincluding VAT and amounts including VAT. \n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance \nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European \nUnion on the privileges and immunities of the European Union. \n\nThe contractor (or leader in the case of a joint tender) must complete the necessary \nformalities with the relevant authorities to ensure that the supplies and services required \nfor*implementation of the FWC*are exempt from taxes and duties, including VAT. \n\n**II.19.2. E-invoicing**\n\nIf provided for in the special conditions, the contractor (or leader in the case of a joint \ntender) submits invoices in electronic format if the conditions regarding electronic \nsignature specified by Directive 2006/112/EC on VAT are fulfilled, i.e. using a qualified", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "OLAF’s own staff or by any outside body authorised to do so on its behalf. \n\nSuch checks and audits may be initiated at any moment during the provision of \nthe services and up to five years starting from the payment of the balance of the \nlast specific contract issued under this FWC \n\nThe audit procedure is initiated on the date of receipt of the relevant letter sent \nby the contracting authority. Audits are carried out on a confidential basis. \n\n**II.24.2**The contractor must keep all original documents stored on any appropriate \nmedium, including digitised originals if authorised under national law, for a period \nof five years starting from the payment of the balance of the last specific contract \nissued under this FWC. \n\n**II.24.3**The contractor must grant the contracting authority’s staff and outside personnel \nauthorised by the contracting authority the appropriate right of access to sites and \npremises where the FWC is implemented and to all the information, including \ninformation in electronic format, needed to conduct such checks and audits. The \ncontractor must ensure that the information is readily available at the moment of \nthe check or audit and, if so requested, that information is handed over in an \nappropriate format. \n\n**II.24.4**On the basis of the findings made during the audit, a provisional report is drawn \nup. The contracting authority or its authorised representative must send it to the \ncontractor, who has 30 days following the date of receipt to submit observations. \nThe contractor must receive the final report within 60 days following the expiry of \nthe deadline to submit observations. \n\nOn the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. \n\n**II.24.6**The Court of Auditors, the European Public Prosecutor’s Office established by \nCouncil Regulation (EU) 2017/193977 (‘the EPPO’) and, for the processing of \npersonal data, the European Data Protection Supervisor have the same rights as \nthe contracting authority, particularly right of access, for the purpose of checks,", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.4.2. Period of provision of the services \n\nThe period for the provision of the services starts to run from the date on which the specific \ncontract is signed by the last party. \n\nI.4.3. Implementation of FWC in cascade \n\nThe FWC is implemented as follows: the contracting authority orders services by sending \na request for offer for a specific contract to the contractor who is ranked first in the cascade. \n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor \nmust either: \n\n(a) send the specific tender back to the contracting authority; or \n(b) send an explanation of why it cannot accept the order. \n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an \nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may \nnegatively affect the*performance of the specific contract*(see Article II.7), the contracting \nauthority may place the order with the next contractor on the cascade. \n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send \nthem back on time, the contractor may be considered in breach of its obligations under \nthis FWC as set out in Article II.18.1 (c). \n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the \nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The \nperiod allowed for the execution of the tasks shall start to run on the date of signature of \nthe specific contract or order form by both parties. \n\n**I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and \nreimbursement of expenses is**EUR 1 000 000**(one million). However, this does not bind \nthe contracting authority to purchase for the maximum amount. \n\nThe maximum unit prices of the services are: \n\nSenior experts: \nExperts: [ ] EUR per man-day \n[ ] EUR per man-day \n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in \nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at \nhttp://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly \ndata (index) (prc_hicp_midx).]", + "page_start": 5, + "page_end": 5, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**FRAMEWORK CONTRACT**\n\n**ORDER FORM**\n\nDirectorate \nand unit: Order number: (Name and address of contractor) \n\n Currency of payment: \n\nEUR \nTender (date and \nreference): \n\nE-mail: \n\n\n \n \n \n \n [html]LISTING OF THE SUPPLIES / SERVICESUNITQUANTITYPRICE in €TOTAL--YATPlace of delivery or performance and / or Incoterm :Contractor ’ s signature\n
UNIT________________________________________________________________________________________________________________________________________________________________________________________________________
PRICE
In accordance with Articles 3 and 4 of the Protocol on the Priviloges and Immunities of the European Union, the Commission 6 exempt. If the European Union, the Commission 6 exempt. If then as taxes and dues, the community, the this contracta
< underline > 1
", + "page_start": 45, + "page_end": 45, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", + "target_page": 11, + "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "*a specific contract*or any part of it: \n\n(a) if the procedure for awarding the FWC or a specific contract or the*implementation of*\n*the FWC*proves to have been subject to*irregularities, fraud or breach of obligations*; \n\n(b) in order to verify whether the presumed*irregularities, fraud*or*breach of obligations*\nhave actually occurred. \n\nThe contracting authority must*formally notify*the contractor of the suspension and the \nreasons for it. Suspension takes effect on the date of*formal notification*, or at a later date \nif the*formal notification*so provides. \n\nThe contracting authority must*notify*the contractor as soon as the verification is \ncompleted whether: \n\n(a) it is lifting the suspension; or \n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or \n(j). \n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a \nspecific contract. \n\nThe contracting authority may in addition suspend the time allowed for payments in \naccordance with Article II.21.7. \n\n**II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the \nfollowing circumstances: \n\n(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to \n\nhave been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "quality or continuity of the services. The parties may agree to draw up a transition plan \ndetailing the contractor’s assistance unless such plan is already detailed in other \ncontractual documents or in the tender specifications. The contractor must provide such \nassistance at no additional cost, except if it can demonstrate that it requires substantial \nadditional resources or means, in which case it must provide an estimate of the costs \ninvolved and the parties will negotiate an arrangement in good faith. \n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the \ntermination of the FWC or a specific contract, including the additional cost of appointing \nand contracting another contractor to provide or complete the services, except if the \ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article \nII.18.2. The contracting authority may claim compensation for such damage. \n\nThe contractor is not entitled to compensation for any loss resulting from the termination \nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was \ncaused by the situation specified in Article II.18.2. \n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and \ncancel or reduce its commitments. \n\nWithin 60 days of the date of termination, the contractor must submit any report, \ndeliverable or*result*and any invoice required for services that were provided before the \ndate of termination. \n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific \ncontract with each member of the group separately on the basis of points (d), (e) or (g) \nof Article II.18.1, under the conditions set out in Article II.11.2 \n\n**II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender) \nidentification data, the amount, the currency and the date, as well as the FWC reference \nand reference to the specific contract. \n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a \njoint tender) for value added tax (VAT) purposes and must specify separately amounts not \nincluding VAT and amounts including VAT. \n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance \nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European \nUnion on the privileges and immunities of the European Union. \n\nThe contractor (or leader in the case of a joint tender) must complete the necessary \nformalities with the relevant authorities to ensure that the supplies and services required \nfor*implementation of the FWC*are exempt from taxes and duties, including VAT. \n\n**II.19.2. E-invoicing**\n\nIf provided for in the special conditions, the contractor (or leader in the case of a joint \ntender) submits invoices in electronic format if the conditions regarding electronic \nsignature specified by Directive 2006/112/EC on VAT are fulfilled, i.e. using a qualified", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. \n\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in \nArticle II.18.2, the date on which the termination takes effect must be specified in the \n*formal notification*. \n\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes \neffect on the day following the date on which the contractor receives*notification*of \ntermination. \n\nIn addition, at the request of the contracting authority and regardless of the grounds for \ntermination, the contractor must provide all necessary assistance, including information, \ndocuments and files, to allow the contracting authority to complete, continue or transfer \nthe services to a new contractor or internally, without interruption or adverse effect on the", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] \nconcerning intellectual property rights and exploitation of the results and I confirm that I \ntransferred all the relevant rights to [*insert name of contractor or other intermediary right*\n*holder*]. \n\nI declare that [I have received full remuneration] [I agreed to receive remuneration by \n[*insert date*]]. \n\n[As creator, I also confirm that I do not object to the following: \n\n(a) that my name be mentioned or not mentioned when the results are presented to \n\nthe public; \n\n(b) that the results be divulged or not after they have been delivered in their final \n\nversion to the contracting authority; \n\n(c) that the results be adapted, provided that this is done in a manner which is not \nprejudicial to my honour or reputation.] \n\nDate, place, signature", + "page_start": 48, + "page_end": 48, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**II.21.6. Interim payments and payment of the balance**\n\nThe contractor (or leader in the case of a joint tender) must send an invoice for interim \npayment, as provided for in Article I.6 or in the tender specifications or in the specific \ncontract. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice for payment \nof the balance within 60 days of the end of the period of provision of the services, as \nprovided for in Article I.6, in the tender specifications or in the specific contract. \n\nPayment of the invoice and approval of documents does not imply recognition of the \nregularity, authenticity, completeness and correctness of the declarations and information \nthey contain. \n\nPayment of the balance may take the form of recovery. \n\n**II.21.7. Suspension of the time allowed for payment**\n\nThe contracting authority may suspend the payment periods specified in Article I.6 at any \ntime by*notifying*the contractor (or leader in the case of a joint tender) that its invoice \ncannot be processed. The reasons the contracting authority may cite for not being able to \nprocess an invoice are: \n\n(a) because it does not comply with the FWC; \n(b) because the contractor has not produced the appropriate documents or \n\ndeliverables; or \n\n(c) because the contracting authority has observations on the documents or \ndeliverables submitted with the invoice. \n\nThe contracting authority must*notify*the contractor (or leader in the case of joint tender) \nas soon as possible of any such suspension, giving the reasons for it. In cases b) and c) \nreferred above, the contracting authority shall notify the contractor (or leader in case of a \njoint tender) the time limits to submit additional information or corrections or a new version \nof the documents or deliverables if the contracting authority requires it. \n\nSuspension takes effect on the date the contracting authority sends the*notification*. The \nremaining payment period resumes from the date on which the requested information or \nrevised documents are received or the necessary further verification, including on-the-spot \nchecks, is carried out. Where the suspension period exceeds two months, the contractor \n(or leader in the case of a joint tender) may request the contracting authority to justify the \ncontinued suspension. \n\nWhere the payment periods have been suspended following rejection of a document \nreferred to in the first paragraph of this Article and the new document produced is also \nrejected, the contracting authority reserves the right to terminate the specific contract in \naccordance with Article II.18.1(c)*.*\n\n**II.21.8. Interest on late payment**\n\nOn expiry of the payment periods specified in Article I.6, the contractor (or leader in the \ncase of a joint tender) is entitled to interest on late payment at the rate applied by the \nEuropean Central Bank for its main refinancing operations in euros (the reference rate) \nplus eight points. The reference rate is the rate in force, as published in the C series of the \n*Official Journal of the European Union,*on the first day of the month in which the payment \nperiod ends.", + "page_start": 34, + "page_end": 34, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of*pre-existing rights*as \nset out in Article II.13.4 together with the invoice for payment of the balance at the latest. \n\n**I.11. Termination by either party2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending \n*formal notification*to the other party with three months written notice. \n\nIf the FWC or a specific contract is terminated: \n\na) neither party is entitled to compensation; \n\nb) the contractor is entitled to payment only for the services provided before \ntermination takes effect. \n\nThe second, third and fourth paragraphs of Article II.18.4 apply. \n\n**I.12. Applicable law and settlement of disputes**\n\n**I.12.1**The FWC is governed by Union law, complemented, where necessary, by the law of \n\nFinland. \n\n**I.12.2**The courts of Finland have exclusive jurisdiction over any dispute regarding the \n\ninterpretation, application or validity of the FWC. \n\n**I.13. Interinstitutional FWC**\n\nNot applicable \n\n**I.14. Service provided on the premises of the contracting authority**\n\nNot applicable. \n\n**I.15. Other special conditions**\n\nElectronic documents exchange \n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the \nAgency and the Contractor will have to be carried out via electronic means. \n\nAt the request of the Agency, the use of such electronic applications will become \nmandatory, upon mutual agreement, during the performance of the contract, at no \nadditional cost for the Agency.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**II.16. Reduction in price**\n\n**II.16.1. Quality standards**\n\nIf the contractor fails to provide the service in accordance with the FWC or a specific \ncontract (‘unperformed obligations’) or if it fails to provide the service in accordance with \nthe expected quality levels specified in the tender specifications (‘low quality delivery’), the \ncontracting authority may reduce or recover payments proportionally to the seriousness of \nthe unperformed obligations or low quality delivery. This includes in particular cases where \nthe contracting authority cannot approve a*result*, report or deliverable as defined in Article \nI.6 after the contractor has submitted the required additional information, correction or \nnew version. \n\nA reduction in price may be imposed together with liquidated damages under the conditions \nof Article II.15. \n\n**II.16.2. Procedure**\n\nThe contracting authority must*formally notify*the contractor of its intention to reduce \npayment and the corresponding calculated amount. \n\nThe contractor has 30 days following the date of receipt to submit observations. Failing \nthat, the decision becomes enforceable the day after the time limit for submitting \nobservations has elapsed. \n\nIf the contractor submits observations, the contracting authority, taking into account the \nrelevant observations, must*notify*the contractor: \n\n(a) of the withdrawal of its intention to reduce payment; or \n\n(b) of its final decision to reduce payment and the corresponding amount,. \n\n**II.16.3. Claims and liability**\n\nAny reduction in price does not affect the contractor’s actual or potential liability or the \ncontracting authority’s rights under Article II.18. \n\n**II.17. Suspension of the implementation of the FWC**\n\n**II.17.1. Suspension by the contractor**\n\nIf the contractor is affected by*force majeure*, it may suspend the provision of the services \nunder a specific contract. \n\nThe contractor must immediately*notify*the contracting authority of the suspension. The \n*notification*must include a description of the*force majeure*and state when the contractor \nexpects to resume the provision of services. \n\n\n \n \n \n \n [html]\n
II. 17.2. Suspension by the contracting authorityThe contracting authority may suspend the implementation of the FWC or performance of
\n\n29", + "page_start": 28, + "page_end": 28, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", + "target_page": 14, + "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand \n\n\n \n \n \n \n [html]\n
[ Official legal form ]
[ Statutory registration number or ID or passport number ]
[ Full official address ]
[ VAT registration number ]
\n\n[*repeat these data as many times as there are contractors in case of joint tender and*\n*continue numbering*] \n\n([collectively] \"the contractor\"), represented for the purposes of signing this specific \ncontract by [*forename, surname and function of legal representative*,]", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Union budget, ii) the non-disclosure of information in violation of a specific obligation, with \nthe same effect or iii) the misapplication of such funds or assets for purposes other than \nthose for which they were originally granted, which damages the Union's financial interests; \n\n**'Grave professional misconduct':**a violation of applicable laws or regulations or ethical \nstandards of the profession to which a contractor or a related person belongs, including \nany conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of \nthe contractor or a related person which has an impact on its professional credibility where \nsuch conduct denotes wrongful intent or gross negligence. \n\n**‘Implementation of the FWC’**: the purchase of services envisaged in the FWC through \nthe signature and*performance of specific contracts*; \n\n**‘Interface control document’**: the guideline document which lays down the technical \nspecifications, message standards, security standards, checks of syntax and semantics, \netc. to facilitate machine-to-machine connection. This document is updated on a regular \nbasis; \n\n**‘Irregularity’**: any infringement of a provision of Union law resulting from an act or \nomission by an economic operator, which has, or would have, the effect of prejudicing the \nUnion’s budget. \n\n**‘Notification’**(or ‘notify’): form of communication between the parties made in writing \nincluding by electronic means; \n\n**‘Order form’**: a simplified form of specific contract by which the contracting authority \norders services under this FWC; \n\n**‘Performance of a specific contract’**: the execution of tasks and delivery of the \npurchased services by the contractor to the contracting authority; \n\n**‘Personnel’**: persons employed directly or indirectly or contracted by the contractor to \nimplement the FWC; \n\n**���Pre-existing material’**: any material, document, technology or know-how which exists \nprior to the contractor using it for the production of a*result*in the*implementation of the*\n*FWC*; \n\n**‘Pre-existing right’**: any industrial and intellectual property right on*pre-existing*\n*material*; it may consist in a right of ownership, a licence right and/or right of use belonging \nto the contractor, the*creator*, the contracting authority as well as to any other third \nparties; \n\n**‘Professional conflicting interest’**: a situation in which the contractor’s previous or \nongoing professional activities affect its capacity to implement the FWC or to perform a \nspecific contract to an appropriate quality standard. \n\n**‘Related person’**: any natural or legal person who is a member of the administrative, \nmanagement or supervisory body of the contractor, or who has powers of representation, \ndecision or control with regard to the contractor; \n\n**‘Request for services’**: a document from the contracting authority requesting that the \ncontractors in a multiple FWC with re-opening of competition provide a specific tender for \nservices whose terms are not entirely defined under the FWC;", + "page_start": 13, + "page_end": 13, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. \n\n[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*]", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "OLAF’s own staff or by any outside body authorised to do so on its behalf. \n\nSuch checks and audits may be initiated at any moment during the provision of \nthe services and up to five years starting from the payment of the balance of the \nlast specific contract issued under this FWC \n\nThe audit procedure is initiated on the date of receipt of the relevant letter sent \nby the contracting authority. Audits are carried out on a confidential basis. \n\n**II.24.2**The contractor must keep all original documents stored on any appropriate \nmedium, including digitised originals if authorised under national law, for a period \nof five years starting from the payment of the balance of the last specific contract \nissued under this FWC. \n\n**II.24.3**The contractor must grant the contracting authority’s staff and outside personnel \nauthorised by the contracting authority the appropriate right of access to sites and \npremises where the FWC is implemented and to all the information, including \ninformation in electronic format, needed to conduct such checks and audits. The \ncontractor must ensure that the information is readily available at the moment of \nthe check or audit and, if so requested, that information is handed over in an \nappropriate format. \n\n**II.24.4**On the basis of the findings made during the audit, a provisional report is drawn \nup. The contracting authority or its authorised representative must send it to the \ncontractor, who has 30 days following the date of receipt to submit observations. \nThe contractor must receive the final report within 60 days following the expiry of \nthe deadline to submit observations. \n\nOn the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. \n\n**II.24.6**The Court of Auditors, the European Public Prosecutor’s Office established by \nCouncil Regulation (EU) 2017/193977 (‘the EPPO’) and, for the processing of \npersonal data, the European Data Protection Supervisor have the same rights as \nthe contracting authority, particularly right of access, for the purpose of checks,", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. \n\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in \nArticle II.18.2, the date on which the termination takes effect must be specified in the \n*formal notification*. \n\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes \neffect on the day following the date on which the contractor receives*notification*of \ntermination. \n\nIn addition, at the request of the contracting authority and regardless of the grounds for \ntermination, the contractor must provide all necessary assistance, including information, \ndocuments and files, to allow the contracting authority to complete, continue or transfer \nthe services to a new contractor or internally, without interruption or adverse effect on the", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "*a specific contract*or any part of it: \n\n(a) if the procedure for awarding the FWC or a specific contract or the*implementation of*\n*the FWC*proves to have been subject to*irregularities, fraud or breach of obligations*; \n\n(b) in order to verify whether the presumed*irregularities, fraud*or*breach of obligations*\nhave actually occurred. \n\nThe contracting authority must*formally notify*the contractor of the suspension and the \nreasons for it. Suspension takes effect on the date of*formal notification*, or at a later date \nif the*formal notification*so provides. \n\nThe contracting authority must*notify*the contractor as soon as the verification is \ncompleted whether: \n\n(a) it is lifting the suspension; or \n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or \n(j). \n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a \nspecific contract. \n\nThe contracting authority may in addition suspend the time allowed for payments in \naccordance with Article II.21.7. \n\n**II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the \nfollowing circumstances: \n\n(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to \n\nhave been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Print ISBN 978-92-9479-934-0 doi: 10.2802/26873 \n\nPDF ISBN 978-92-9479-935-7 doi: 10.2802/56459 \n\n© European Agency for Safety and Health at Work, 2023 \n\nReproduction is authorised provided the source is acknowledged. \n\nFor any use or reproduction of photos or other material that is not under the copyright of the European Agency for Safety and \nHealth at Work, permission must be sought directly from the copyright holders. \n\nThe photographs used in this publication illustrate a range of work activities. They do not necessarily show good practices or \ncompliance with legislative requirements. \n\nFor one-click access to websites and references please consult the online version of this publication \nhttps://osha.europa.eu/en/publications/occupational-safety-and-health-europe-state-and-trends-2023", + "page_start": 1, + "page_end": 1, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "The contractor shall assist the controller for the fulfilment of its obligations pursuant to \nArticle 33 to 41 under Regulation (EU) 2018/1725 to: \n\n(a) ensure compliance with its data protection obligations regarding the security of the \nprocessing, and the confidentiality of electronic communications and directories of users; \n(b) notify a personal data breach to the European Data Protection Supervisor; (c) \ncommunicate a personal data breach without undue delay to the data subject, where \napplicable; (d) carry out data protection impact assessments and prior consultations as \nnecessary. \n\nThe contractor shall maintain a record of all data processing operations carried on behalf \nof the controller, transfers of personal data, security breaches, responses to requests for \nexercising rights of people whose personal data is processed and requests for access to \npersonal data by third parties. \n\nThe contracting authority is subject to Protocol 7 of the Treaty on the Functioning of the \nEuropean Union on the privileges and immunities of the European Union, particularly as \nregards the inviolability of archives (including the physical location of data and services as \nset out in Article I.9.2) and data security, which includes personal data held on behalf of \nthe contracting authority in the premises of the contractor or subcontractor. \n\nThe contractor shall notify the contracting authority without delay of any legally binding \nrequest for disclosure of the personal data processed on behalf of the contracting authority \nmade by any national public authority, including an authority from a third country. The \ncontractor may not give such access without the prior written authorisation of the \ncontracting authority. \n\nThe duration of processing of personal data by the contractor will not exceed the period \nreferred to in Article II.24.2. Upon expiry of this period, the contractor shall, at the choice \nof the controller, return, without any undue delay in a commonly agreed format, all \npersonal data processed on behalf of the controller and the copies thereof or shall \neffectively delete all personal data unless Union or national law requires a longer storage \nof personal data. \n\nFor the purpose of Article II.10, if part or all of the processing of personal data is \nsubcontracted to a third party, the contractor shall pass on the obligations referred to in \nArticles I.9.2 and II.9.2 in writing to those parties, including subcontractors. At the request \nof the contracting authority, the contractor shall provide a document providing evidence of \nthis commitment. \n\n**II.10. Subcontracting**\n\n**II.10.1**The contractor must not subcontract and have the FWC implemented by third \nparties beyond the third parties already mentioned in its tender without prior \nwritten authorisation from the contracting authority. \n\n**II.10.2**Even if the contracting authority authorises subcontracting, the contractor remains \nbound by its contractual obligations and is solely responsible for the \n*implementation of the FWC*. \n\n**II.10.3**The contractor must ensure that the subcontract does not affect the rights of the \ncontracting authority under this FWC, particularly those under Articles II.8, II.13 \nand II.24. \n\n**II.10.4**The contracting authority may request the contractor to replace a subcontractor \n\n22", + "page_start": 21, + "page_end": 21, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "*are shifted towards non-permanent workers and subcontractors, who have less protection and/or*\n*knowledge to cope with these risks. This scenario is not easy to verify in quantitative data, although it is*\n*frequently stated in case study research.’*\n\nAlso, Eurofound draws such conclusions on the**impact of subcontracting on working conditions**: \n*‘First, employees in subcontracting perceive higher health and safety risks, notably through more work-*\n*related accidents and increased time pressure. Second, there are a number of psychological risk factors,*\n*such as perceived economic insecurity and worries about losing one’s job, that are more likely among*\n*subcontracting workers.’*49 \n\nThere is even an evident**relation between such forms of employment and higher rates of work**\n**accidents**. In a first systematic review the authors conclude: 50 \n*‘This review supports an association between some of the dimensions of precarious employment and*\n*occupational injuries; most notably for multiple jobholders and employees of temp agencies or*\n*subcontractors at the same worksite. However, results for temporary employment are inconclusive.’*\n\n**OSH Barometer – Mental risks:**\n\nhttps://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/working- \nconditions \n\n**ESENER – Data visualisation:**\n\nhttps://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019 \n\n**3.2 Physical health risks at work**\nRisks at work that can result in physical harm can be divided into**safety**and**health risks**. \n\nThe main result of insufficient safety is a work accident. A**work accident**has as immediate \nconsequences either a personal injury, a disease, or death of one or more workers. Eurostat \ndistinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also \nthe duration of the absence due to the accident — an indicator for the severity of the injury. Non-fatal \naccidents at work can cause medium- or long-term health consequences, and in the worst case a \npermanent disability. \n\nILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, \nincluding acts of violence, arising out of or in connection with work, which results in one or more workers \nincurring a personal injury, disease or death.’51 \n\n**Physical health risks**can be caused by a**variety of circumstances and exposures**or by**inadequate**\n**ergonomics**. Natural**circumstances**at work can pose such health risks, that is, temperature, storms \nand floods, unsafe terrain, biological agents and so on; or the risks are due to manmade circumstances, \nthat is, work in buildings, on roofs and towers, on traffic routes, under artificial ventilation.**Exposure**is \na general term to describe the interaction between environment / emissions / contaminants and the \nhuman organism. In a workplace context, ‘exposure’ mainly covers emissions from machinery or from \ntools and materials, for example, noise, vibration, dust, electromagnetic fields and chemical substances. \n\nRisks from**inadequate ergonomics**harm in particular the musculoskeletal system. Ergonomic risks of \nmanual work are typically caused by repetitive hand and arm movements, tiring positions, for example, \npermanent kneeling or overhead work, lifting and moving of heavy loads, or of patients and so on. A \ncertain ergonomic risk is**physical inactivity**, in practice sitting most of the working time. Not only \nadministrative tasks but also many occupations in service or industry require permanent sitting, for \nexample, drivers, cashiers, part assembly operators and so on (often called ‘sedentary occupations’).", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "What or Corning's corporate values ?", + "target_page": 12, + "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "S C I E N C E & T E C H N O L O G Y \n\nCorning’s long history of extraordinary innovation continues in \nthe context of managing the sensitive balance between the near-term \nalignment of R&D and business objectives, and longer-range \ndiscovery research and new opportunity creation. \n\nOver the past year, we adjusted our R&D spending to align \nwith business conditions. At the same time, we carefully preserved \nour core technology capabilities to ensure our capacity to lead our \nmarkets and create life-changing innovations. \n\nWe have tightened our focus on high-impact projects and have \nstreamlined our processes to develop and commercialize promising \nopportunities more quickly and efficiently. We have emphasized \nour patent processes to ensure strong competitive positions from the \ncritical intellectual assets of our scientific organization. \n\nOur R&D organization is aligned with our operating goals and \nplays a critical role in meeting them. Our scientists and engineers \nare closely linked to our operations and are focused not only on \nnew product development, but also new process development. They \nare discovering new ways to manufacture innovative products with \nlowered cost and increased quality performance. \n\nInnovation is one of Corning’s core Values. It is the everyday \nlanguage and mindset of the company. Even in the face of difficult \neconomic conditions, we will pursue our tradition of developing \nbreakthrough technologies for the markets we serve — from \ntelecommunications to environmental — and will capitalize on the \ncreation of new market opportunities made possible by our strong \ncommitment to research and development. \n\n\n\nC R I T I C A L T E C H N O L O G I E S : C H E M I C A L V A P O R D E P O S I T I O N", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "J A M E S B . F L A W S \n\nV I C E C H A I R M A N \nA N D C H I E F F I N A N C I A L O F F I C E R \n\nWe take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. \n\nWe know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. \n\n\n \n \n \n \n [html]\n
W E N D E L LPW E E K SP R E S I D E N T A N D C H IE F
II of heavest justianes, seau, Attitudes, and severe interventions, and interventions, and interventions, and interventions, and interventions, and interventions, and assessments, and assessments, and assessments, and assessmpAt have analysis of heart of caregiverse of caregivers and interests of caregiverses ( increased services ) and intervention of caregiversing and intervention of caregiversity of caregivers, increased interventions ( increased to caAt 300 ( and 100 mg / dl ) of 100 mg / dl ( 2000 ) Totalisation ( 400 mg / dl ) of 300 mg / dl ) Totalisation ( 400 mg / dl ) or 300 mg / dl ) at 300 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 300 mg / dl ) at 300In retrommentations to not sex on plasmong on a readed excesserver in SW, We leve eliped secon strother to researcher developed second stroting exercise to resecurities and securities. The levels after they were to response of onpine cra
Mineral - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - line - linear - linear - line - linear - line - linear - linear - line - linear - line - linear - line - line - line - line - linear -
", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "The optical components market remains very weak and as \na result our photonic technologies business will need to take \nfurther action to reduce costs. In this challenging environment, \nwe have narrowed our product focus and continue to explore \nseveral strategic options. \n\nhave more than 1,000 scientists and researchers in our \nlaboratories. They are at the heart of our innovation engine, \nand they’re going to stay that way! \n\noperations throughout the world. These actions are key to \nreaching this goal of profitability. The optical fiber and cable \nbusiness remains challenging for the short term, but there is \nstill a great deal of long-term value to be realized in this \nbusiness. We believe our cost structure is coming in line with \nour current reduced revenue expectations. \n\nAnd in investing in our future, we are talking about more than \njust our scientific labs. We are continuing to invest in our \npeople — all 23,200 of them, in plants and offices throughout \nthe world — who are continuing to move us forward toward \nour goals. They have been through a lot during this downturn, \nand we have done our best to set a tone of open, honest \ncommunication, even when the news hasn’t been good. In the \nyear ahead, I’ve told our managers to place special emphasis \non our Value of*The Individual*… knowing that, in the end, \nthe commitment and contribution of all our employees will \ndetermine our success. \nLastly, we are continuing to drive down costs in our adminis- \ntrative and staff functions by standardizing processes and \ncentralizing activities wherever possible. \n\n**L O O K I N G A H E A D**\n\nAnd as we reach that goal of profitability — as a smaller, more \nfocused, yet highly diverse and balanced company — we are \nconfident that you, our shareholders, will experience greater \nreturns on your investments. \nAs a company, we have been through an extraordinarily diffi- \ncult time. We continue to face some formidable challenges. \nBut we are facing them with some equally formidable strengths. \n\n**I N V E S T I N G I N O U R F U T U R E**\n\nWe are one company with a proud history of innovation \nspanning more than 150 years. That legacy has created a \ndiverse business portfolio and strong market leadership. \n\nCorning Incorporated is more than the sum of its parts—much \nmore than a commercial enterprise. \n\nI continue to be extremely excited about the future opportunities \nemerging from our 152-year legacy of scientific innovations. \nWe are concentrating our efforts on high-impact, near-term \ngrowth initiatives with emphasis on our liquid-crystal display, \ndiesel filter, and chemical processing projects. \n\nWe have a time-tested set of Values and we rely on them \nto guide our every action. We also hold dear the pride of \nassociation that all who touch our corporation feel. \nShareholders, customers and employees understand that your \ncorporation has, for more than 150 years, produced useful \nand industry-creating products that have changed the lives \nof mankind. \n\nAnd we are certainly not giving up on optical communica- \ntions. We have the biggest share of the optical fiber market, \nby far, and continue to be the low-cost producer for anyone \nneeding to move information from place to place. So while \nwe’ve scaled back on production of fiber and other optical \nproducts, we certainly believe that they will continue to be \nan important part of our product mix again in the future. The \noptical communications industry is still in its infancy and we \nwill capitalize on our leadership position to grow both our \nearnings and return on shareholder equity. \n\nIn our long history, we’ve always come together in the face \nof a tough challenge — and you can count on us to continue \ndoing exactly that. I thank you for your continued confidence \nand assure you that we will succeed!", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "[html]to shareholders on or about March 12.2003. The proxy statement can also be accessed electronically through the Investorforward - looking statements involve risks and uncertainties that may cause the outcome to be materially different. SuchRelations category of the Corning home page on the Internet at www. corning. com. A summary report of the proceedingsrisks and uncertainties include, but are not limited to :at the annual meeting will be available without charge uponStrategieswritten request to Ms. Denise A. Hauselt, Secretary andStrategy ( malaria )Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,Specificity, prevention, specification, specification, specification, specification, specification, specification, specification, specification, specification, specialized, specification, specialized, specificatiopCorning, NY 14831.ControllinteractionsADD1T10NAL INFORMAT10N— cost reductions,A copy of Corning ’ s 2002 Annual Report on Form 10 - K filed— availability and costs of critical material :with the Securities and Exchange Commission is available— new product development and commerciupon written request to Ms. Denise A. Hauselt, Secretary and— attracting and retaining key personnel,Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,— order activity and demand from major custorCorning, NY 14831. The Annual Report on Form 10 - K can— fluctuations in capital spending by customersalso be accessed electronically through the Investor Relationsin the telecommunications industry and othercategory of the home page on the Internet at :business segments,www. corning. com− financial condition of customers,IN VESTOR TNFORMAT1ON— changes in the mix of sales between premiumInvestment analysts who need additional information mayand non - premium products,contact Mr. Kenneth C. Sofio, Manager of Investor Relations,— facility expansions and new plant start - up costs,Corning Incorporated, HQ - E2 - 25, Corning, NY 14831 ;— adverse intigalison or regulatory developments, includingTelephone 607.974.9000future or pending tax legislation,C 0 M MO N S TOC K— capital resource and cash flow activities,Corning Incorporated common stock is listed on the− capital spending,New York Stock Exchange and the SWX Swiss Exchange.— equity company activities,In addition, it is traded on the Boston, Midwest, Pacific− interest costs,and Philadelphia stock exchanges. Common stock options— acquisition and divestiture activity,are traded on the Chicago Board Options Exchange. The— the rate of technology change,abbreviated ticker symbol for Corning Incorporated is “ GLW.”— the ability to enforce patents,TRANSFER AGENT AND REGISTRAR— product performance issues,Computershare Investor Services LLLC— stock price fluctuations, andP. O. Box A - 3504— other risks detailed in Corning ’ s SEC filings.Chicago, IL 60690 - 3504Neither this report nor any statement contained herein isTelephone : 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. \n\n\n\n\n\n\n\nC O R N I N G C A B L E S Y S T E M S : C A B L E A N D H A R D W A R E", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. \n\n\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Another decision was that we are one company, with one \n\nbrand worldwide. That doesn’t mean pursuing a cookie- \n\ncutter approach, with the same cars or communications \n\neverywhere; instead, it is a declaration that our core values \n\nwill be more carefully defined and articulated in every \n\n\n \n \n \n \n [html]\n
Mean differencese. We have se
My d Infiniti inProperties to the most c
s in the automotive indu
do measureLare our performance
ail sales, nnarket share,
ts, as wellas purchase i
the brandin several cat
PositiveWorld, all of the direction, We ’ reliand
PredictorsTable
brand made standardnagement hazarding your
tity, makingsure that int
gently andadvantageou
Patientseing more strategy
hen thinking about grow
ply protectControl and expectations
Mean differenceand advertising a
Percent controlCharacteristics
Fear, everything we do as a
Interventioneraction with
are and wihat we stand form
Proportion of completedso for everyor
Median deathsRestrength of
f the componentAssets a
ethnis ephemeral. The val
behaviorsthe brand car
Controlsmarketplace.
Nissan focPapany.*
Parameterin
forTable
RegistIge
", + "page_start": 38, + "page_end": 38, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
CORNING TECHNOLOGIES26 ′
Table___
\n\nWe haven’t touched our $2 billion in credit — and we don’t \nintend to. We maintain our access to this credit by keeping our \ndebt-to-capital ratio lower than 60 percent. Our ratio at year \nend was 46.7 percent, well within the compliance range in our \ncredit agreement. And as we execute on our plan to pay down \ndebt, that ratio will drop even further. \n\n**W H A T W E D I D**\n\nSo, armed with full recognition of both our challenges and our \nstrengths, we set out to re-shape the company, adjusting to the \nnew realities of the market. \n\npayments. Beyond severance, our actual cash usage for our \noperations has become very low. We have also added to our \ncash reserves through such actions as our preferred stock \noffering in July, and the sale of our Ohio-based precision lens \nbusiness to 3M late in the year. As a result of all these actions, \nwe were able to end the year with about $2.1 billion in cash \nand short-term investments. \nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: \n\nn TO PRESERVE THE FINANCIAL HEALTH OF THE COMPANY; \nn TO RETURN TO PROFITABILITY IN 2003; \nn TO CONTINUE TO INVEST IN OUR FUTURE. \n\nIn keeping with this strategy, we also continue to pay down \ndebt each quarter. Over the course of 2002 and the first month \nof this year, we repaid about $975 million in debt, including \ncommercial paper. \n\nDuring the course of the year — with a recovery in the \ntelecommunications industry still nowhere in sight — we \nrestructured the company and dramatically lowered our cost \nstructure. Meanwhile, we focused our research and develop- \nment efforts and recommitted ourselves to building those \nbusinesses which presented the most attractive near-term \nopportunities for growth — a large part of which are outside \nthe telecommunications segment. Our diverse portfolio and \nwealth of skills across a wide variety of markets had never \nbeen more important. \n\nAll that said, we are preserving what we believe is a strong \nliquidity position. And our balance sheet will continue to \nimprove in 2003 as we gain more benefits from last year’s \nrestructuring actions. We will continue to maintain our focus \non improving our cash flow and reducing our debt levels as \nwe look ahead to our longer-term goal of regaining an invest- \nment-grade debt rating. \n\nThe plan — painful though it is — is working. \n\n**P R E S E R V I N G O U R F I N A N C I A L H E A L T H**\n\nNow, let’s take a look at our financial picture. Our 2002 sales \nfrom continuing operations were $3.2 billion, a significant \ndecline from 2001 sales of $6.1 billion. Losses in our \ntelecommunications segment and significant restructuring \nand impairment charges drove a net loss of $1.3 billion or \n$1.39 per share in 2002. \n\n**R E T U R N I N G T O P R O F I T A B I L I T Y**\n\nIn 2003, we will focus our energy on the plan to return to \nprofitability. We are on track to reach that goal, and let me \nexplain a few of the reasons why. \n\nDespite these lowered revenues and net loss, I take great \npride in saying that Corning continues to be a financially \nsound company. We developed a three-part plan for achieving \nthis goal: maintaining significant cash balances; using excess \ncash to reduce our debt; and continuing to have access to our \n$2 billion revolving line of credit. And we have achieved \nsignificant success in each of these areas.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_GLW_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", + "target_page": 11, + "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "[html]to shareholders on or about March 12.2003. The proxy statement can also be accessed electronically through the Investorforward - looking statements involve risks and uncertainties that may cause the outcome to be materially different. SuchRelations category of the Corning home page on the Internet at www. corning. com. A summary report of the proceedingsrisks and uncertainties include, but are not limited to :at the annual meeting will be available without charge uponStrategieswritten request to Ms. Denise A. Hauselt, Secretary andStrategy ( malaria )Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,Specificity, prevention, specification, specification, specification, specification, specification, specification, specification, specification, specification, specialized, specification, specialized, specificatiopCorning, NY 14831.ControllinteractionsADD1T10NAL INFORMAT10N— cost reductions,A copy of Corning ’ s 2002 Annual Report on Form 10 - K filed— availability and costs of critical material :with the Securities and Exchange Commission is available— new product development and commerciupon written request to Ms. Denise A. Hauselt, Secretary and— attracting and retaining key personnel,Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,— order activity and demand from major custorCorning, NY 14831. The Annual Report on Form 10 - K can— fluctuations in capital spending by customersalso be accessed electronically through the Investor Relationsin the telecommunications industry and othercategory of the home page on the Internet at :business segments,www. corning. com− financial condition of customers,IN VESTOR TNFORMAT1ON— changes in the mix of sales between premiumInvestment analysts who need additional information mayand non - premium products,contact Mr. Kenneth C. Sofio, Manager of Investor Relations,— facility expansions and new plant start - up costs,Corning Incorporated, HQ - E2 - 25, Corning, NY 14831 ;— adverse intigalison or regulatory developments, includingTelephone 607.974.9000future or pending tax legislation,C 0 M MO N S TOC K— capital resource and cash flow activities,Corning Incorporated common stock is listed on the− capital spending,New York Stock Exchange and the SWX Swiss Exchange.— equity company activities,In addition, it is traded on the Boston, Midwest, Pacific− interest costs,and Philadelphia stock exchanges. Common stock options— acquisition and divestiture activity,are traded on the Chicago Board Options Exchange. The— the rate of technology change,abbreviated ticker symbol for Corning Incorporated is “ GLW.”— the ability to enforce patents,TRANSFER AGENT AND REGISTRAR— product performance issues,Computershare Investor Services LLLC— stock price fluctuations, andP. O. Box A - 3504— other risks detailed in Corning ’ s SEC filings.Chicago, IL 60690 - 3504Neither this report nor any statement contained herein isTelephone : 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "• compliance with debt covenants, availability and cost of credit, changes in interest rates, and trends in debt repayment patterns, \npersonal bankruptcies and bad debt write-offs, and \n• the timing and amounts of share repurchases by the company, if any, or any share issuances by the company, including issuances \nassociated with option exercises or other matters. \n\nThese and other factors, including those factors described in Item 1A: Risk Factors, could affect our financial results and cause actual results \nto differ materially from any forward-looking information we may provide. We undertake no obligation to update or revise any forward-looking \nstatements to reflect subsequent events, new information or future circumstances. \n\n**SEC FILINGS**\nWe file annual, quarterly and current reports, proxy statements and other documents with the Securities and Exchange Commission (“SEC”). \nAll material we file with the SEC is publicly available at the SEC’s Public Reference Room at 100 F Street NE, Washington, DC 20549. You \nmay obtain information on the operation of the Public Reference Room by calling the SEC at 1-800-SEC-0330. In addition, the SEC \nmaintains a website at www.sec.gov that contains reports, proxy and information statements and other information regarding issuers that file \nelectronically with the SEC. \n\n**WEBSITE ACCESS**\nOur website address is Nordstrom.com. Our annual and quarterly reports on Form 10-K and Form 10-Q (including related filings in \neXtensible Business Reporting Language (“XBRL”) format), current reports on Form 8-K, proxy statements, our executives’ statements of \nchanges in beneficial ownership of securities on Form 4 and amendments to those reports filed or furnished pursuant to Section 13(a) or 15 \n(d) of the Securities Exchange Act of 1934, as amended (the “Exchange Act”) are available for free on or through our website as soon as \nreasonably practicable after we electronically file the report with or furnish it to the SEC. Interested parties may also access a webcast of \nquarterly earnings conference calls and other financial events through our website. \n\n**CORPORATE GOVERNANCE**\nWe have a long-standing commitment to upholding a high level of ethical standards. In addition, as the listing standards of the New York \nStock Exchange (“NYSE”) and the rules of the SEC require, we have adopted Codes of Business Conduct and Ethics for our employees, \nofficers and directors (“Codes of Ethics”) and Corporate Governance Guidelines. Our Codes of Ethics, Corporate Governance Guidelines \nand Committee Charters for the Audit, Compensation, Corporate Governance and Nominating, Finance and Technology Committees are \nposted on our website. Any amendments to these documents, or waivers of the requirements they contain, will also be available on our \nwebsite. \n\nFor printed versions of these items or any other inquiries, please contact: \n\nNordstrom Investor Relations \nPO Box 2737 \nSeattle, Washington 98111 \n(206) 303-3200 \ninvrelations@nordstrom.com \n\n**Item 1A. Risk Factors.**\n\nOur business faces many risks. We believe the risks described below outline the items of most concern to us. \n\n**RISKS DUE TO STRATEGIC AND OPERATIONAL FACTORS**", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "J A M E S B . F L A W S \n\nV I C E C H A I R M A N \nA N D C H I E F F I N A N C I A L O F F I C E R \n\nWe take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. \n\nWe know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. \n\n\n \n \n \n \n [html]\n
W E N D E L LPW E E K SP R E S I D E N T A N D C H IE F
II of heavest justianes, seau, Attitudes, and severe interventions, and interventions, and interventions, and interventions, and interventions, and interventions, and assessments, and assessments, and assessments, and assessmpAt have analysis of heart of caregiverse of caregivers and interests of caregiverses ( increased services ) and intervention of caregiversing and intervention of caregiversity of caregivers, increased interventions ( increased to caAt 300 ( and 100 mg / dl ) of 100 mg / dl ( 2000 ) Totalisation ( 400 mg / dl ) of 300 mg / dl ) Totalisation ( 400 mg / dl ) or 300 mg / dl ) at 300 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 300 mg / dl ) at 300In retrommentations to not sex on plasmong on a readed excesserver in SW, We leve eliped secon strother to researcher developed second stroting exercise to resecurities and securities. The levels after they were to response of onpine cra
Mineral - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - line - linear - linear - line - linear - line - linear - linear - line - linear - line - linear - line - line - line - line - linear -
", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "**INVESTOR INFORMATION**\nThe following table represents the high and low trading prices of the Company’s \ncommon stock: **Transfer Agent and**\n**Registrar For Common Stock** **Independent Public**\n**Accountants**\n\nMellon Investor Services LLC \n85 Challenger Road \nRidgefield Park, NJ 07660 \nwww.melloninvestor.com \n1-800-358-2066 \n\nDeloitte & Touche LLP \n3773 Howard Hughes Parkway \nSuite 490, North Tower \nLas Vegas, NV 89109 \n\n\n \n \n \n \n [html]20042003\n
For the years ended December 31,
HighLowHighLow
First Quarter$ 46.18$ 36.71$34.45
$24.09Second Quarter.49.7940.99
35.5026.40Third Quarter50.1439.61
38.5932.03Fourth Quarter73.5049.15
\n\n**Form 10-K**\nA copy of the Company’s annual report on Form 10-K, as filed with the Securities \nand Exchange Commission, will be furnished without charge to any stockholder \nupon written request to: \n\n**Mr. Bryan L. Wright**\nSenior Vice President, Assistant General Counsel and Assistant Secretary \nMGM MIRAGE \n3600 Las Vegas Blvd. South \nLas Vegas, NV 89109 \n\nThe Company’s common stock is listed on the New York Stock Exchange. The \nsymbol is MGG. \n\n**Forward-Looking Statements**\nThis Annual Report contains some forward-looking statements which are subject to \nchange. Actual results may differ materially from those described in any forward- \nlooking statement. Additional information concerning potential factors that could \naffect our future results is included under the caption “Factors that May Affect Our \nFuture Results” in Item 1 of our Annual Report on Form 10-K for the year ended \nDecember 31, 2004. This statement is provided as permitted by the Private \nSecurities Litigation Reform Act of 1995.", + "page_start": 78, + "page_end": 78, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "details of which are described in Note 18 to the financial statements. \n\nShares granted to the Specified Executives during the year are as follows, and were valued at $6.95 each, being their market value (as \ndefined in the Income Tax Assessment Act). \n\n**Granted to:** **Shares:**\n\n\n \n \n \n \n [html]\n
Granted to :Shares :
Gouadain, Jacques Elie6.216
Moore, Paul. Derek5.827
Wasow, Peter Christopher7.770
Wilkinson, Richard John5.827
Wood, Bruce James5.439
Young, Jonathon Terence8.547
\n\n(c) No options were granted by the Company during the year to the Directors or to the Specified Executives. \n\n(d) No options or shares have been granted by the Company since the end of the financial year. \n\n(6) This amount reflects the value during the current reporting period of the 1,000,000 Restricted Shares granted to Mr J C Ellice-Flint in 2000, \nfurther details of which are described in note 18(h) to the financial statements.", + "page_start": 41, + "page_end": 41, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Additional Information**compiled as at 12 March 2015 \n\n**Shareholding**\n\n**Substantial Shareholders**\nThe names of the substantial shareholders in the Company, the number of equity securities to which each substantial \nshareholder and substantial holder’s associates have a relevant interest, as disclosed in substantial holding notices \ngiven to the Company: \n\n**Units**\n305,667 \n3,651,522 \n5,828,311 \n43,133,168 \n 496,432,559 \n 549,351,227 \n\n**% Issued Capital**\n\n**Unlisted Options**\n- \n- \n- \n1 \n 3 \n 4 **Unlisted RSUs**\n1 \n12 \n10 \n20 \n 10 \n 53 0.06 \n0.66 \n1.06 \n7.85 \n 90.37 \n 100.00 \n\n**Name**\n\n**%_**\n6.76 \n5.73 IOOF HOLDINGS LIMITED \nACORN CAPITAL LIMITED \n\n**Distribution of Equity Securities**\n\n**Size of Holding**\n\n**Range**\n1-1,000 \n 1,001-5,000 \n5,001-10,000 \n10,001-100,000 \n100,001-9,999,999 \nTotal **Total Holders**\n673 \n1,196 \n723 \n1,344 \n 240 \n 4,176 \n\nThere are 525 shareholders with less than a marketable parcel of shares. \n\n**Voting Rights**\n*Fully paid ordinary shares*\nAt meetings of members or classes of members: \na) \nb) \n\nEach member entitled to vote may vote in person or by proxy, attorney or representative; \non a show of hands, every person present who is a member or proxy, attorney or representative of a member \nhas one vote; and, \non a poll, every person present who is a member or a proxy, attorney or representative of a member has: c) \n\ni) \n\nfor each fully paid share held by him, or in respect of which he is appointed a proxy, attorney or \nrepresentative, one vote for the share; and, \nfor each partly paid share, only the fraction of one vote which the amount paid (not credited) on \nthe share bears to the total amounts paid and payable on the share (excluding amounts credited) \nsubject to any rights or restrictions attached to any shares or class or classes of shares.", + "page_start": 110, + "page_end": 110, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "[html]FIVE - YEAR SUMMARY OF CONSOLIDATED FINANCIAL RESULTSYears Ended December 31IFRSCanadian GAAP( In millions of dollars, except per share amounts, percentages and ratios )201320122011202009Income and Cash Flow :RevenueWireless$ 7.270$7.280$7.138$ 6.97$6.685Cable, 4753.3583.3093.1903.074RBS374351405452446Media, 7041.6201.6111.4611.407Corporate items and intercompany eliminations( 117 )( 123117 *177( 75 )112.706$12.486$2.346$ 11.99$1.537Adjusted operating profit 1Wireless$ 3.157$3.063$3.036$ 3.17$3.067Cable1.7181.6051.5491.4191.300R8S10689864035Median16119018013119Corporate items and intercompany eliminations( 149 )( 113_ ( 112 )__ ( 95 %U114 )__ $ _ 4.993Statement4.834$4.7394.668$ _4.407Net income from continuing operations$ 1.669$1.725$1.590$ 1.53$1.499Net income$ 1.669$1.693$1.5631.502$1.478Adjusted net income from continuing operations 1$ 1.769S1.781$1.736$ 1.70S1.569Pre - tax free cash flow 1$ _044$2.029$1.973S2.181$1.919Property, plant and equipment expenditures$ _240$2.142$2.127S1.821$1.841Earnings per share from continuing operations8asic$", + "page_start": 90, + "page_end": 90, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**SHAREHOLDER INFORMATION**\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most \nfinancial listings as “AppliedIndlTch.” \n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**BB&T CAPITAL MARKETS** **KEYBANC CAPITAL MARKETS** **STEPHENS INC.**\nHolden Lewis, 703/471-3894 Jeffrey D. Hammond, 216/689-0236 Matt Duncan, 501/377-3723 \n\n**CJS SECURITIES** **SIDOTI & CO.** **WELLS FARGO SECURITIES, LLC**\nJonathan Tanwanteng, 914/287-7600 Joseph Mondillo, 212/894-3339 Allison Poliniak-Cusic, 212/214-5062 \n\n**CLEVELAND RESEARCH COMPANY** **GREAT LAKES REVIEW – Division of** **WUNDERLICH SECURITIES**\nAdam Uhlman, 216/649-7241 **Wellington Shields & Co.** Brent D. Rakers, 901/251-2236 \nElliott Schlang, 216/767-1340 \n\n**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial \nTechnologies, Inc. shares and all \ncorrespondence regarding address change \ninformation, duplicate mailings, missing \ncertificates, failure to receive dividend \nchecks in a timely manner or to participate \nin the Company’s direct stock purchase \nprogram should be directed to the \nCompany’s transfer agent and registrar: \n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n250 Royall Street \nCanton, MA 02021 \n800/988-5291 \n\n**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. \n\n**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group \n\n(Performance Results from 7/1/2007 through 6/30/2012) \n\nAssumes $100 invested at the close of trading 6/30/07 in \nApplied Industrial Technologies, Inc. common stock, Standard \n& Poor’s 500, and Peer Group. \n\nCumulative total return assumes reinvestment of dividends. \n\nThe returns of the companies in the Peer Group are weighted \nbased on the companies’ relative stock market capitalization. \n\nPeer Group companies selected on a line-of-business basis \ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine \nParts Company; W. W. Grainger, Inc.; Kaman Corporation; \nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and \nWESCO International, Inc.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "How many employees did Corning company count at the end of 2002 ?", + "target_page": 5, + "target_passage": "We are continuing to invest in our people — all 23,200 of them", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. \n\n\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. \n\n\n\n\n\n\n\nC O R N I N G C A B L E S Y S T E M S : C A B L E A N D H A R D W A R E", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "J A M E S B . F L A W S \n\nV I C E C H A I R M A N \nA N D C H I E F F I N A N C I A L O F F I C E R \n\nWe take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. \n\nWe know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. \n\n\n \n \n \n \n [html]\n
W E N D E L LPW E E K SP R E S I D E N T A N D C H IE F
II of heavest justianes, seau, Attitudes, and severe interventions, and interventions, and interventions, and interventions, and interventions, and interventions, and assessments, and assessments, and assessments, and assessmpAt have analysis of heart of caregiverse of caregivers and interests of caregiverses ( increased services ) and intervention of caregiversing and intervention of caregiversity of caregivers, increased interventions ( increased to caAt 300 ( and 100 mg / dl ) of 100 mg / dl ( 2000 ) Totalisation ( 400 mg / dl ) of 300 mg / dl ) Totalisation ( 400 mg / dl ) or 300 mg / dl ) at 300 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ( 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 400 mg / dl ) at 300 mg / dl ) at 300In retrommentations to not sex on plasmong on a readed excesserver in SW, We leve eliped secon strother to researcher developed second stroting exercise to resecurities and securities. The levels after they were to response of onpine cra
Mineral - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - linear - line - linear - linear - line - linear - line - linear - linear - line - linear - line - linear - line - line - line - line - linear -
", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": ": 800.255.0461furnished in connection with any offering of securities or forWebsite : www. computershare. comthe purpose of promoting or influencing the sale of securities.CHANGE of ADDRESSCorning is an equal opportunity employer.Report change of address to ComputershareCorning is an equal opportunity employer.Investor Services at the above address.Printed in USAIN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003PricewaterhouseCoopers LLP1301 Avenue of the AmericasNew York, NY 10019Corning IncorporatedOne Riverfront PlazaMean ( SD )Corning, NY 14831 - 000.60.97.9000WWW. Cwww. corning. com02BR24601EN", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
CORNING TECHNOLOGIES26 ′
Table___
\n\nWe haven’t touched our $2 billion in credit — and we don’t \nintend to. We maintain our access to this credit by keeping our \ndebt-to-capital ratio lower than 60 percent. Our ratio at year \nend was 46.7 percent, well within the compliance range in our \ncredit agreement. And as we execute on our plan to pay down \ndebt, that ratio will drop even further. \n\n**W H A T W E D I D**\n\nSo, armed with full recognition of both our challenges and our \nstrengths, we set out to re-shape the company, adjusting to the \nnew realities of the market. \n\npayments. Beyond severance, our actual cash usage for our \noperations has become very low. We have also added to our \ncash reserves through such actions as our preferred stock \noffering in July, and the sale of our Ohio-based precision lens \nbusiness to 3M late in the year. As a result of all these actions, \nwe were able to end the year with about $2.1 billion in cash \nand short-term investments. \nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: \n\nn TO PRESERVE THE FINANCIAL HEALTH OF THE COMPANY; \nn TO RETURN TO PROFITABILITY IN 2003; \nn TO CONTINUE TO INVEST IN OUR FUTURE. \n\nIn keeping with this strategy, we also continue to pay down \ndebt each quarter. Over the course of 2002 and the first month \nof this year, we repaid about $975 million in debt, including \ncommercial paper. \n\nDuring the course of the year — with a recovery in the \ntelecommunications industry still nowhere in sight — we \nrestructured the company and dramatically lowered our cost \nstructure. Meanwhile, we focused our research and develop- \nment efforts and recommitted ourselves to building those \nbusinesses which presented the most attractive near-term \nopportunities for growth — a large part of which are outside \nthe telecommunications segment. Our diverse portfolio and \nwealth of skills across a wide variety of markets had never \nbeen more important. \n\nAll that said, we are preserving what we believe is a strong \nliquidity position. And our balance sheet will continue to \nimprove in 2003 as we gain more benefits from last year’s \nrestructuring actions. We will continue to maintain our focus \non improving our cash flow and reducing our debt levels as \nwe look ahead to our longer-term goal of regaining an invest- \nment-grade debt rating. \n\nThe plan — painful though it is — is working. \n\n**P R E S E R V I N G O U R F I N A N C I A L H E A L T H**\n\nNow, let’s take a look at our financial picture. Our 2002 sales \nfrom continuing operations were $3.2 billion, a significant \ndecline from 2001 sales of $6.1 billion. Losses in our \ntelecommunications segment and significant restructuring \nand impairment charges drove a net loss of $1.3 billion or \n$1.39 per share in 2002. \n\n**R E T U R N I N G T O P R O F I T A B I L I T Y**\n\nIn 2003, we will focus our energy on the plan to return to \nprofitability. We are on track to reach that goal, and let me \nexplain a few of the reasons why. \n\nDespite these lowered revenues and net loss, I take great \npride in saying that Corning continues to be a financially \nsound company. We developed a three-part plan for achieving \nthis goal: maintaining significant cash balances; using excess \ncash to reduce our debt; and continuing to have access to our \n$2 billion revolving line of credit. And we have achieved \nsignificant success in each of these areas.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "2003 2002 \n\n$ 62,803 $ 59,533 $ 57,605 $ 51,447 $ 49,917 \n\n4,892 4,065 4,262 2,663 2,128 \n\n2,589(b) 9,754(c) 5,057 2,792 2,293 \n\n60,050 60,807 65,555 63,690 64,640 \n\n4,287 10,337 17,125 7,400 10,417 \n\n2.66 2.18 1.88 1.25 .81 \n\n1.39(b) 4.30(c) 2.75 1.31 .87 \n\n.24(a) — — — — \n\n1,839 1,863 2,272 2,135 2,631 \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) \n\nRevenues \n\nIncome from continuing operations \n\nNet income \n\nTotal assets \n\nLong-term debt \n\nIncome from continuing operations, per diluted share \n\nNet income per diluted share \n\nCash dividends per common share \n\nAverage diluted shares outstanding \n\n(a) Dividends on outstanding common shares paid in the 3rd and 4th quarter at $.12 per share (see Note 6) \n(b) Includes a $1.6 million after-tax goodwill impairment charge ($ .88 per diluted share) (see Note 2) \n(c) Includes a $5.5 million after-tax gain ($ 2.42 per diluted share) from discontinued operations (see Note 3) \n\n126 354 \n\n1,879 1,403 \n\n4,746 4,384 \n\n$ 11,643 $ 10,206 $ 10,857 $ 8,359 $ 7,101 \n\n1,839 1,863 2,272 2,135 2,631 \n\n$ 6.33 $ 5.48 $ 4.78 $ 3.92 $ 2.70 \n\nEBITDA Per Diluted Share From Continuing Operations \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) 2003 2002 \n\nIncome from continuing operations $ 4,892 $ 4,065 $ 4,262 $ 2,663 $ 2,128 \n\nAdd: \n\nInterest expense (income), net \n\nIncome tax expense \n\nDepreciation and amortization \n\nEBITDA \n\nAverage diluted shares outstanding \n\nEBITDA per Diluted Share from Continuing Operations \n\nEBITDA per diluted share from continuing operations, a non-GAAP financial measure, is computed by the Company as EBITDA divided by weighted average diluted shares outstanding. \nThe company computes EBITDA by adding income from continuing operations, net interest expense/(income), income tax expense, depreciation and amortization. \n\nReturn on Equity \n\n(IN THOUSANDS) 2003 1999 \n\nNet Income $ 5,057 $ 2,293 \n\nStockholders’ Equity $ 41,691 $ 49,369 \n\nReturn on Equity 12% 5% \n\nReturn on equity, a non-GAAP financial measure, is computed by the Company by dividing annual net income by the Company’s beginning \nof the year stockholders’ equity balance as shown on its balance sheet.", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S C I E N C E & T E C H N O L O G Y \n\nCorning’s long history of extraordinary innovation continues in \nthe context of managing the sensitive balance between the near-term \nalignment of R&D and business objectives, and longer-range \ndiscovery research and new opportunity creation. \n\nOver the past year, we adjusted our R&D spending to align \nwith business conditions. At the same time, we carefully preserved \nour core technology capabilities to ensure our capacity to lead our \nmarkets and create life-changing innovations. \n\nWe have tightened our focus on high-impact projects and have \nstreamlined our processes to develop and commercialize promising \nopportunities more quickly and efficiently. We have emphasized \nour patent processes to ensure strong competitive positions from the \ncritical intellectual assets of our scientific organization. \n\nOur R&D organization is aligned with our operating goals and \nplays a critical role in meeting them. Our scientists and engineers \nare closely linked to our operations and are focused not only on \nnew product development, but also new process development. They \nare discovering new ways to manufacture innovative products with \nlowered cost and increased quality performance. \n\nInnovation is one of Corning’s core Values. It is the everyday \nlanguage and mindset of the company. Even in the face of difficult \neconomic conditions, we will pursue our tradition of developing \nbreakthrough technologies for the markets we serve — from \ntelecommunications to environmental — and will capitalize on the \ncreation of new market opportunities made possible by our strong \ncommitment to research and development. \n\n\n\nC R I T I C A L T E C H N O L O G I E S : C H E M I C A L V A P O R D E P O S I T I O N", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "YEAR ENDED DECEMBER 31, \n2003 2002 2001 \n\n914 $ 1,081 $ 1,520 \n\n32 (44) 188 \n\n946 1,037 1,708 \n\n912 327 74 \n\n21 39 21 \n\n933 366 95 \n\n$ 1,879 $ 1,403 $ 1,803 \n\n\n \n \n \n \n [html]\n
D EFERRE D TAX ASSETS :
Patents and goodwill$654$1.041
Benefit plans492639
Inventories374342
Tax credits169451
Other3960
Total deferred tax assets$1.728$2.555
DEFERRED TAX LUABILUTIES :
Property, plant and equipment$3.838$3.253
Pensions626362
Other15
Total deferred tax liabilities$4.464$3.630
Net deferred tax liability$2.736$1.097
", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Capital additions for 2002 include $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\n**Liquidity and Capital Resources**\n\nThe major components of changes in cash Öows for the years ended December 31, 2004, 2003 and 2002 \nare discussed below. \n\n*Cash Flows From Operating Activities.*Cash Öows provided by operating activities were $666.3 million, \n$600.5 million and $569.7 million for the years ended December 31, 2004, 2003 and 2002, respectively. The \nchanges in cash provided by operating activities during the periods are due to the expansion of our business, \nthe timing of payments received for accounts receivable, and the timing of payments for accounts payable and \nincome taxes. \n\nIn December 2003, we received written approval from the Internal Revenue Service to exclude probable \nexpansion airspace from our calculation of landÑll amortization, depletion, and Ñnal capping, closure and post- \nclosure costs for tax purposes. As a result of this change, we recorded a tax receivable of approximately \n$48.0 million which was collected or used to oÅset taxes payable during the year ended December 31, 2004. \nAlso during the year ended December 31, 2004, we collected a $23.0 million note receivable associated with a \ndivested business. \n\nWe expect our cash Öow from operating activities during 2005 to be lower than 2004 and 2003 because of \nhigher tax payments due to the reversal of bonus depreciation and several one-time items that beneÑted \nprevious periods, including utilization of a tax receivable and the collection of a note receivable during 2004, \nand an increase in self-insurance reserves during 2003. \n\nWe use cash Öow from operations to fund capital expenditures, acquisitions, share repurchases, dividend \npayments and debt repayments. \n\n*Cash Flows Used In Investing Activities.*Cash used in investing activities was $206.7 million, \n$552.4 million and $316.3 million for the years ended December 31, 2004, 2003 and 2002, respectively, and \nconsists primarily of cash used for capital additions and business acquisitions for all the periods presented and \ncash provided by restricted marketable securities in 2004. Capital additions were $283.8 million, $273.2 mil- \nlion and $258.6 million during the years ended December 31, 2004, 2003 and 2002, respectively. Cash used to \nacquire businesses, net of cash acquired, was $47.3 million, $51.5 million and $55.8 million during the years \nended December 31, 2004, 2003 and 2002, respectively. \n\nThe increase in restricted marketable securities during 2003 consists of amounts transferred from \nunrestricted cash for Ñnancial guarantees. In 2004, we liquidated a portion of these marketable securities and \nused the proceeds to repay the $225.0 million of public notes. We used letters of credit to replace Ñnancial \nguarantees secured by marketable securities that were liquidated. \n\nWe intend to Ñnance capital expenditures and acquisitions through cash on hand, cash Öows from \noperations, our revolving credit facility, tax-exempt bonds and other Ñnancings. We expect to use primarily \ncash for future business acquisitions. \n\n*Cash Flows Used In Financing Activities.*Cash Öows used in Ñnancing activities was $437.3 million, \n$70.4 million and $128.0 million for the years ended December 31, 2004, 2003 and 2002, respectively, and \nprimarily include proceeds from issuances of tax-exempt bonds, repayments of debt and repurchases of \ncommon stock under our stock repurchase program. Dividends paid were $46.0 million and $19.0 million \nduring 2004 and 2003, respectively. In 2004, repayments of debt include the liquidation of $225.0 million of \npublic notes.", + "page_start": 53, + "page_end": 53, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "What is the shortcut to mute myself in MS teams ?", + "target_page": 3, + "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Figure 5-32 Turning the Identify LED off \n\nAlternatively, you can use the command-line interface (CLI) to get the same results. Enter the \nfollowing commands in this sequence: \n\n1. Enter**svctask chenclosure -identify yes 1**(or enter**chenclosure -identify yes 1**). \n2. Enter**svctask chenclosure -identify no 1**(or enter**chenclosure -identify no 1**). \n\nTo view internal components (components that cannot be seen from the outside), review the \nbottom of the GUI underneath where the list of external components is displayed. You can \nselect any of these components and details show in the right pane, as with the external \ncomponents.", + "page_start": 171, + "page_end": 171, + "source_file": "sg247938.pdf" + }, + { + "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**11.7.11 Starting Metro Mirror/Global Mirror consistency group**\n\nUse the**startrcconsistgrp**command to start an MM/GM consistency group. You can issue \nthis command only to a consistency group that is connected. \n\n\n \n \n \n \n [html]Stopping Metro Mirror / Global Mirror consistency groupUse the steproceesistgry command to stop the copy process for an MM / GM consistency group. You can also use this command to enable write access to the auxiliary volumes in the group if the group is in a consistent state.If the consistency group is in an inconsistent state, any copy roperation stops and does not resume until you issue the atartrocaeaed starp command. Wite activity is no longer copied from the master to the auxiliary volunsel that belong itWhen a consistency group is in a comsistent state ( for example, in the Cens is ' scent ' scopeed, Cens ' s toter ' scored ; Synchronized, or Corea ' s ctero ' scorected databally, you cabs use the → access parameter with the stercess theres to tenDeleting Metro Mirror / Global Mirror relationshipUse the recrel at leaship command to delete the relationship that is specified. Deleting a relationship deletes only the logical relationship between the two volumes. It does not affect the volumes themselves.II the relationship is discorrected at the time that the command is issued, the relationship is deleted only on the system on which the command is being run. When the systems recommed, the relationship is automatically deleted on the othe oAlternatively, if the systems are disconnected and you sill want to remove the relationship on both systems, you can issue the mercrel at least keeding command independently on both of the systems.A relationship cannot be deleted if it is part of a consistency group. You must first remove the relationship from the consistency group.If you delete an inconsistent relationship, the auxiliary volume becomes accessible even though it is still inconsistent. This situation is the one case in which MM / GM does not inhibit\n
\n\n**11.7.14 Deleting Metro Mirror/Global Mirror consistency group**\n\n\n \n \n \n \n [html]\n
Use the rerccees ’ stgry command to delete an MM / GM consistency group. This command deletes the specified consistency group.
\n\n**547** Chapter 11. Advanced Copy Services", + "page_start": 568, + "page_end": 568, + "source_file": "sg247938.pdf" + }, + { + "text": "Use the management GUI to manage and service your system. Select**Monitoring**→**Events**\nto list events that should be addressed and maintenance procedures that walk you through \nthe process of correcting problems. Information in the Events window can be filtered in three \nways: \n\n(cid:2) Recommended Actions \n\nShows only the alerts that require attention. Alerts are listed in priority order and should be \nresolved sequentially by using the available fix procedures. For each problem that is \nselected, you can perform the following tasks: \n\n– Run a fix procedure \n– View the properties \n\n(cid:2) Unfixed Messages and Alerts \n\nDisplays only the alerts and messages that are not fixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties \n\n(cid:2) Show All \n\nDisplays all event types whether they are fixed or unfixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties \n\nSome events require a certain number of occurrences in 25 hours before they are displayed \nas unfixed. If they do not reach this threshold in 25 hours, they are flagged as*expired*. \nMonitoring events are below the coalesce threshold, and are usually transient. \n\n**Important:**The management GUI is the primary tool that is used to*operate*and*service*\nyour system. Real-time*monitoring*should be established by using SNMP traps, email \nnotifications, or syslog messaging on an automatic manner. \n\n**13.6.1 Managing event log**\n\nRegularly check the status of the system using the management GUI. If you suspect a \nproblem, first use the management GUI to diagnose and resolve the problem. \n\nUse the views that are available in the management GUI to verify the status of the system, the \nhardware devices, the physical storage, and the available volumes by completing the \nfollowing steps: \n1. Click**Monitoring**→**Events**to see all problems that exist on the system (see Figure 13-34 \non page 704).", + "page_start": 724, + "page_end": 724, + "source_file": "sg247938.pdf" + }, + { + "text": "**11.7.8 Changing Metro Mirror/Global Mirror consistency group**\n\nUse the**chrcconsistgrp**command to change the name of an MM/GM Consistency Group. \n\n**11.7.9 Starting Metro Mirror/Global Mirror relationship**\n\nUse the**startrcrelationship**command to start the copy process of an MM/GM relationship. \n\nWhen the command is issued, you can set the copy direction if it is undefined. Optionally, you \ncan mark the auxiliary volume of the relationship as clean. The command fails if it is used as \nan attempt to start a relationship that is already a part of a consistency group. \n\nYou can issue this command only to a relationship that is connected. For a relationship that is \nidling, this command assigns a copy direction (master and auxiliary roles) and begins the \ncopy process. Otherwise, this command restarts a previous copy process that was stopped \nby a**stop**command or by an I/O error. \n\nIf the resumption of the copy process leads to a period when the relationship is inconsistent, \nyou must specify the**-force**parameter when the relationship is restarted. This situation can \narise if, for example, the relationship was stopped and then further writes were performed on \nthe original master of the relationship. \n\nThe use of the**-force**parameter here is a reminder that the data on the auxiliary becomes \ninconsistent while resynchronization (background copying) takes place. Therefore, this data is \nunusable for Disaster Recovery purposes before the background copy completes. \n\nIn the Idling state, you must specify the master volume to indicate the copy direction. In \nother connected states, you can provide the**-primary**argument, but it must match the \nexisting setting. \n\n**11.7.10 Stopping Metro Mirror/Global Mirror relationship**\n\nUse the**stoprcrelationship**command to stop the copy process for a relationship. You can \nalso use this command to enable write access to a consistent auxiliary volume by specifying \nthe**-access**parameter. \n\nThis command applies to a stand-alone relationship. It is rejected if it is addressed to a \nrelationship that is part of a Consistency Group. You can issue this command to stop a \nrelationship that is copying from master to auxiliary. \n\nIf the relationship is in an inconsistent state, any copy operation stops and does not resume \nuntil you issue a**startrcrelationship**command. Write activity is no longer copied from the \nmaster to the auxiliary volume. For a relationship in the ConsistentSynchronized state, this \ncommand causes a Consistency Freeze. \n\nWhen a relationship is in a consistent state (that is, in the ConsistentStopped, \nConsistentSynchronized, or ConsistentDisconnected state), you can use the**-access**\nparameter with the**stoprcrelationship**command to enable write access to the auxiliary \nvolume.", + "page_start": 567, + "page_end": 567, + "source_file": "sg247938.pdf" + }, + { + "text": "*Figure 11-2 System Parameters window with User Exit Logging selected*\n\nSelect the options for the system logging and set up the exit. The sample in Example 11-7 \nroutes the messages to the system log with the write to operator (WTO) macro. \n\n\n \n \n \n \n [html]\n
ARSLOGt1t1e ' Issue a message to sys1og '00010000********************************************************************************************************************************************************************************************************
********************************************************************************************************************************************************************************************************00020000**
00030000**00040000
*==> 0D / 390- 5655 - H39 <=−*
00050007**00060000
*Module Name :ARSL0G*
00070000**00080000
*Descriptive Name :Issue a message to sys1og*
00090000**00100000
*Status :Vers1on 7 Release 2*
00110000**00120000
*Function :Th1s routine 1ssues a nessage to the SYSL0G*
00130000**00140000
*Copyri ght :5655 - H39 ( C ) Cogyr1ght 1BM Corp. 2013 * 00150007*
L1censed Mater1a1s - Property of 1BM*00160000*
See Copyr - ight 1nstruct1ons.*00170000*
*00180000*Notes :
*00190000**
00200000*Restrictions :None
*00210000**
00220000
", + "page_start": 277, + "page_end": 277, + "source_file": "sg246915.pdf" + }, + { + "text": "You can navigate directly to the events menu by clicking**View All Events**option or see each \nevent message separately by clicking the**Details**icon of the specific message, analyze the \ncontent, and eventually run the suggested fix procedure (see Figure 5-13). \n\nFigure 5-13 External storage connectivity loss \n\n**Running jobs and suggested tasks**\nThe middle icon in the notification area provides an overview of currently running tasks that \nare triggered by administrator. It also includes the suggested tasks that recommend that \nusers perform specific configuration actions. \n\nIn the example that is shown in Figure 5-14 on page 141, we did not yet define any hosts \nattached to the systems. Therefore, the system suggests that we do so and offers us direct \naccess to the associated host menu. Click**Run Task**to define the host according to the \nprocedure that is explained in Chapter 8, “Hosts” on page 317. If you do not want to define \nany host now, click**Not Now**and the suggestion message disappears.", + "page_start": 161, + "page_end": 161, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I make a channel visible to an invited member ?", + "target_page": 4, + "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "2. A list of all the hosts is displayed. The function icons indicate whether the host is Fibre \n\nChannel, iSCSI, or SAS attached. The port details of the selected host are shown to the \nright. You can add a new host object by clicking**Add Host**. If you click**Actions**(see \nFigure 8-51), the tasks that are described in “Modifying Volume Mappings” on page 346 \ncan be selected. \n\nFigure 8-51 Ports by Host actions \n\n**Adding a Fibre Channel or iSCSI host port**\nTo add a host port, complete the following steps: \n\n1. Select the host. \n\n2. Click**Add**(see Figure 8-52) and select one of the following options: \n\na.**Fibre Channel Port**(see “Adding a Fibre Channel port” on page 363) \nb. **iSCSI Port**(see “Adding an iSCSI host port” on page 366)", + "page_start": 383, + "page_end": 383, + "source_file": "sg247938.pdf" + }, + { + "text": "**Creating Fibre Channel hosts**\nTo create a Fibre Channel host, complete the following steps: \n\n1. Rescan the SAN on Storwize V7000 by using the**detectmdisk**command (see \nExample 8-14). \n\nExample 8-14 Rescanning the SAN \n\nIBM_Storwize:ITSO-V7000:superuser>**detectmdisk**\n\n**Note:**The**detectmdisk**command does not return any response. \n\nIf the zoning was implemented correctly, any new WWPNs are discovered by the Storwize \nV7000 system after running the**detectmdisk**command. \n\n2. List the candidate WWPNs and identify the WWPNs belonging to the new host, as shown \nin Example 8-15. \n\nExample 8-15 Available WWPNs \n\nIBM_Storwize:ITSO-V7000:superuser>lsfcportcandidate \nfc_WWPN \n2100000E1E09E3E9 \n2100000E1E30E5E8 \n2100000E1E30E60F \n2100000E1EC2E5A2 \n2100000E1E30E597 \n2100000E1E30E5EC \n\n3. Run the**mkhost**command with the required parameters, as shown in Example 8-16. \n\nExample 8-16 Host creation \n\nIBM_Storwize:ITSO-V7000:superuser>**mkhost -name ITSO-VMHOST-03 -fcwwpn**\n**2100000E1E30E597:2100000E1E30E5EC**\nHost, id [3], successfully created \nIBM_Storwize:ITSO-V7000:superuser> \n\n**Creating iSCSI hosts**\n\nBefore you create an iSCSI host in Storwize V7000, the iSCSI qualified name (IQN) address \nof the host must be known. See your host operating system-specific documentation to find the \nIQN of the host. \n\nCreate a host by completing the following steps: \n\n1. Create the iSCSI host by using the**mkhost**command (see Example 8-17). \n\nExample 8-17 Creating an iSCSI host by using the mkhost command \n\nIBM_Storwize:ITSO-V7000:superuser>**mkhost -iscsiname**\n**iqn.1994-05.com.redhat:e6ff477b58 -name RHEL-Host-06**\nHost, id [4], successfully created \nIBM_Storwize:ITSO-V7000:superuser> \n\n2. The iSCSI host can be verified by using the**lshost**command, as shown in Example 8-18. \n\nExample 8-18 Verifying the iSCSI host by using the lshost command \n\nIBM_Storwize:ITSO-V7000:superuser>lshost 4", + "page_start": 395, + "page_end": 395, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 8-3 Open the host window \n\n2. To create a host, click**Add Host**. If you want to create a Fibre Channel host, continue with \n“Creating Fibre Channel hosts” on page 329. To create an iSCSI host, go to “Creating \niSCSI hosts” on page 331.", + "page_start": 349, + "page_end": 349, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 8-6 Host type selection \n\n6. Click**Add**to create the host object. \n\n7. Click**Close**to return to the host window. Repeat these steps for all of your Fibre Channel \nhosts. Figure 8-7 shows the**All Hosts**window after creating a second host. \n\n\n \n \n \n \n [html]\n
theTabletheDefinitionContainers----
NameStatusHost Type# of PortsHost PlangingsHost Claster IDHost Cluster Norm
Worldway - than - title✓ 0rderSerurc2n
\n\nAfter you complete the adding of Fibre Channel hosts, see Chapter 7, “Volumes” on page 241 \nto create volumes and map them to the created hosts. \n\n**Creating iSCSI hosts**\nWhen creating an iSCSI attached host, consider the following points: \n\n(cid:2) iSCSI IP addresses can fail over to the partner node in the I/O Group if a node fails. This \ndesign reduces the need for multipathing support in the iSCSI host. \n\n(cid:2) The IQN of the host is added to a Storwize V7000 host object in the same way that you \nadd FC WWPNs. \n\n(cid:2) Host objects can have WWPNs and IQNs.", + "page_start": 352, + "page_end": 352, + "source_file": "sg247938.pdf" + }, + { + "text": "**Adding a Fibre Channel port**\nTo add a Fibre Channel port, complete the following steps: \n\n1. Click**Fibre Channel Port**(see Figure 8-52 on page 362). The Add Fibre Channel Ports \nwindow opens (see Figure 8-53). \n\nFigure 8-53 Add Fibre Channel Ports window \n\n2. Click the drop-down menu to display a list of all discovered Fibre Channel WWPNs. If the \nWWPN of your host is not available in the menu, enter it manually or check the SAN \nzoning to ensure that connectivity is configured. Then, rescan storage from the host.", + "page_start": 384, + "page_end": 384, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.1.4 How to subscribe to the EDP Newsletter**\n\nOn the Portal Home Page: \n\n‐ **Either Click on the “Newsletter” item in the page header:**\n\nThen, on the “Newsletter subscriptions” page: \n\n•**Enter your E-Mail address**\n\n•**Click on the button “Subscribe”**\n\nThe system will display a notification message after successful subscription.", + "page_start": 18, + "page_end": 18, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "5. Ensure that the primary host attach WWPNs (virtual WWPNs) now allow host traffic, as \nshown in**bold**in Example 8-7. \n\nExample 8-7 Host attach WWPNs (virtual WWPNs) permitting host traffic \n\nIBM_2145:ITSO-V7000:superuser>lstargetportfc \nid WWPN WWNN port_id owning_node_id current_node_id nportid host_io_permitted virtualized protocol \n1 500507680140A288 500507680100A288 1 1 1 010A00 yes no scsi \n**2 500507680142A288 500507680100A288 1 1 1 010A02 yes yes scsi**\n**3 500507680144A288 500507680100A288 1 1 1 010A01 yes yes nvme**\n4 500507680130A288 500507680100A288 2 1 1 010400 yes no scsi \n**5 500507680132A288 500507680100A288 2 1 1 010401 yes yes scsi**\n**6 500507680134A288 500507680100A288 2 1 1 010402 yes yes nvme**\n7 500507680110A288 500507680100A288 3 1 1 010500 yes no scsi \n**8 500507680112A288 500507680100A288 3 1 1 010501 yes yes scsi**\n**9 500507680114A288 500507680100A288 3 1 1 010502 yes yes nvme**\n10 500507680120A288 500507680100A288 4 1 1 010A00 yes no scsi \n**11 500507680122A288 500507680100A288 4 1 1 010A02 yes yes scsi**\n**12 500507680124A288 500507680100A288 4 1 1 010A01 yes yes nvme**\n49 500507680C110009 500507680C000009 1 2 2 010500 yes no scsi \n**50 500507680C150009 500507680C000009 1 2 2 010502 yes yes scsi**\n**51 500507680C190009 500507680C000009 1 2 2 010501 yes yes nvme**\n52 500507680C120009 500507680C000009 2 2 2 010400 yes no scsi \n**53 500507680C160009 500507680C000009 2 2 2 010401 yes yes scsi**\n**54 500507680C1A0009 500507680C000009 2 2 2 010402 yes yes nvme**\n55 500507680C130009 500507680C000009 3 2 2 010900 yes no scsi \n**56 500507680C170009 500507680C000009 3 2 2 010902 yes yes scsi**\n**57 500507680C1B0009 500507680C000009 3 2 2 010901 yes yes nvme**\n58 500507680C140009 500507680C000009 4 2 2 010900 yes no scsi \n**59 500507680C180009 500507680C000009 4 2 2 010901 yes yes scsi**\n**60 500507680C1C0009 500507680C000009 4 2 2 010902 yes yes nvme**\nIBM_2145:ITSO-V7000:superuser> \n\n6. Add the primary host attach ports (virtual WWPNs) to your host zones but do not \n\nremove the Storwize V7000 WWPNs that is in the zones. Example 8-8 shows a host zone \nto the Primary Port WWPNs of the Storwize V7000 nodes. \n\nExample 8-8 Legacy host zone \n\nzone: WINDOWS_HOST_01_IBM_ITSOV7000 \n 10:00:00:05:1e:0f:81:cc \n 50:05:07:68:01:40:A2:88 \n 50:05:07:68:0C:11:00:09 \n\nExample 8-9 shows that we added the primary host attach ports (virtual WWPNs) to \nour example host zone to allow us to change the host without disrupting its availability. \n\nExample 8-9 Transitional host zone \n\nzone: WINDOWS_HOST_01_IBM_ITSOV7000 \n 10:00:00:05:1e:0f:81:cc \n 50:05:07:68:01:40:A2:88 \n 50:05:07:68:0C:11:00:09 \n**50:05:07:68:01:42:A2:88**\n**50:05:07:68:0C:15:00:09**\n\n7. With the transitional zoning active in your fabrics, ensure that the host is using the new \nNPIV ports for host I/O. Example 8-10 shows the before and after pathing for our host. \nNotice that the select count now increases on the new paths and has stopped on the old \npaths. \n\nExample 8-10 Host device pathing: before and after \n\nC:\\Program Files\\IBM\\SDDDSM>datapath query device", + "page_start": 346, + "page_end": 346, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I notify a collegue mentionned in a chat message in Teams ?", + "target_page": 5, + "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. \n\nBy default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. \n\nTo**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. \n\n\n\n\n\n\n\n**Teams**\nA**team**is a broad group of people that work together to get something \ndone. You can choose who is part of the team, and people can only access \nshared content by invitation. All teams are created with an associated \nGeneral channel that includes all team members by default. \n\n\n\n\n\n\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM \n\nTo**share a file**select “Attach” under the box where you type messages, select \nthe file location and then the file you want. Depending on the location of the file, \nyou’ll get options for uploading a copy, sharing a link, or other ways to share. \n\n**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) \n\n\n\nAN \n\n\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "• Always use a relevant and descriptive subject line. \n\nE-mails with blank subject lines may be marked as spam by the \nrecipient’s e-mail client, and e-mails with non-descriptive subject \nlines such as “Hello” or “Meeting” may be ignored. \n\n• Write your e-mail in clear and simple language. \n\nDon’t try to sound too formal, and don’t use complicated words \nwhen simple ones would work just fine. As far as possible, write in \nthe active voice. \n\n• Structure your message clearly, and include only the necessary \n\ninformation. \nTake care not to confuse the message by including too many topics \nin one e-mail. Respect your colleagues’ time, and try to keep your \nmessages as short as possible. \n\nIf you include a link in your e-mail, make sure that you provide some \ncontext. \nYour recipients are unlikely to click on a link if they don’t have any \nidea as to what they are going to see when they open it. \n\n• \n\n• Only mark an e-mail as ‘urgent’ when it really does require immedi- \n\nate attention. \nWhat’s urgent to you may not always be urgent to your recipients.", + "page_start": 52, + "page_end": 52, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "203. Theilther wants you to know that you ' re it societ. If you get a death throm? – unless you ' re President Denalal True ( 2008 ). https :// medium. om / qhspa. carbonica / twitter - wants - you - to - knothet - you - get - socil[ 65 ]Protik bridis, febritis Sortis, Amour Builitis, Kalika Balleand, and Noreoid Che hory 2013. The State and Futre of Linguistic Diversity and Inclusion in NLP Wordi. Is. Proverships of the SWith Amound Metring of the Association Comparat[ 66 ]Nurul Shannini Komurudilin, Amirrodin Kamsin, Lip Yee Por, and Humer Rabman 2018. A Review of Test Waternarking : Theory, Methods, and Appl toon. BEE Aucess 6 ( 2018 ), 8411 – 9028. Impe // doi org / 10.1109 / ACCESS - 20", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "**Compose**\n\n**Tip**Going into format mode will \nprevent your message from sending \nwhen you hit [Enter], so it's a great \nway to draft and preview messages \nbefore sending them. \n\nHi @Daichi. Can you coordinate a time to meet with \n\n**Format**your messages, add bullet points, \ncharts or hyperlinks. \n\nChristie to talk coverage on Brandhaus while Alex is out**next week?**\n\n**Mark as important**to call attention to specific messages.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "2. Select**Call Home**and then, click**Enable Notifications**(see Figure 13-45). For more \ninformation, see IBM Knowledge Center. \n\nFor the correct functionality of email notifications, ask your network administrator if Simple \nMail Transfer Protocol (SMTP) is enabled on the management network and is not, for \nexample, blocked by firewalls. Be sure to test the accessibility to the SMTP server by using \nthe**telnet**command (port 25 for a non-secured connection, port 465 for Secure Sockets \nLayer (SSL)-encrypted communication) using any server in the same network segment. \n\nFigure 13-46 Cloud Home service \n\n3. After clicking**Next**on the Welcome window, enter the information about the location of the \nsystem (see Figure 13-47 on page 713) and contact information of IBM Storwize V7000 \nadministrator (see Figure 13-48 on page 713) to be contactable by IBM Support.*Always*\nkeep this information current.", + "page_start": 733, + "page_end": 733, + "source_file": "sg247938.pdf" + }, + { + "text": "In today’s working environment, it is almost guaranteed that \nyou will be required to communicate with colleagues via e-mail \non a regular basis. And due to the large number of e-mails we \nnow send and receive each day, proper e-mail etiquette is \nmore important than ever.", + "page_start": 51, + "page_end": 51, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "The content of the welcome message is helpful when you need to notify users about some \nimportant information about the system, such as security warnings or a location description. \nTo define and enable the welcome message by using the GUI, edit the text area with the \nmessage content and click**Save**(see Figure 5-80).", + "page_start": 203, + "page_end": 203, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", + "target_page": 18, + "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**57. Parliament**\n\nThere shall be a Parliament of Botswana which shall consist of the President and \n\na National Assembly. \n**58. Composition of National Assembly**\n\n(1) The President shall be ex-officio a member of the National Assembly, and \n\nshall be entitled to speak and to vote in all proceedings of the National Assembly. \n\n(2) In addition to the President the National Assembly shall consist of- \n\n(a) \n\n57 Elected Members who shall be elected in accordance with the provisions of \nthis Constitution and subject thereto in accordance with the provisions of any \nAct of Parliament; and \nfour Specially Elected Members who shall be elected in accordance with the \nFirst Schedule to this Constitution and subject thereto in accordance with the \nprovisions of any Act of Parliament. \n\n(3) If a person who is not a member of the National Assembly is elected to the \noffice of Speaker of the National Assembly, that person shall, by virtue of holding that \noffice, be a member of the Assembly in addition to the members referred to in \nsubsections (1) and (2) of this section. \n**59. Speaker**\n\n(1) There shall be a Speaker of the National Assembly who shall be elected by \nthe Members of the Assembly from among persons who are Members of the Assembly \nor from among persons who are not Members of the Assembly. \n\n(2) The President, the Vice-President, a Minister, an Assistant Minister or a \n\npublic officer shall not be qualified to be elected as Speaker. \n(3) The Speaker shall vacate his or her office- \n\n(a) \n\nif, having been elected from among the Members of the National Assembly, he \nor she ceases to be a Member of the Assembly otherwise than by reason of a \ndissolution of Parliament or if he or she is required by virtue of section 68(2) to \n(3) of this Constitution, to cease to perform his or her functions as a Member of \nthe Assembly; \nif any circumstances arise that, if he or she were not Speaker, would disqualify \nhim for election as such; \n\n(b) \n\n(c) when the Assembly first sits after any dissolution of Parliament; or \n(d) \n\nif he or she is removed from office by a resolution of the Assembly supported by \nthe votes of not less than two-thirds of all the Members thereof. \n\n(4) No business shall be transacted in the National Assembly (other than an \nelection to the office of Speaker) at any time when the office of Speaker is vacant. \n**60. Deputy Speaker**\n\n(1) There shall be a Deputy Speaker of the National Assembly who shall be \nelected from among the persons who are Members of the Assembly other than the \nPresident, the Vice-President, Ministers or Assistant Ministers. \n\n(2) The Members of the National Assembly shall elect a person to the office of \n\nDeputy Speaker when the Assembly first sits after any dissolution and, if the office \nbecomes vacant otherwise than by reason of the dissolution of the Assembly, at the first \nsitting of the Assembly after the office becomes vacant. \n\n(3) The Deputy Speaker shall vacate his or her office- \n\n(a) \n\nif he or she ceases to be a Member of the National Assembly, otherwise than \nby reason of a dissolution of Parliament; \nif any circumstances arise that, if he or she were not Deputy Speaker, would \ndisqualify him or her for election as such; \nif he or she is required, by virtue of section 68(2) to (3) of this Constitution, to \ncease to perform his or her functions as a Member of the Assembly; \n\n(b) \n\n(c)", + "page_start": 26, + "page_end": 26, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period \n\nduring which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason \n\nunable to perform the functions of his or her office, then, until a person has been \nappointed to and has assumed the functions of that office or until the Chief Justice has \nresumed those functions, as the case may be, those functions shall be performed by \nsuch one of the judges of the High Court or such other person qualified for appointment \nas a judge of the High Court as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \nshe has attained the age of 70 years or such other age as may be prescribed \nfor the purposes of section 97 of this Constitution; \n\n(ii) a person appointed under this subsection, who is not a judge of the High Court, \nmay, notwithstanding the assumption or resumption of the functions of the office \nof Chief Justice by the holder of that office, continue to act as a judge of the", + "page_start": 40, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "than three ballots shall be taken unless in the opinion of the Spoaker the holding of further ballots is likely to result in the election of a President, in< underline > Copyright Government of Botswana ", + "page_start": 18, + "page_end": 18, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**32. Election of President after dissolution of Parliament**\n\n(1) Whenever Parliament is dissolved an election shall be held to the office of \nPresident in such manner as is prescribed by this section and, subject thereto, by or \nunder an Act of Parliament. \n\n(2) Nominations in the election of a President shall be delivered to the returning \nofficer on such day and at such time as may be prescribed by or under any law for the \ntime being in force in Botswana; the nomination of a candidate in an election of a \nPresident shall not be valid unless it is supported, in such manner as may be prescribed \nby or under an Act of Parliament, by not less than 1000 persons registered as voters for \nthe purpose of elections to the Assembly. \n\n(3) The following provisions shall then apply- \n\n(a) \n\na person nominated as a Parliamentary candidate may, at the time of his or her \nnomination and subject to the provisions of paragraph (b), declare in such \nmanner as may be prescribed by or under an Act of Parliament which of the \ncandidates in the election of President he or she supports, but the nomination of \na Parliamentary candidate shall be valid notwithstanding that the nomination \npaper does not contain such a declaration; \nsuch a declaration shall not be made in relation to any Presidential candidate \nunless that candidate has signified, in such manner as may be prescribed by or \nunder an Act of Parliament, his or her consent to the making of a declaration in \nhis or her favour by that Parliamentary candidate; \n\n(c) where the Parliamentary election is contested in any constituency a poll shall be \ntaken in that constituency at which the votes shall be given by ballot, and for the \npurposes of that poll any Parliamentary candidate who declared support in \naccordance with paragraph (a) for a particular Presidential candidate shall use \nthe same voting colour and symbol, if any, as may have been allocated under \nany law for the time being in force in Botswana to that Presidential candidate for \nthe purposes of the Presidential election; \nthe returning officer shall declare to be elected as President any candidate for \nwhom support has been declared in accordance with paragraph (a) above by \nnot less than such number of persons elected as Members of the National \nAssembly in the Parliamentary election as corresponds to more than half the \ntotal number of seats for Elected Members in the Assembly, and if there is no \nsuch person the returning officer shall declare that no candidate has been \nelected. \n\n(d) \n\n(4) Parliament may make provision whereby the time for nominating Presidential \n\ncandidates may be extended in the event of there being no qualified candidate \nnominated at the expiration of the time for the delivery of such nominations. \n\n(5) Where, at the expiration of the time for the delivery of nominations in the \n\nelection of a President, more than one qualified candidate is validly nominated and any \nof those candidates dies before the commencement of the poll in the Parliamentary \nelection, the poll in the Parliamentary election shall be countermanded, fresh \nnominations of Parliamentary candidates shall take place in every constituency and a \nfresh election of a President shall be held in accordance with the foregoing provisions of \nthis section. \n\n(6) Where- \n\n(a) \n\nany candidate in an election of a President dies during the period commencing \nwith the taking of the poll in the Parliamentary election and ending when the \nresult of the election has been ascertained and that candidate would, but for his \nor her death, have been entitled to have been declared elected as President \nunder subsection (3) of this section; or", + "page_start": 16, + "page_end": 16, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: \n\nProvided that the Speaker may, at the request of the Member, from time to time \n\nextend that period for further periods of 30 days to enable the Member to pursue an \nappeal against the decision, so, however, that extensions of time exceeding in the \naggregate 150 days shall not be given without the approval of the Assembly signified by \nresolution. \n\n(3) If, on the determination of any appeal, such circumstances continue to exist \n\nand no further appeal is open to the Member of the Assembly, or if, by reason of the \nexpiration of any period for entering an appeal or notice thereof or the refusal of leave to \nappeal or for any other reason, it ceases to be open to the Member to appeal, he or she \nshall forthwith vacate his or her seat. \n\n(4) If at any time before the Member of the Assembly vacates his or her seat \n\nsuch circumstances as aforesaid cease to exist, his or her seat shall not become vacant \nby reason of those circumstances, and he or she may resume the performance of his or \nher functions as a Member of the Assembly. \n**69. Determination of questions as to membership of National Assembly**", + "page_start": 32, + "page_end": 32, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Judicial Service Commission (ss 103-104)**\n\n**103. Composition and procedure**\n\n(1) There shall be a Judicial Service Commission for Botswana which shall \n\nconsist of- \n(a) \n(b) \n\nthe Chief Justice who shall be Chairman; \nthe President of the Court of Appeal (not being the Chief Justice or the most \nSenior Justice of the Court of Appeal); \nthe Attorney-General; \nthe Chairman of the Public Service Commission; \na member of the Law Society nominated by the Law Society; and \na person of intergrity and experience not being a legal practitioner appointed by \nthe President. \n\n(c) \n(d) \n(e) \n(f) \n\n(2) A member nominated under paragraph (e) or appointed under paragraph (f) \n\nof subsection (1) shall hold office for a period of two years, but shall be eligible for re- \nnomination or re-appointment, as the case may be, for another term of office for two \nyears: \n\nProvided that- \n\n(i) a member nominated under paragraph (e) may be removed from office by the \nrest of the members of the Commission acting together only for inability of the \nmember to discharge the functions of his or her office whether arising from \ninfirmity of mind or body or any other cause or for gross misbehaviour; or \n(ii) a member appointed under paragraph (f) may be removed from office by the \n\nPresident only for inability of the member to discharge the functions of his or her \noffice whether arising from infirmity of mind or body or any other cause or for \ngross misbehaviour. \n\n(3) A member of the Commission shall not enter upon the duties of his or her \n\noffice until he or she has taken and subscribed such oath for the due execution of his or \nher office as may be prescribed by Parliament. \n\n(4) The Judicial Service Commission shall not be subject to the direction or \n\ncontrol of any other person or authority in the exercise of its functions under this \nConstitution. \n\n(5) The Commission may regulate its own procedure and, subject to that \nprocedure, may act notwithstanding any vacancy in its membership or the absence of", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "National Assembly. \n\n(6) A person attending the proceedings of the Ntlo ya Dikgosi by virtue of the \n\nprovisions of subsection (3) or (4) of this section shall be entitled to take part in the \nproceedings of the Ntlo ya Dikgosi relating to the matter in respect of which he or she \nattends as if he or she were a Member of the Ntlo ya Dikgosi: \n\nProvided that he or she shall not be entitled to vote in the Ntlo ya Dikgosi. \n**PART IV**\n**Powers of Parliament (ss 86-89)**\n\n**86. Legislative powers**\n\nSubject to the provisions of this Constitution, Parliament shall have power to \n\nmake laws for the peace, order and good government of Botswana. \n**87. Mode of exercising legislative powers**\n\n(1) Subject to the provisions of section 89(4) of this Constitution the power of \n\nParliament to make laws shall be exercised by Bills passed by the National Assembly, \nafter reference in the cases specified in section 88(2) of this Constitution to the Ntlo ya \nDikgosi, and assented to by the President. \n\n(2) When a Bill is presented to the President for assent he or she shall either \n\nassent or withhold his or her assent. \n\n(3) Where the President withholds his or her assent to a Bill, the Bill shall be \n\nreturned to the National Assembly. \n\n(4) If where the President withholds his or her assent to a Bill the Assembly \n\nresolves within six months of the Bill being returned to it that the Bill should again be \npresented for assent, the President shall assent to the Bill within 21 days of its being \nagain presented to him or her, unless he or she sooner dissolves Parliament. \n\n(5) When a Bill that has been duly passed and presented for assent is assented \n\nto in accordance with the provisions of this Constitution it shall become law and the \nPresident shall thereupon cause it to be published in the Gazette as a law. \n\n(6) No law made by Parliament shall come into operation until it has been \npublished in the Gazette, but Parliament may postpone the coming into operation of any \nsuch law and may make laws with retrospective effect. \n\n(7) All laws made by Parliament shall be styled \"Acts\" and the words of \n\nenactment shall be \"enacted by the Parliament of Botswana\". \n**88.**\n\n**Introduction of Bills**\n\n(1) Except upon the recommendation of the President, which recommendation \nmay be signified by the Vice-President or a Minister, the National Assembly shall not- \n\n(a) \n\nproceed upon any Bill (including any amendment to a Bill) that, in the opinion of \nthe person presiding, makes provision for any of the following purposes- \n\n(i) \n\nfor the imposition of taxation or the alteration of taxation otherwise than by \nreduction; \nfor the imposition of any charge upon the revenues or other funds of \nBotswana or the alteration of any such charge otherwise than by reduction; \nfor the payment, issue or withdrawal from any public fund of Botswana of \nany moneys not charged thereon or any increase in the amount of such \npayment, issue or withdrawal; or \nfor the composition or remission of any debt to the Government of \nBotswana; \n\n(ii) \n\n(iii) \n\n(b) \n\nproceed upon any motion (including any amendment to a motion) the effect of \nwhich, in the opinion of the person presiding, would be to make provision for \nany of those purposes. \n\n(2) The National Assembly shall not proceed upon any Bill (including any \namendment to a Bill) that, in the opinion of the person presiding, would, if enacted, alter", + "page_start": 37, + "page_end": 37, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The President may at any time prongue Parliament. Subject to the provisions of this Constitution, the President may at any timeParliament
Subject to the provisions of subsection ( 4 ) of this section, Parliament, unlessolved, shall continue for five years from the date of the first sitting of the ussembly after any dissolution and shall then stand dissolved.At any time when Botswana is at war, Parliament may from time to time
period of five years specified in subsection ( 3 ) of this section for not more onths at a time :Devided that the life of Parliament shall not be extended under this subsection an five years.
If, after a dissolution of Parliament and before the holding of the generalthe Elected Members of the National Assembly, the President considers that,
≥ 6 : stence of a state of war or a state of emergency in Botswana or anyjt is necessary to recall Parliament, the President may summon the
hat has been dissolved to meet and that Parliament shall be deemed to be ment for the being, but the general election of the Elected Members of thussembly shall proceed and the Parliament that has been recalled shall, if notsolved, again stand dissolved on the day before the day on which the election
of no confidence in the GovernmentNational Assembly at any time passes a resolution supported by a majorityAembers of the Assembly who are entitled to vote declaring that it has no
In the Government of Botswana, Parliament shall stand dissolved on the following the day on which such resolution was passed, unless the Presidhighs his or her office or dissolves Parliament.
ngs of National AssemblyThe President may at any time summon a meeting of the National Assembly.
Subject to the provisions of this Constitution, the sittings of the Nationalin any session of Parliament after the commencement of that session shall be at such times and on such days as the Assembly shall appoint. PART VI
Interpretation ( s 94 )Any reference in this Constitution toof two - thirds of the Members of the Assembly shall be construed as a
to the votes of two - thirds of the Members of the Assembly excluding the slesiong.CHAPTER VI
The Judicature ( ss 95 - 107 )PART I
The High Court ( ss 95 - 98 )sdiction and composition
There shall be for Botswana a High Court which shall have unlimited original10 hear and determine any clvil or criminal proceedings under any law and
jurisdiction and powers as may be conferred on it by this Constitution or anyThe judges of the High Court shall be the Chief Justice and such number of
", + "page_start": 39, + "page_end": 39, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 \nof this Constitution, vest in the President. \n\n(2) The offices to which this section applies are- \n\n(a) Ambassador, High Commissioner or other principal representative of Botswana \n\nin any other country or accredited to any international organisation; \n\n(b) Secretary to the Cabinet; \n(c) Attorney-General; \n(cA) Director of Public Prosecutions; \n(d) Permanent Secretary; \n(e) Commissioner of Police; and \n(f) \n\nany other superscale office (other than an office to which this Constitution \nmakes specific provision for appointment or an office to which appointment is \nmade under the provisions of section 104 of this Constitution) which may be \nprescribed by Act of Parliament. \n\n**113. Tenure of office of Director of Public Prosecutions**\nprovisions of this section, a person appointed as Director of Public Prosecutions shall \nhold office for a 5 year renewable term or until he or she attains the age of 60 years, \nwhichever is the earlier. \n\n(1) Subject to the \n\n(2) A person holding the office of Director of Public Prosecutions may be \nremoved from office only for inability to perform the functions of his or her office (whether \narising from infirmity of body or mind or any other cause) or for misbehaviour or for \nincompetence and shall not be so removed except in accordance with the provisions of \nthis section. \n\n(3) If the President considers that the question of removing a person holding the \n\noffice of Director of Public Prosecutions from office ought to be investigated then- \n\n(a) \n\nhe or she shall appoint a tribunal which shall consist of a Chairman and not less \nthan two other members, who hold or have held high judicial office; and \nthe tribunal shall enquire into the matter and report on the facts thereof to the \nPresident and advise the President whether the person holding the office of \nDirector of Public Prosecutions ought to be removed from office under this \nsection for inability as aforesaid or for misbehaviour or for incompetence. \n(4) Where a tribunal appointed under subsection (3) of this section advises the \n\n(b) \n\nPresident that a person holding the office of Director of Public Prosecutions \nought to be removed from office for inability as aforesaid or for misbehaviour or \nfor incompetence, the President shall remove such person from office. \n\n(5) If the question of removing a person holding the office of Director of Public \n\nProsecutions from office has been referred to a tribunal under this section, the President \nmay suspend that person from performing the functions of his or her office, and any such \nsuspension may at any time be revoked by the President and shall in any case cease to \nhave effect if the tribunal advises the President that the person ought not to be removed \nfrom office. \n**114. Tenure of office of Auditor-General**\n\n(1) Subject to the provisions of this section, a person holding the office of Auditor- \nGeneral shall vacate his or her office when he or she attains the age of 60 years or such \nother age as may be prescribed by Parliament. \n\n(2) A person holding the office of Auditor-General may be removed from office \n\nonly for inability to perform the functions of his or her office (whether arising from \ninfirmity of body or mind or any other cause) or for misbehaviour and shall not be so \nremoved except in accordance with the provisions of this section. \n\n(3) If the National Assembly resolves that the question of removing a person \n\nholding the office of Auditor-General from office under this section ought to be", + "page_start": 48, + "page_end": 48, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "[html]Tenure of office of President( 1 ) The President shall, subject to the provisions of this section, hold office for an ate period not exceeding 10 years beginning from the date of his or her first plion of office of President after the commercement of this Act.( 2 ) The President shall case to hold the office of President if at any time during er tenure of office any circumstances arise that would, if he or she were not a. If the National Assembly, cause him or her to be disqualified for election-( 3 ) The President shall cease to hold office of President at the expiry of thescribed under subsection ( 1 ) of this section, or when the person elected at the on of President following a dissolution of Parliament assumes office. acancy in office of President( 1 ) Whenever the President dies, resigns or ceases to hold office, the Vice - Int shall assume office as President with effect from the date of the death, tion or ceasing to be President.( 2 ) If the office of President -becomes vacant in circumstances in which there is no Vice - President ; oris vacant whilst the Vice - President is absent from Botswana or is, by reason of physical or mental infirmity unable to perform the functions of his or her office, actions of the office of President shall, until such time as a new President asaccordance with this section or section 32 of this Constitution. be performed by inister as the Cabinet shall appoint. For the purposes of this subsection, aate of the Onief Justice that the Vice - President is by reason of physical or mentally unable to discharge the functions of his or her cifice, phall, in respect of any which it is in force, be conclusive and shall not be questioned in any court.( 3 ) Any person performing the functions of the office of President by virtue of tion ( 1 ) or ( 2 ) of this section shall not exercise the power of the President to the appointment of Vice - President or to dissolve Parliament.( 4 ) If the office of President becomes vacant, the National Assembly shall, unlessent is dissolved, and notwithstanding that it may be prorogued, meet on theas may after the office of President becomes vacant, or on such earlier day as may ointed by the Speaker, and shall elect a person to the diffice in such manner as is seed by the next following subsection and, subject thereto, by or under an Act o( 5 ) In an election of a President under this section -the Speaker shall preside at the meeting and conduct the election ;a person may be a candidate if and shall not be a candidate unless he or she has been nominated as a candidate with his or her consent prior to the sitting1.at the election every Member of the Assembly except the Speaker shall be entitled to vote ;the votes of the Members of the Assembly who are entitled to vote shall begiven by ballot in such manner as not to disclose how any particular Member voted, and any person who receives the votes of more than one half of the tonumber of persons entitled to vote shall be declared elected as President ; a person elected as President under this section shall assume the office ofPresident on the day upon which he or she is declared to be elected ;not more than three ballots shall be taken unless in the opinion of the Spoaker the holding of further ballots is likely to result in the election of a President, in< underline >", + "page_start": 18, + "page_end": 18, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", + "target_page": 25, + "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 \nof this Constitution, vest in the President. \n\n(2) The offices to which this section applies are- \n\n(a) Ambassador, High Commissioner or other principal representative of Botswana \n\nin any other country or accredited to any international organisation; \n\n(b) Secretary to the Cabinet; \n(c) Attorney-General; \n(cA) Director of Public Prosecutions; \n(d) Permanent Secretary; \n(e) Commissioner of Police; and \n(f) \n\nany other superscale office (other than an office to which this Constitution \nmakes specific provision for appointment or an office to which appointment is \nmade under the provisions of section 104 of this Constitution) which may be \nprescribed by Act of Parliament. \n\n**113. Tenure of office of Director of Public Prosecutions**\nprovisions of this section, a person appointed as Director of Public Prosecutions shall \nhold office for a 5 year renewable term or until he or she attains the age of 60 years, \nwhichever is the earlier. \n\n(1) Subject to the \n\n(2) A person holding the office of Director of Public Prosecutions may be \nremoved from office only for inability to perform the functions of his or her office (whether \narising from infirmity of body or mind or any other cause) or for misbehaviour or for \nincompetence and shall not be so removed except in accordance with the provisions of \nthis section. \n\n(3) If the President considers that the question of removing a person holding the \n\noffice of Director of Public Prosecutions from office ought to be investigated then- \n\n(a) \n\nhe or she shall appoint a tribunal which shall consist of a Chairman and not less \nthan two other members, who hold or have held high judicial office; and \nthe tribunal shall enquire into the matter and report on the facts thereof to the \nPresident and advise the President whether the person holding the office of \nDirector of Public Prosecutions ought to be removed from office under this \nsection for inability as aforesaid or for misbehaviour or for incompetence. \n(4) Where a tribunal appointed under subsection (3) of this section advises the \n\n(b) \n\nPresident that a person holding the office of Director of Public Prosecutions \nought to be removed from office for inability as aforesaid or for misbehaviour or \nfor incompetence, the President shall remove such person from office. \n\n(5) If the question of removing a person holding the office of Director of Public \n\nProsecutions from office has been referred to a tribunal under this section, the President \nmay suspend that person from performing the functions of his or her office, and any such \nsuspension may at any time be revoked by the President and shall in any case cease to \nhave effect if the tribunal advises the President that the person ought not to be removed \nfrom office. \n**114. Tenure of office of Auditor-General**\n\n(1) Subject to the provisions of this section, a person holding the office of Auditor- \nGeneral shall vacate his or her office when he or she attains the age of 60 years or such \nother age as may be prescribed by Parliament. \n\n(2) A person holding the office of Auditor-General may be removed from office \n\nonly for inability to perform the functions of his or her office (whether arising from \ninfirmity of body or mind or any other cause) or for misbehaviour and shall not be so \nremoved except in accordance with the provisions of this section. \n\n(3) If the National Assembly resolves that the question of removing a person \n\nholding the office of Auditor-General from office under this section ought to be", + "page_start": 48, + "page_end": 48, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "detention is authorized; \nnot more than one month after the commencement of his or her detention and \nthereafter during his or her detention at intervals of not more than six months, \nhis or her case shall be reviewed by an independent and impartial tribunal \nestablished by law and presided over by a person, qualified to be enrolled as an \nadvocate in Botswana, appointed by the Chief Justice; and \nhe or she shall be afforded reasonable facilities to consult and instruct, at his or \nher own expense, a legal representative and he or she and any such legal \nrepresentative shall be permitted to make written or oral representations or both \nto the tribunal appointed for the review of his or her case. \n\n(c) \n\n(3) On any review by a tribunal in pursuance of this section of the case of a \n\ndetained person, the tribunal may make recommendations, concerning the necessity or \nexpediency of continuing his or her detention, to the authority by which it was ordered \nbut, unless it is otherwise provided by law, that authority shall not be obliged to act in \naccordance with any such recommendations. \n**17. Declarations relating to emergencies**\n\n(1) The President may at any time, by Proclamation published in the Gazette, \n\ndeclare that a state of public emergency exists. \n\n(2) A declaration under subsection (1) of this section, if not sooner revoked, shall \n\ncease to have effect- \n\n(a) \n\nin the case of a declaration made when Parliament is sitting or has been \nsummoned to meet within seven days, at the expiration of a period of seven \ndays beginning with the date of publication of the declaration; or \nin any other case, at the expiration of a period of 21 days beginning with the \ndate of publication of the declaration, \n\n(b) \n\nunless before the expiration of that period, it is approved by a resolution passed by the \nNational Assembly, supported by the votes of a majority of all the voting members of the \nAssembly. \n\n(3) Subject to the provisions of subsection (4) of this section, a declaration \n\napproved by a resolution of the National Assembly under subsection (2) of this section \nshall continue in force until the expiration of a period of six months beginning with the \ndate of its being so approved or until such earlier date as may be specified in the \nresolution: \n\nProvided that the National Assembly may, by resolution, supported by the votes \n\nof a majority of all the voting members of the Assembly, extend its approval of the \ndeclaration for periods of not more than six months at a time. \n\n(4) The National Assembly may by resolution at any time revoke a declaration \n\napproved by the Assembly under this section. \n**18. Enforcement of protective provisions**\n\n(1) Subject to the provisions of subsection (5) of this section, if any person \n\nalleges that any of the provisions of sections 3 to 16 (inclusive) of this Constitution has \nbeen, is being or is likely to be contravened in relation to him or her, then, without \nprejudice to any other action with respect to the same matter which is lawfully available, \nthat person may apply to the High Court for redress. \n\n(2) The High Court shall have original jurisdiction- \n\n(a) \n\nto hear and determine any application made by any person in pursuance of \nsubsection (1) of this section; or \nto determine any question arising in the case of any person which is referred to \nit in pursuance of subsection (3) of this section, \n\n(b) \n\nand may make such orders, issue such writs and give such direction as it may consider \nappropriate for the purpose of enforcing or securing the enforcement of any of the", + "page_start": 14, + "page_end": 14, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Judicial Service Commission (ss 103-104)**\n\n**103. Composition and procedure**\n\n(1) There shall be a Judicial Service Commission for Botswana which shall \n\nconsist of- \n(a) \n(b) \n\nthe Chief Justice who shall be Chairman; \nthe President of the Court of Appeal (not being the Chief Justice or the most \nSenior Justice of the Court of Appeal); \nthe Attorney-General; \nthe Chairman of the Public Service Commission; \na member of the Law Society nominated by the Law Society; and \na person of intergrity and experience not being a legal practitioner appointed by \nthe President. \n\n(c) \n(d) \n(e) \n(f) \n\n(2) A member nominated under paragraph (e) or appointed under paragraph (f) \n\nof subsection (1) shall hold office for a period of two years, but shall be eligible for re- \nnomination or re-appointment, as the case may be, for another term of office for two \nyears: \n\nProvided that- \n\n(i) a member nominated under paragraph (e) may be removed from office by the \nrest of the members of the Commission acting together only for inability of the \nmember to discharge the functions of his or her office whether arising from \ninfirmity of mind or body or any other cause or for gross misbehaviour; or \n(ii) a member appointed under paragraph (f) may be removed from office by the \n\nPresident only for inability of the member to discharge the functions of his or her \noffice whether arising from infirmity of mind or body or any other cause or for \ngross misbehaviour. \n\n(3) A member of the Commission shall not enter upon the duties of his or her \n\noffice until he or she has taken and subscribed such oath for the due execution of his or \nher office as may be prescribed by Parliament. \n\n(4) The Judicial Service Commission shall not be subject to the direction or \n\ncontrol of any other person or authority in the exercise of its functions under this \nConstitution. \n\n(5) The Commission may regulate its own procedure and, subject to that \nprocedure, may act notwithstanding any vacancy in its membership or the absence of", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(a) \n\ngrant to any person convicted of any offence a pardon, either free or subject to \nlawful conditions; \ngrant to any person a respite, either indefinite or for a specified period, of the \nexecution of any punishment imposed on that person for any offence; \nsubstitute a less severe form of punishment for any punishment imposed on \nany person for any offence; and \nremit the whole or part of any punishment imposed on any person for any \noffence or of any penalty or forfeiture otherwise due to the Government on \naccount of any offence. \n\n(b) \n\n(c) \n\n(d) \n\n**54. Advisory Committee on Prerogative of Mercy**\n\n(1) There shall be an Advisory Committee on the Prerogative of Mercy which \n\nshall consist of- \n\n(a) \n\nthe Vice-President or a Minister appointed by the President by instrument in \nwriting under his or her hand; \nthe Attorney-General; and \na person qualified to practise in Botswana as a medical practitioner, appointed \nby the President by instrument in writing under his or her hand. \n\n(2) A member of the Committee appointed under subsection (1)(a) or (c) of this \n\nsection shall hold his or her seat thereon for such period as may be specified in the \ninstrument by which he or she was appointed: \n\nProvided that his or her seat shall become vacant- \n\n(i) \n\nin the case of a person who, at the date of his or her appointment, was the \nVice-President or a Minister, if he or she ceases to be the Vice-President or a \nMinister; or \nif the President, by instrument in writing under his or her hand, so directs. (ii) \n\n(3) The Committee shall not be summoned except by the authority of the \n\nPresident who shall, as far as is practicable, attend and preside at all meetings of the \nCommittee, and, in the absence of the President, the member of the Committee \nappointed under subsection (1)(a) of this section shall preside. \n\n(4) The Committee may act notwithstanding any vacancy in its membership and \n\nits proceedings shall not be invalidated by the presence or participation of any person \nnot entitled to be present at or to participate in those proceedings. \n\n(5) Subject to the provisions of this section, the Committee may regulate its own \n\nprocedure. \n**55. Functions of Advisory Committee on Prerogative of Mercy**\n\n(1) Where any person has been sentenced to death for any offence, the \nPresident shall cause a written report of the case from the trial judge, together with such \nother information derived from the record of the case or elsewhere as he or she may \nrequire, to be considered at a meeting of the Advisory Committee on the Prerogative of \nMercy; and after obtaining the advice of the Committee he or she shall decide whether to \nexercise any of his or her powers under section 53 of this Constitution. \n\n(2) The President may consult with the Committee before deciding whether to \n\nexercise any of his or her powers under the said section 53 in any case not falling within \nsubsection (1) of this section. \n**56. Constitution of offices**\n\nSubject to the provisions of this Constitution and of any Act of Parliament, the \npowers of constituting and abolishing offices for Botswana shall vest in the President. \n\n**CHAPTER V**\n**Parliament (ss 57-94)**\n**PART I**\n**Composition (ss 57-70)**", + "page_start": 25, + "page_end": 25, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) the Industrial Court. \n\n(2) In this Constitution, unless the context otherwise requires, references to \n\noffices in the public service shall be construed as including references to the offices of \njudges of the Court of Appeal and judges of the High Court and the offices of members \nof all subordinate courts (being offices the emoluments attaching to which, or any part of \nthe emoluments attaching to which, are paid directly out of moneys provided by \nParliament). \n\n(3) For the purposes of this Constitution a person shall not be considered to be a \npublic officer by reason only that he or she is in receipt of any remuneration or allowance \nas the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy \nSpeaker or Member of the Assembly, a Member of the Ntlo ya Dikgosi or a member of \nany Commission established by this Constitution. \n\n(4) For the purposes of this Constitution, a person shall not be considered as \n\nholding a public office by reason only of the fact that he or she is in receipt of a pension \nor other like allowance in respect of service under the Government of Botswana or the \nformer Protectorate of Bechuanaland. \n\n(5) In this Constitution, unless the context otherwise requires, a reference to the \n\nholder of an office by the term designating his or her office shall be construed as \nincluding a reference to any person for the time being lawfully acting in or performing the \nfunctions of that office: \n\nProvided that nothing in this subsection shall apply to references to the President \n\nor Vice-President in section 35, 36 or 39 of this Constitution. \n\n(6) In this Constitution, unless it is otherwise provided or required by the context, \n\na reference to the power to make appointments to any office shall be construed as \nincluding a reference to the power to make appointments on promotion and transfer and \nto confirm appointments and to the power to appoint a person to act in or perform the \nfunctions of that office at any time when the office is vacant or the holder thereof is \nunable (whether by reason of absence or infirmity of mind or body or any other cause) to \nperform the functions of that office. \n\n(7) References in this Constitution to the power to remove a public officer from \nhis or her office shall be construed as including references to any power conferred by \nany law to require or permit that officer to retire from the public service: \n\nProvided that nothing in this subsection shall be construed as conferring on any \n\nperson or authority power to require a judge of the Court of Appeal or the High Court, the \nAuditor-General or the Director of Public Prosecutions to retire from the public service. \n(8) Any provision in this Constitution that vests in any person or authority power \n\nto remove any public officer from his or her office shall be without prejudice to the power \nof any person or authority to abolish any office or to any law providing for the compulsory \nretirement of public officers generally or in any class of public officer on attaining an age \nspecified therein. \n\n(9) Where power is vested by this Constitution in any person or authority to \nappoint any person to act in or perform the functions of any office if the holder thereof is \nhimself unable to perform those functions, no such appointment shall be called in \nquestion on the ground that the holder of the office was not unable to perform those \nfunctions. \n\n(10) No provision of this Constitution that any person or authority shall not be \n\nsubject to the direction or control of any other person or authority in the exercise of any \nfunctions under this Constitution shall be construed as precluding a court of law from \nexercising jurisdiction in relation to any question whether that person or authority has \nperformed those functions in accordance with this Constitution or any other law.", + "page_start": 54, + "page_end": 54, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(b) \n\n(c) \n\n(4) If any person whose freedom of movement has been restricted by order \n\nunder such a provision as is referred to in subsection (3)(a) of this section (other than a \nrestriction which is applicable to persons generally or to general classes of persons) so \nrequests at any time during the period of that restriction not earlier than six months after \nthe order was made or six months after he or she last made such request, as the case \nmay be, his or her case shall be reviewed by an independent and impartial tribunal \npresided over by a person, qualified to be enrolled as an advocate in Botswana, \nappointed by the Chief Justice. \n\n(5) On any review by a tribunal in pursuance of this section of the case of a \n\nperson whose freedom of movement has been restricted, the tribunal may make \nrecommendations, concerning the necessity or expediency of continuing the restriction \nto the authority by which it was ordered but, unless it is otherwise provided by law, that \nauthority shall not be obliged to act in accordance with any such recommendations. \n**15. Protection from discrimination on the grounds of race, etc.**\n\n(1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law \n\nshall make any provision that is discriminatory either of itself or in its effect. \n\n(2) Subject to the provisions of subsections (6), (7) and (8) of this section, no \n\nperson shall be treated in a discriminatory manner by any person acting by virtue of any \nwritten law or in the performance of the functions of any public office or any public \nauthority. \n\n(3) In this section, the expression \"discriminatory\" means affording different \n\ntreatment to different persons, attributable wholly or mainly to their respective \ndescriptions by race, tribe, place of origin, political opinions, colour, creed or sex \nwhereby persons of one such description are subjected to disabilities or restrictions to \nwhich persons of another such description are not made subject or are accorded \nprivileges or advantages which are not accorded to persons of another such description. \n\n(4) Subsection (1) of this section shall not apply to any law so far as that law \n\nmakes provision- \n\n(a) \n(b) with respect to persons who are not citizens of Botswana; \n(c) with respect to adoption, marriage, divorce, burial, devolution of property on \n\nfor the appropriation of public revenues or other public funds; \n\ndeath or other matters of personal law;", + "page_start": 12, + "page_end": 12, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period \n\nduring which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason \n\nunable to perform the functions of his or her office, then, until a person has been \nappointed to and has assumed the functions of that office or until the Chief Justice has \nresumed those functions, as the case may be, those functions shall be performed by \nsuch one of the judges of the High Court or such other person qualified for appointment \nas a judge of the High Court as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \nshe has attained the age of 70 years or such other age as may be prescribed \nfor the purposes of section 97 of this Constitution; \n\n(ii) a person appointed under this subsection, who is not a judge of the High Court, \nmay, notwithstanding the assumption or resumption of the functions of the office \nof Chief Justice by the holder of that office, continue to act as a judge of the", + "page_start": 40, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) \n\nand except so far as that provision or, as the case may be, anything done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**10. Provisions to secure protection of law**\n\n(1) If any person is charged with a criminal offence, then, unless the charge is \n\nwithdrawn, the case shall be afforded a fair hearing within a reasonable time by an \nindependent and impartial court established or recognized by law. \n\n(2) Every person who is charged with a criminal offence- \n\n(a) \n\n(b) \n\n(c) \n\n(d) \n\n(e) \n\nshall be presumed to be innocent until he or she is proved or has pleaded \nguilty; \nshall be informed as soon as reasonably practicable, in a language that he or \nshe understands and in detail, of the nature of the offence charged; \nshall be given adequate time and facilities for the preparation of his or her \ndefence; \nshall be permitted to defend himself or herself before the court in person or, at \nhis or her own expense, by a legal representative of his or her own choice; \nshall be afforded facilities to examine in person or by his or her legal \nrepresentative the witnesses called by the prosecution before the court, and to \nobtain the attendance and carry out the examination of witnesses to testify on \nhis or her behalf before the court on the same conditions as those applying to \nwitnesses called by the prosecution; and \nshall be permitted to have without payment the assistance of an interpreter if he \nor she cannot understand the language used at the trial of the charge, \nand except with his or her own consent the trial shall not take place in his or her absence \nunless he or she so conducts himself or herself as to render the continuance of the \nproceedings in his or her presence impracticable and the court has ordered him or her to \nbe removed and the trial to proceed in his or her absence. \n\n(f) \n\n(3) When a person is tried for any criminal offence, the accused person or any \n\nperson authorized by him or her in that behalf shall, if he or she so requires and subject \nto payment of such reasonable fee as may be prescribed by law, be given within a \nreasonable time after judgment a copy for the use of the accused person of any record \nof the proceedings made by or on behalf of the court.", + "page_start": 8, + "page_end": 8, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: \n\nProvided that the Speaker may, at the request of the Member, from time to time \n\nextend that period for further periods of 30 days to enable the Member to pursue an \nappeal against the decision, so, however, that extensions of time exceeding in the \naggregate 150 days shall not be given without the approval of the Assembly signified by \nresolution. \n\n(3) If, on the determination of any appeal, such circumstances continue to exist \n\nand no further appeal is open to the Member of the Assembly, or if, by reason of the \nexpiration of any period for entering an appeal or notice thereof or the refusal of leave to \nappeal or for any other reason, it ceases to be open to the Member to appeal, he or she \nshall forthwith vacate his or her seat. \n\n(4) If at any time before the Member of the Assembly vacates his or her seat \n\nsuch circumstances as aforesaid cease to exist, his or her seat shall not become vacant \nby reason of those circumstances, and he or she may resume the performance of his or \nher functions as a Member of the Assembly. \n**69. Determination of questions as to membership of National Assembly**", + "page_start": 32, + "page_end": 32, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "tribunal advises the President that the judge ought not to be removed from office. \n**98. Oaths to be taken by judges of High Court**\n\nA judge of the High Court shall not enter upon the duties of his or her office \nunless he or she has taken and subscribed such oath for the due execution of his or her \noffice as may be prescribed by Parliament. \n\n**PART II**\n**Court of Appeal (ss 99-102)**\n\n**99. Composition and jurisdiction**\n\n(1) There shall be a Court of Appeal for Botswana which shall have such \njurisdiction and powers as may be conferred on it by this Constitution or any other law. \n\n(2) The judges of the Court of Appeal shall be- \n\n(a) \n(b) \n\nthe President of the Court of Appeal; \nsuch number, if any, of Justices of Appeal as may be prescribed by Parliament; \nand \nthe Chief Justice and the other judges of the High Court: \n\nProvided that Parliament may make provision for the office of President of the \n\nCourt of Appeal to be held by the Chief Justice ex-officio. \n\n(3) The office of a Justice of Appeal shall not be abolished while there is a \n\nsubstantive holder thereof. \n\n(4) The Court of Appeal shall be a superior court of record and save as otherwise \n\nprovided by Parliament shall have all the powers of such a court. \n**100. Appointment of judges of Court of Appeal**\n\n(1) The President of the Court of Appeal shall, unless that office is held ex-officio \n\nby the Chief Justice, be appointed by the President. \n\n(2) The Justices of Appeal, if any, shall be appointed by the President, acting in \n\naccordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the Court of \n\nAppeal unless- \n\n(a) \n\nhe or she holds, or has held office as, a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; or \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad experience in the teaching of law in a recognised university for not less \nthan ten years. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period \n\nduring which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of President of the Court of Appeal is vacant or if the President of \nthe Court of Appeal is for any reason unable to perform the functions of his or her office, \nthen, until a person has been appointed to and has assumed the functions of that office \nor until the President of the Court of Appeal has resumed those functions, as the case \nmay be, those functions shall be performed by such one of the other judges of the Court \nof Appeal or such other person qualified for appointment as a judge of the Court of \nAppeal as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \n\n(7) Any person appointed under subsection (6) of this section to act as a Justice \n\nof Appeal, shall subject to the provisions of section 101(4) and (5) of this Constitution, \ncontinue to act for the period of his or her appointment or, if no such period is specified, \nuntil his or her appointment is revoked by the President, acting in accordance with the \nadvice of the Judicial Service Commission: \n\nProvided that the President, acting in accordance with the advice of the Judicial", + "page_start": 42, + "page_end": 42, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are considered \"disciplined force\" according to Botswana constitution ?", + "target_page": 16, + "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. \n\n**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution.", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**57. Parliament**\n\nThere shall be a Parliament of Botswana which shall consist of the President and \n\na National Assembly. \n**58. Composition of National Assembly**\n\n(1) The President shall be ex-officio a member of the National Assembly, and \n\nshall be entitled to speak and to vote in all proceedings of the National Assembly. \n\n(2) In addition to the President the National Assembly shall consist of- \n\n(a) \n\n57 Elected Members who shall be elected in accordance with the provisions of \nthis Constitution and subject thereto in accordance with the provisions of any \nAct of Parliament; and \nfour Specially Elected Members who shall be elected in accordance with the \nFirst Schedule to this Constitution and subject thereto in accordance with the \nprovisions of any Act of Parliament. \n\n(3) If a person who is not a member of the National Assembly is elected to the \noffice of Speaker of the National Assembly, that person shall, by virtue of holding that \noffice, be a member of the Assembly in addition to the members referred to in \nsubsections (1) and (2) of this section. \n**59. Speaker**\n\n(1) There shall be a Speaker of the National Assembly who shall be elected by \nthe Members of the Assembly from among persons who are Members of the Assembly \nor from among persons who are not Members of the Assembly. \n\n(2) The President, the Vice-President, a Minister, an Assistant Minister or a \n\npublic officer shall not be qualified to be elected as Speaker. \n(3) The Speaker shall vacate his or her office- \n\n(a) \n\nif, having been elected from among the Members of the National Assembly, he \nor she ceases to be a Member of the Assembly otherwise than by reason of a \ndissolution of Parliament or if he or she is required by virtue of section 68(2) to \n(3) of this Constitution, to cease to perform his or her functions as a Member of \nthe Assembly; \nif any circumstances arise that, if he or she were not Speaker, would disqualify \nhim for election as such; \n\n(b) \n\n(c) when the Assembly first sits after any dissolution of Parliament; or \n(d) \n\nif he or she is removed from office by a resolution of the Assembly supported by \nthe votes of not less than two-thirds of all the Members thereof. \n\n(4) No business shall be transacted in the National Assembly (other than an \nelection to the office of Speaker) at any time when the office of Speaker is vacant. \n**60. Deputy Speaker**\n\n(1) There shall be a Deputy Speaker of the National Assembly who shall be \nelected from among the persons who are Members of the Assembly other than the \nPresident, the Vice-President, Ministers or Assistant Ministers. \n\n(2) The Members of the National Assembly shall elect a person to the office of \n\nDeputy Speaker when the Assembly first sits after any dissolution and, if the office \nbecomes vacant otherwise than by reason of the dissolution of the Assembly, at the first \nsitting of the Assembly after the office becomes vacant. \n\n(3) The Deputy Speaker shall vacate his or her office- \n\n(a) \n\nif he or she ceases to be a Member of the National Assembly, otherwise than \nby reason of a dissolution of Parliament; \nif any circumstances arise that, if he or she were not Deputy Speaker, would \ndisqualify him or her for election as such; \nif he or she is required, by virtue of section 68(2) to (3) of this Constitution, to \ncease to perform his or her functions as a Member of the Assembly; \n\n(b) \n\n(c)", + "page_start": 26, + "page_end": 26, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) \n\nand except so far as that provision or, as the case may be, anything done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**10. Provisions to secure protection of law**\n\n(1) If any person is charged with a criminal offence, then, unless the charge is \n\nwithdrawn, the case shall be afforded a fair hearing within a reasonable time by an \nindependent and impartial court established or recognized by law. \n\n(2) Every person who is charged with a criminal offence- \n\n(a) \n\n(b) \n\n(c) \n\n(d) \n\n(e) \n\nshall be presumed to be innocent until he or she is proved or has pleaded \nguilty; \nshall be informed as soon as reasonably practicable, in a language that he or \nshe understands and in detail, of the nature of the offence charged; \nshall be given adequate time and facilities for the preparation of his or her \ndefence; \nshall be permitted to defend himself or herself before the court in person or, at \nhis or her own expense, by a legal representative of his or her own choice; \nshall be afforded facilities to examine in person or by his or her legal \nrepresentative the witnesses called by the prosecution before the court, and to \nobtain the attendance and carry out the examination of witnesses to testify on \nhis or her behalf before the court on the same conditions as those applying to \nwitnesses called by the prosecution; and \nshall be permitted to have without payment the assistance of an interpreter if he \nor she cannot understand the language used at the trial of the charge, \nand except with his or her own consent the trial shall not take place in his or her absence \nunless he or she so conducts himself or herself as to render the continuance of the \nproceedings in his or her presence impracticable and the court has ordered him or her to \nbe removed and the trial to proceed in his or her absence. \n\n(f) \n\n(3) When a person is tried for any criminal offence, the accused person or any \n\nperson authorized by him or her in that behalf shall, if he or she so requires and subject \nto payment of such reasonable fee as may be prescribed by law, be given within a \nreasonable time after judgment a copy for the use of the accused person of any record \nof the proceedings made by or on behalf of the court.", + "page_start": 8, + "page_end": 8, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) the Industrial Court. \n\n(2) In this Constitution, unless the context otherwise requires, references to \n\noffices in the public service shall be construed as including references to the offices of \njudges of the Court of Appeal and judges of the High Court and the offices of members \nof all subordinate courts (being offices the emoluments attaching to which, or any part of \nthe emoluments attaching to which, are paid directly out of moneys provided by \nParliament). \n\n(3) For the purposes of this Constitution a person shall not be considered to be a \npublic officer by reason only that he or she is in receipt of any remuneration or allowance \nas the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy \nSpeaker or Member of the Assembly, a Member of the Ntlo ya Dikgosi or a member of \nany Commission established by this Constitution. \n\n(4) For the purposes of this Constitution, a person shall not be considered as \n\nholding a public office by reason only of the fact that he or she is in receipt of a pension \nor other like allowance in respect of service under the Government of Botswana or the \nformer Protectorate of Bechuanaland. \n\n(5) In this Constitution, unless the context otherwise requires, a reference to the \n\nholder of an office by the term designating his or her office shall be construed as \nincluding a reference to any person for the time being lawfully acting in or performing the \nfunctions of that office: \n\nProvided that nothing in this subsection shall apply to references to the President \n\nor Vice-President in section 35, 36 or 39 of this Constitution. \n\n(6) In this Constitution, unless it is otherwise provided or required by the context, \n\na reference to the power to make appointments to any office shall be construed as \nincluding a reference to the power to make appointments on promotion and transfer and \nto confirm appointments and to the power to appoint a person to act in or perform the \nfunctions of that office at any time when the office is vacant or the holder thereof is \nunable (whether by reason of absence or infirmity of mind or body or any other cause) to \nperform the functions of that office. \n\n(7) References in this Constitution to the power to remove a public officer from \nhis or her office shall be construed as including references to any power conferred by \nany law to require or permit that officer to retire from the public service: \n\nProvided that nothing in this subsection shall be construed as conferring on any \n\nperson or authority power to require a judge of the Court of Appeal or the High Court, the \nAuditor-General or the Director of Public Prosecutions to retire from the public service. \n(8) Any provision in this Constitution that vests in any person or authority power \n\nto remove any public officer from his or her office shall be without prejudice to the power \nof any person or authority to abolish any office or to any law providing for the compulsory \nretirement of public officers generally or in any class of public officer on attaining an age \nspecified therein. \n\n(9) Where power is vested by this Constitution in any person or authority to \nappoint any person to act in or perform the functions of any office if the holder thereof is \nhimself unable to perform those functions, no such appointment shall be called in \nquestion on the ground that the holder of the office was not unable to perform those \nfunctions. \n\n(10) No provision of this Constitution that any person or authority shall not be \n\nsubject to the direction or control of any other person or authority in the exercise of any \nfunctions under this Constitution shall be construed as precluding a court of law from \nexercising jurisdiction in relation to any question whether that person or authority has \nperformed those functions in accordance with this Constitution or any other law.", + "page_start": 54, + "page_end": 54, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "National Assembly. \n\n(6) A person attending the proceedings of the Ntlo ya Dikgosi by virtue of the \n\nprovisions of subsection (3) or (4) of this section shall be entitled to take part in the \nproceedings of the Ntlo ya Dikgosi relating to the matter in respect of which he or she \nattends as if he or she were a Member of the Ntlo ya Dikgosi: \n\nProvided that he or she shall not be entitled to vote in the Ntlo ya Dikgosi. \n**PART IV**\n**Powers of Parliament (ss 86-89)**\n\n**86. Legislative powers**\n\nSubject to the provisions of this Constitution, Parliament shall have power to \n\nmake laws for the peace, order and good government of Botswana. \n**87. Mode of exercising legislative powers**\n\n(1) Subject to the provisions of section 89(4) of this Constitution the power of \n\nParliament to make laws shall be exercised by Bills passed by the National Assembly, \nafter reference in the cases specified in section 88(2) of this Constitution to the Ntlo ya \nDikgosi, and assented to by the President. \n\n(2) When a Bill is presented to the President for assent he or she shall either \n\nassent or withhold his or her assent. \n\n(3) Where the President withholds his or her assent to a Bill, the Bill shall be \n\nreturned to the National Assembly. \n\n(4) If where the President withholds his or her assent to a Bill the Assembly \n\nresolves within six months of the Bill being returned to it that the Bill should again be \npresented for assent, the President shall assent to the Bill within 21 days of its being \nagain presented to him or her, unless he or she sooner dissolves Parliament. \n\n(5) When a Bill that has been duly passed and presented for assent is assented \n\nto in accordance with the provisions of this Constitution it shall become law and the \nPresident shall thereupon cause it to be published in the Gazette as a law. \n\n(6) No law made by Parliament shall come into operation until it has been \npublished in the Gazette, but Parliament may postpone the coming into operation of any \nsuch law and may make laws with retrospective effect. \n\n(7) All laws made by Parliament shall be styled \"Acts\" and the words of \n\nenactment shall be \"enacted by the Parliament of Botswana\". \n**88.**\n\n**Introduction of Bills**\n\n(1) Except upon the recommendation of the President, which recommendation \nmay be signified by the Vice-President or a Minister, the National Assembly shall not- \n\n(a) \n\nproceed upon any Bill (including any amendment to a Bill) that, in the opinion of \nthe person presiding, makes provision for any of the following purposes- \n\n(i) \n\nfor the imposition of taxation or the alteration of taxation otherwise than by \nreduction; \nfor the imposition of any charge upon the revenues or other funds of \nBotswana or the alteration of any such charge otherwise than by reduction; \nfor the payment, issue or withdrawal from any public fund of Botswana of \nany moneys not charged thereon or any increase in the amount of such \npayment, issue or withdrawal; or \nfor the composition or remission of any debt to the Government of \nBotswana; \n\n(ii) \n\n(iii) \n\n(b) \n\nproceed upon any motion (including any amendment to a motion) the effect of \nwhich, in the opinion of the person presiding, would be to make provision for \nany of those purposes. \n\n(2) The National Assembly shall not proceed upon any Bill (including any \namendment to a Bill) that, in the opinion of the person presiding, would, if enacted, alter", + "page_start": 37, + "page_end": 37, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Judicial Service Commission (ss 103-104)**\n\n**103. Composition and procedure**\n\n(1) There shall be a Judicial Service Commission for Botswana which shall \n\nconsist of- \n(a) \n(b) \n\nthe Chief Justice who shall be Chairman; \nthe President of the Court of Appeal (not being the Chief Justice or the most \nSenior Justice of the Court of Appeal); \nthe Attorney-General; \nthe Chairman of the Public Service Commission; \na member of the Law Society nominated by the Law Society; and \na person of intergrity and experience not being a legal practitioner appointed by \nthe President. \n\n(c) \n(d) \n(e) \n(f) \n\n(2) A member nominated under paragraph (e) or appointed under paragraph (f) \n\nof subsection (1) shall hold office for a period of two years, but shall be eligible for re- \nnomination or re-appointment, as the case may be, for another term of office for two \nyears: \n\nProvided that- \n\n(i) a member nominated under paragraph (e) may be removed from office by the \nrest of the members of the Commission acting together only for inability of the \nmember to discharge the functions of his or her office whether arising from \ninfirmity of mind or body or any other cause or for gross misbehaviour; or \n(ii) a member appointed under paragraph (f) may be removed from office by the \n\nPresident only for inability of the member to discharge the functions of his or her \noffice whether arising from infirmity of mind or body or any other cause or for \ngross misbehaviour. \n\n(3) A member of the Commission shall not enter upon the duties of his or her \n\noffice until he or she has taken and subscribed such oath for the due execution of his or \nher office as may be prescribed by Parliament. \n\n(4) The Judicial Service Commission shall not be subject to the direction or \n\ncontrol of any other person or authority in the exercise of its functions under this \nConstitution. \n\n(5) The Commission may regulate its own procedure and, subject to that \nprocedure, may act notwithstanding any vacancy in its membership or the absence of", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]CONSTITUTION OF BOTSWANAARRANGEMENT OF SECTIONS CHAPTER IPublic SealCHAPTER IV The ExecutivePART IMinisters and Assistant Ministers\n
The Republic1.
Declaration of Republic2.
CHAPTER IIProtection of Fundamental Rights and Freedoms of the Individual
3.Fundamental rights and freedoms of the individual
4.Protection of right to life
5.Protection of right to personal liberty
6.Protection from slavery and forced labour
7.Protection from inhuman treatment
8.Protection from deprivation of property
9.Protection for privacy of home and other property
10.Provisions to secure protection of law
11.Protection of freedom of conscience
12.Protection of freedom of expression
13.Protection of freedom of assembly and association
14.Protection of freedom of movement
15.Protection from discrimination on the grounds of race, etc.
16.Derogation from fundamental rights and freedoms
17.Declarations relating to emergencies
18.Enforcement of protective provisions
19.Interpretation and savings
CHAPTER III Citizenship20 to 29.......
The President and the Vice - President30.
Office of President31.
First President32.
Election of President after dissolution of Parliament33.
Qualification for election as President34.
Tenure of office of President35.
Vacancy in office of President36.
Discharge of functions of President during absence, illness, etc.37.
Oath of President38.
Returning officer at elections of President39.
Vice - President40.
Salary and allowances of President41.
Protection of President in respect of legal proceedingsPART II
The Cabinet42.
43.Tenure of office of Ministers and Assistant Ministers
44.Cabinet
45.Oaths to be taken by Ministers and Assistant Ministers
46.Secretary to the Cabinet
", + "page_start": 0, + "page_end": 0, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period \n\nduring which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason \n\nunable to perform the functions of his or her office, then, until a person has been \nappointed to and has assumed the functions of that office or until the Chief Justice has \nresumed those functions, as the case may be, those functions shall be performed by \nsuch one of the judges of the High Court or such other person qualified for appointment \nas a judge of the High Court as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \nshe has attained the age of 70 years or such other age as may be prescribed \nfor the purposes of section 97 of this Constitution; \n\n(ii) a person appointed under this subsection, who is not a judge of the High Court, \nmay, notwithstanding the assumption or resumption of the functions of the office \nof Chief Justice by the holder of that office, continue to act as a judge of the", + "page_start": 40, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "[html]( 4 )( c ) of this section, the areas of Gharzi and Kgalagada shall each have the option of either selecting one Member under subseclon ( 2 ) of this section or of each selecting two regional Members under subsection ( 4 )( c ) of this section, but m79.Qualifications for membership of Nilla ya Dikgeai ( 1 ) A person shall be qualified to be appointed under section 77 ( 1 )( b ) as aMemof the Ntlo ya Dikgosi if he or she —( a )is a citizen of Botswana ; and( b )has attained the age of 21 years( 2 ) No person shall be qualified to be appointed, selected or designated as aMemNo Manage and asked asked asked asked as a shewisher asknowledgement of allegian obedience or adherence to a foreign power or state ;( b )has been declared insolvent or adjudged or otherwise declared bankrupt under any law in force in any part of the Commonwealth or any country with aTablecomparable legal system and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full ;( c )is certified insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana ;( d )subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months :( e )is under sentence of death imposed on him or him or her by a count in any part of the Commonwealth or any country with a comparable legal system, or is under a sentence of imprisoment ( by whatever name collect ) exceeding six months imposed on hi( f )holds, or is acting in anyoffice the functions ofwhichinvolveary responsibility for, or in connection with, the conduct of any elections to the National Assembly or the complation or revision of any electoral register for the purposese( g )is disqualified for election to the National Assembly by virtue of provision made in pursuance of section 62 ( 2 ) of this Constitution. ( 3 ) For the purposes of this section, two or more terms of imprisonment that arerequiredd to be served consecutively shall be regarded as a single term of imprisonmentfor ththe aggregate period of those terms, and no account shall be taken of a sentence of risonment imposed as an alternative to or in default of the payment of a fine. ( 4 ) A Member of the NIb ya Dikgosi shall not, while he or she is such a Memberparticipantsin party politics, but active participation in politics prior to being a Member of Ntlo ya Dikgosi shall not bar any person from being such a Member.80.Every Member of the Ntic ya Dikgool shall, before taking his or her seat therein,takeand subscribe before the Ntlo ya Dikgosi the oath of allegiance.81.Secretary to Ntlo ya DikgosiThere shall be a Secretary to the NIIo ya Dikgosi whose office shall be an office ublic penvice.82.enure of office of Members of Ntlo ya Dikgool 11 ) A Member of the Ntlo", + "page_start": 35, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 \nof this Constitution, vest in the President. \n\n(2) The offices to which this section applies are- \n\n(a) Ambassador, High Commissioner or other principal representative of Botswana \n\nin any other country or accredited to any international organisation; \n\n(b) Secretary to the Cabinet; \n(c) Attorney-General; \n(cA) Director of Public Prosecutions; \n(d) Permanent Secretary; \n(e) Commissioner of Police; and \n(f) \n\nany other superscale office (other than an office to which this Constitution \nmakes specific provision for appointment or an office to which appointment is \nmade under the provisions of section 104 of this Constitution) which may be \nprescribed by Act of Parliament. \n\n**113. Tenure of office of Director of Public Prosecutions**\nprovisions of this section, a person appointed as Director of Public Prosecutions shall \nhold office for a 5 year renewable term or until he or she attains the age of 60 years, \nwhichever is the earlier. \n\n(1) Subject to the \n\n(2) A person holding the office of Director of Public Prosecutions may be \nremoved from office only for inability to perform the functions of his or her office (whether \narising from infirmity of body or mind or any other cause) or for misbehaviour or for \nincompetence and shall not be so removed except in accordance with the provisions of \nthis section. \n\n(3) If the President considers that the question of removing a person holding the \n\noffice of Director of Public Prosecutions from office ought to be investigated then- \n\n(a) \n\nhe or she shall appoint a tribunal which shall consist of a Chairman and not less \nthan two other members, who hold or have held high judicial office; and \nthe tribunal shall enquire into the matter and report on the facts thereof to the \nPresident and advise the President whether the person holding the office of \nDirector of Public Prosecutions ought to be removed from office under this \nsection for inability as aforesaid or for misbehaviour or for incompetence. \n(4) Where a tribunal appointed under subsection (3) of this section advises the \n\n(b) \n\nPresident that a person holding the office of Director of Public Prosecutions \nought to be removed from office for inability as aforesaid or for misbehaviour or \nfor incompetence, the President shall remove such person from office. \n\n(5) If the question of removing a person holding the office of Director of Public \n\nProsecutions from office has been referred to a tribunal under this section, the President \nmay suspend that person from performing the functions of his or her office, and any such \nsuspension may at any time be revoked by the President and shall in any case cease to \nhave effect if the tribunal advises the President that the person ought not to be removed \nfrom office. \n**114. Tenure of office of Auditor-General**\n\n(1) Subject to the provisions of this section, a person holding the office of Auditor- \nGeneral shall vacate his or her office when he or she attains the age of 60 years or such \nother age as may be prescribed by Parliament. \n\n(2) A person holding the office of Auditor-General may be removed from office \n\nonly for inability to perform the functions of his or her office (whether arising from \ninfirmity of body or mind or any other cause) or for misbehaviour and shall not be so \nremoved except in accordance with the provisions of this section. \n\n(3) If the National Assembly resolves that the question of removing a person \n\nholding the office of Auditor-General from office under this section ought to be", + "page_start": 48, + "page_end": 48, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "How much does AWS lambda charge when the function is not running ?", + "target_page": 52, + "target_passage": "there is no charge when your code is not running", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. \n\nThere are many types of invocation events. Some examples: \n\n• HTTP request from API Gateway \n\n• Schedule managed by an EventBridge rule \n\n• Message from an IOT device \n\n• Notification that a file was uploaded to an S3 bucket \n\n**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction.", + "page_start": 55, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\ncould be listening. The handler function might create and send another event to an SNS queue so \n\nthat alerts for high temperature are sent to users through SMS messages. \n\nThe function finally wraps up the JSON weather data into a new event and sends it back to API \n\ngateway. Afterward, the function continues to handle hundreds of additional requests. Request \n\nfrom users slow down after 2AM, so after some time the Lambda service will tear down the \n\nfunction execution environment to conserve resources. As a Customer, you will only be charged for \n\nfunction usage.", + "page_start": 38, + "page_end": 38, + "source_file": "serverless-core.pdf" + }, + { + "text": "Many traditional systems are designed to run periodically and process batches of transactions that \n\nhave built up over time. For example, a banking application may run every hour to process ATM \n\ntransactions into central ledgers. In Lambda-based applications, the custom processing should be \ntriggered by every event, allowing the service to scale up concurrency as needed, to provide near- \n\nreal time processing of transactions. \n\nWhile you can run cron tasks in serverless applications by using Amazon EventBridge Scheduler, \n\nconsider the size of each batch of data that your event sends to Lambda. In this scenario, there \n\nis potential for the volume of transactions to grow beyond what can be processed within the 15- \n\nminute Lambda timeout. If the limitations of external systems force you to use a scheduler, you \n\nshould generally schedule for the shortest reasonable recurring time period. \n\nFor example, it’s not best practice to use a batch process that triggers a Lambda function to fetch \n\na list of new Amazon S3 objects. This is because the service might receive more new objects in \n\nbetween batches than can be processed within a 15-minute Lambda function.", + "page_start": 24, + "page_end": 24, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. \n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required.", + "page_start": 59, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. \n\n**How to process events with a Lambda handler**\n\nConceptually, there are only three steps to processing events with Lambda: \n\n1. Configure the entry point to your function, known as the*handler*, and deploy the function. \n\n2. Lambda service initializes the function, then it invokes the*handler*with an invocation event and \n\ncontext. \n\n3. Your handler function processes the event and returns a response event. \n\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, \n\nthe function stays in memory, so clients and variables declared outside of the handler method can \n\nbe reused. \n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety \n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating \n\nthe runtime. \n\nThe function**handler**is the essential component of your function code. As noted previously, the \nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice \n\nis keeping the handler sparse and doing the actual processing in other functions in your code. \n\nHere are some example**handlers**: \n\nPython", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Handlers in interpreted languages can be deployed directly through the web-based AWS \n\nManagement Console. Compiled languages, such as Java and C#, or functions that use external \n\nlibraries are deployed using .zip file archives or container images. Because of that additional \n\nprocess, this guide will focus on Python for examples. \n\nRegardless of language, Lambda functions will generally return a*response event*on successful \n\ncompletion. The following program listing is an example response event to send back to API \n\nGateway so that it can handle a request: \n\n{ \n\n \"statusCode\": 200, \n\n \"headers\": { \n\n \"Content-Type\": \"application/json\" \n\n }, \n\n \"isBase64Encoded\": false, \n\n \"multiValueHeaders\": { \n\n \"X-Custom-Header\": [\"My value\", \"My other value\"], \n\n }, \n\n \"body\": \"{\\n \\\"TotalCodeSize\\\": 104330022,\\n \\\"FunctionCount\\\": 26\\n}\" \n\n} \n\n**How to write logs with serverless applications**\n\nYou might have noticed the logging statements in the preceding handler code. Where do those log \n\nmessages go? \n\nDuring invocation, the Lambda runtime automatically captures function output to Amazon \n\nCloudWatch. \n\nIn addition to logging your function's output, the runtime also logs entries when function \n\ninvocation starts and ends. This includes a report log with the request ID, billed duration,", + "page_start": 58, + "page_end": 58, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. \n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. \n\nRelated resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Workshop - Intro to Serverless**- Before diving too deep, you can choose to try out serverless in \na workshop or tutorial. Connect to a data source and create a REST API with your first Lambda \n\nfunction.” \n\n• Services used: AWS Management Console, Lambda, DynamoDB, API Gateway \n\n**Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The \n\nLambda runtime passes an*invocation event*and*context*to your Lambda function*handler*which \n\ndoes some work and produces a resulting event: \n\nThe*invocation event*contains data, as a JSON packet, which varies from service to service. For \n\nexample, API gateway events include path, HTTP method, query string parameters, headers, \ncookies, and more. DynamoDB events could contain updated or delete record data. S3 events \n\ninclude the bucket name and object key, among other things. \n\n*The context*contains information about the environment the function is running inside. Additional \n\ncontextual information can be set in familiar environment variables (ENV). \n\nThe function*handler*is a method in your function code that processes the inbound event. The \n\nhandler, which is a standard function in your language of choice, does some work and emits a*result*\n\n*event*.", + "page_start": 54, + "page_end": 54, + "source_file": "serverless-core.pdf" + }, + { + "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing.", + "page_start": 29, + "page_end": 29, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\n**Connect to functions with Function URLs**\n\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and \n\nconfigure a function URL through the Lambda console or the Lambda API. When you create a \n\nfunction URL, Lambda automatically generates a unique URL endpoint for you. Once you create a \n\nfunction URL, its URL endpoint never changes. Function URL endpoints have the following format: \n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the**Serverless Patterns Workshop**. The first module introduces a \nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway. \n\nAdditional modules provide practical examples of unit and integration testing, using \n\ninfrastructure as code to deploy resources, and how to build common architectural patterns \n\nused in serverless solutions.", + "page_start": 63, + "page_end": 63, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "What is the role of resource policies of lambda functions ?", + "target_page": 60, + "target_passage": "resource policy: Defines which events are authorized to invoke the function.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. \n\nThere are many types of invocation events. Some examples: \n\n• HTTP request from API Gateway \n\n• Schedule managed by an EventBridge rule \n\n• Message from an IOT device \n\n• Notification that a file was uploaded to an S3 bucket \n\n**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction.", + "page_start": 55, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "In traditional applications, you write code to do these tasks. You organize that code into**functions**. \nYou put the function code inside an application framework. Whichever framework you picked will \n\nrun inside a language dependent runtime environment. Finally, that runtime environment will be \n\nhosted on a virtual or physical server. \n\nSetting up, configuring and maintaining the frameworks, runtime environments, and virtual or \n\nphysical infrastructure slows down your delivery of features, bug fixes, and improvements. \n\n**What is Lambda?**\n\nIn Lambda, you write function code. Lambda runs the functions. That’s it. There are no servers.", + "page_start": 50, + "page_end": 50, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\n**Connect to functions with Function URLs**\n\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and \n\nconfigure a function URL through the Lambda console or the Lambda API. When you create a \n\nfunction URL, Lambda automatically generates a unique URL endpoint for you. Once you create a \n\nfunction URL, its URL endpoint never changes. Function URL endpoints have the following format: \n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the**Serverless Patterns Workshop**. The first module introduces a \nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway. \n\nAdditional modules provide practical examples of unit and integration testing, using \n\ninfrastructure as code to deploy resources, and how to build common architectural patterns \n\nused in serverless solutions.", + "page_start": 63, + "page_end": 63, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. \n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required.", + "page_start": 59, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. \n\n**How to process events with a Lambda handler**\n\nConceptually, there are only three steps to processing events with Lambda: \n\n1. Configure the entry point to your function, known as the*handler*, and deploy the function. \n\n2. Lambda service initializes the function, then it invokes the*handler*with an invocation event and \n\ncontext. \n\n3. Your handler function processes the event and returns a response event. \n\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, \n\nthe function stays in memory, so clients and variables declared outside of the handler method can \n\nbe reused. \n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety \n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating \n\nthe runtime. \n\nThe function**handler**is the essential component of your function code. As noted previously, the \nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice \n\nis keeping the handler sparse and doing the actual processing in other functions in your code. \n\nHere are some example**handlers**: \n\nPython", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing.", + "page_start": 29, + "page_end": 29, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. \n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. \n\nRelated resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\ncould be listening. The handler function might create and send another event to an SNS queue so \n\nthat alerts for high temperature are sent to users through SMS messages. \n\nThe function finally wraps up the JSON weather data into a new event and sends it back to API \n\ngateway. Afterward, the function continues to handle hundreds of additional requests. Request \n\nfrom users slow down after 2AM, so after some time the Lambda service will tear down the \n\nfunction execution environment to conserve resources. As a Customer, you will only be charged for \n\nfunction usage.", + "page_start": 38, + "page_end": 38, + "source_file": "serverless-core.pdf" + }, + { + "text": "Within the Lambda service, your function code is stored in a code package, deployed as a .zip or a \n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct \ninvocation of functions from outside of the Lambda service. \n\nWhat you will learn on your journey to building applications with Lambda: \n\n• How the event-driven programming model invokes Lambda functions \n\n• How to create, invoke, test, update, package, and secure functions \n\n• How the execution and runtime environment runs your functions \n\n• How to view logs and monitor your functions \n\n• Where to find hands-on opportunities to learn how to invoke functions", + "page_start": 51, + "page_end": 51, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Additional resources**\n\nOfficial AWS documentation: \n\n• AWS Identity and Access Management Documentation \n\n• Example IAM identity-based policies - an extensive list of example policies, including AWS \n\nLambda: Allows a lambda function to access an Amazon DynamoDB table which is useful in \n\nmicroservices \n\n• Grant least privilege section of the*Policies and permissions*chapter suggests a method to refine \n\npermissions for increased security \n\nResources from the serverless community: \n\n• Simplifying serverless permissions with AWSAWS SAM Connectors - AWS Compute blog post \n\nby Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM \n\nabstraction that creates minimally scoped IAM policies \n\n• Building AWS Lambda governance and guardrails - AWS Compute blog post by Julian Wood, \n\nSenior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless \n\nservice, simplifies cloud security and compliance so you can concentrate on your business logic. \n\n**Next Steps**\n\n• Work through the Getting Started Resource Center 30-45 min tutorial on Setting Up Your AWS \n\nEnvironment to properly set up your AWS account, secure the root user, create an IAM user, and \nsetup AWS CLI and (optionally) Cloud9 environment.", + "page_start": 49, + "page_end": 49, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", + "target_page": 63, + "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. \n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. \n\nRelated resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "4. The procedure to generate the snap on a Storwize V7000 system, including the most \n\nrecent statesave from each node canister, starts. This process might take a few minutes \n(see Figure 13-70). \n\nFigure 13-70 Task detail window \n\n**13.9.2 Collecting logs using the CLI**\n\nThe CLI can be used to collect and upload a support package as requested by IBM Support \nby performing the following steps: \n\n1. Log in to the CLI and issue the**svc_snap**command that matches the type of snap \nrequested by IBM Support: \n\n– Standard logs (type 1): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui1 \n\n– Standard logs plus one existing statesave (type 2): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui2 \n\n– Standard logs plus most recent statesave from each node (type 3): \n\nsvc_snap upload pmr=ppppp,bbb,ccc gui3 \n\n– Standard logs plus new statesaves: \n\nsvc_livedump -nodes all -yes \nsvc_snap upload pmr=ppppp,bbb,ccc gui3", + "page_start": 751, + "page_end": 751, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.9.1 Collecting information by using the GUI**\n\nTo collect information using the GUI, complete the following steps: \n1. Click**Settings**→**Support**and the Support Package tab (see Figure 13-68). \n\nFigure 13-68 Support Package option \n\n2. Click the**Upload Support Package**button. \n\nAssuming that the problem encountered was an unexpected node restart that logged a \n2030 error, we collect the default logs and the most recent statesave from each node to \ncapture the most relevant data for support. \n\n**Note:**When a node unexpectedly reboots, it first dumps its current statesave \ninformation before it restarts to recover from an error condition. This statesave is critical \nfor IBM Support to analyze what occurred. Collecting a snap type 4 creates statesaves \nat the time of the collection, which is not useful for understanding the restart event.", + "page_start": 749, + "page_end": 749, + "source_file": "sg247938.pdf" + }, + { + "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. \n\n**How to process events with a Lambda handler**\n\nConceptually, there are only three steps to processing events with Lambda: \n\n1. Configure the entry point to your function, known as the*handler*, and deploy the function. \n\n2. Lambda service initializes the function, then it invokes the*handler*with an invocation event and \n\ncontext. \n\n3. Your handler function processes the event and returns a response event. \n\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, \n\nthe function stays in memory, so clients and variables declared outside of the handler method can \n\nbe reused. \n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety \n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating \n\nthe runtime. \n\nThe function**handler**is the essential component of your function code. As noted previously, the \nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice \n\nis keeping the handler sparse and doing the actual processing in other functions in your code. \n\nHere are some example**handlers**: \n\nPython", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "[html]Example 7 - 23Files as a cache and prefetched in the cloud[ root01p - 10 - 0 - 2 - 217 *]+ 1s - 1a / gpfs / mongoafm / mongo /total 1460834 mongo mongo8192Nov916 : 59.drwxr - xr - x. 7 root40960ct3112 : 28...- rw ----------- 1 mongo root16384Nov914 : 38co11ect1on - 0 -- 1629751576978663310. wt- rw ----------- 1 mongo root36864Nov916 : 58co11ect : ion - 0 - 7744448727083060016. wt- rw ----------- 1 mongo root32768Nov914 : 39co11ect1on - 2 --- 1629751576978663310. wt- rw ----------- 1 mongo root145391Nov916 : 24co11ect : ion - 3 - 7744448727083060016. wt- rw ----------- 1 mongo root16384Nov914 : 38co11ect1on - 4 -- 1629751576978663310. wtdrwx ---------- 2 mongo root8192Nov1012 : 01diagnostic. data- rw ----------- 1 mongo root16384Nov914 : 38‘ index - 1 --- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov916 : 58‘ index - 1 - 7744448727083060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov916 : 58‘ index - 2 - 7744448727083060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------32768Nov914 : 39index - 3 -- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------3735552Nov916 : 24index - 4 - 7744448727083060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------16384Nov914 : 38index - 5 -- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------16384Nov915 : 27‘ index - 6 --- 1629751576978663310. wtZ mongo root8192Nov916 : 23journa1- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov915 : 31__mdb_cata1og. wt- rw ----------- 1 mongo root2Nov914 : 38mongod. lock- rw", + "page_start": 198, + "page_end": 198, + "source_file": "sg248459.pdf" + }, + { + "text": "**Tip:**If you are updating from V7.8 or later code, the 30-minute wait period can be \nadjusted by using the**applysoftware**CLI command with the -**delay (mins)**parameter \nto begin the update instead of using the GUI.", + "page_start": 715, + "page_end": 715, + "source_file": "sg247938.pdf" + }, + { + "text": "[html]Example 7 - 20Deleting Pod and maintaining the data[ root @ dcocp01 “]# oc get podsNAMETableTableREADYSTATUSRESTARTSAGEappmongo – i bm – mongob - dev1 / 1Running021hdocker - registry - 2 -dxwx1 / 1Running113drouter - 1 - g9btn1 / 1Runni ng113d[ root @ dcocp01 “]#c de1te pod appmongo - 1bm - mongodb - devpod “ appmongo – ibm – mongod– development deleted[ root @ dcocp01 “]# 1 total 146028- 1an † smongof ' s / mongo /drwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------mong4096Nov1012 : 07.drwxr - xr - x. 4 rootroot40960ct3112 : 28.- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter16384Nov1012 : 07co11ection - 0 -- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter24576Nov1012 : 07co11ection - 0 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters32768Nov1012 : 07co11ection - 2 --- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter145391616Nov1012 : 07co11ecti1on - 3 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07co11ection - 4 -- 16295157678663310. wtdrwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter4096Nov1012 : 07diagnostc. d- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07index - 1", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + }, + { + "text": "To create and start a snapshot, complete the following steps: \n1. Open the FlashCopy window from the**Copy Services**→**FlashCopy**menu. \n\n2. Select the Volume that you want to create a snapshot of, and right-click it or click \n**Actions**→**Create Snapshot**, as shown in Figure 11-32. \n\n\n \n \n \n \n [html]13 - Kitters : *--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------UNANUNANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUGUNANUSANUSFirst - stratum :\n
16 - K
1989Short - termItemFragmentGapadyGroupFlarcTime
#----
33 : 3600027 coord061.0531319.99First ARHS Allow
--------
\n\nFigure 11-32 Single-click snapshot creation and start \n\n3. You can select multiple volumes at a time, which creates as many snapshots \n\nautomatically. The system then automatically groups the FlashCopy mappings in a new \nconsistency group, as shown in Figure 11-33. \n\nFigure 11-33 Selection single-click snapshot creation and start \n\n4. For each selected source volume, the following actions occur: \n\n– A FlashCopy mapping is automatically created. It is named by default fcmapXX. \n\n– A target volume is created. By default the source name is appended with a_XX suffix. \n\n– A consistency group is created for each mapping, unless multiple volumes were \nselected. Consistency groups are named by default fccstgrpX. \n\nThe newly created consistency group is automatically started. \n\n**11.2.5 Single-click clone**\n\nThe*clone preset*creates a replica of the volume, which can be changed without affecting the \noriginal volume. After the copy completes, the mapping that was created by the preset is \nautomatically deleted. \n\nThe clone preset uses the following parameters: \n\n(cid:2) Background copy rate: 50 \n(cid:2) Incremental: No \n(cid:2) Delete after completion: Yes", + "page_start": 501, + "page_end": 501, + "source_file": "sg247938.pdf" + }, + { + "text": "2. We collect the type 3 (option 3) and have it automatically uploaded to the PMR number \nthat is provided by IBM Support, as shown in Example 13-6. \n\nExample 13-6 The svc_snap command \n\nssh superuser@9.173.156.250 \nPassword: \nIBM_Storwize:ITSO-V7k:superuser>**svc_snap upload pmr=12345,000,866 gui3**\n\nIf you do not want to automatically upload the snap to IBM, do not specify the**upload**\n**pmr=ppppp,bbb,ccc**part of the commands. When the snap creation completes, it creates a \nfile named that uses the following format: \n\n3. \n\n/dumps/snap..YYMMDD.hhmmss.tgz \n\nIt takes a few minutes for the snap file to complete (longer if statesaves are included). \n4. The generated file can then be retrieved from the GUI clicking**Settings**→**Support**→ \n**Manual Upload Instructions**twisty →**Download Support Package**and then, clicking \n**Download Existing Package**, as shown in Figure 13-71.", + "page_start": 752, + "page_end": 752, + "source_file": "sg247938.pdf" + }, + { + "text": ": 10 : 03.419 ***********neonatal nether_tature : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 19 : 18 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 1Ensure openshift - ans1bTe instalTer package deps aropensh1ft_excluder : Insta11 docker excluder - yunopensitif1_tepas :: hefresh cache --------------------------------------------------------------------------------------------------------------------------------------------------------------------------canta / ner_rantine : Start the Docker service.................................................................................................................................................................cantalner_runtite : Create credentials for aregur1 ~ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6opensh1ft_repos :: Ensure 11bse11nux - python 1.1nsta1ledcantalner_runt. tire : F1xap SELInux pemI ss1ans for dacker.....................................................................................................................................................α_1Yrexil1 | :: [ nstal1 | firexil1d patkeges : -----------------------------------------------------------------------------------------------------------------------------------------------------------------Gather ’ ttg Facts “----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------container_runtine : Get current 1nstal1ed Docker vers10nGather † tg Tacts →~~~~~–‐–‐–‐–‐–‐–‐–‐–>–>––––––––––––––––––––––––––––––––––––Start and enable rtp0 / ctmttryd - envent - envent - envent - envent - envent - envent - envent - relatedas_firexil1 : Ensure tptables services are not enabled ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐Check for NetworkNatuger Service ‐ concentration ‐ concentration ‐ concentration ‐ concentrationscontalner_runtine : Setup the docker - storage for overlay--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At Shentel company, what determines an employees pension ?", + "target_page": 22, + "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**SHAREHOLDER INFORMATION**\n\n\n\n**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. \n\n**FORMS 10-K, 10-Q, and 8-K**\n\n**The Company files periodic reports with the Securities and Exchange Commission. The Company's Annual**\n**Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any**\n**amendments to these reports, are available to shareholders through the Company’s website, www.shentel.com.**\n**This website also has recent news releases and other information potentially of interest to shareholders.**\n\n**A copy of the Company’s Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by**\n**writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia**\n**22824, Attention: Secretary.**\n\n**MARKET AND DIVIDEND INFORMATION**\n\nThe Company's stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the \nThe Company’s stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high \nhigh and low sales prices per share of common stock as reported by the NASDAQ National Market for the last two years \nand low closing prices per share of common stock as reported by the NASDAQ National Market for the last two years is \nis set forth below: \nset forth below: \n\n\n \n \n \n \n [html]20032002\n
Qtr. 1Qtr. 2Qtr. 3Qtr. 4Qtr. 1Qtr. 2Qtr. 3Qtr. 4
High price$ 24.31$ 24.98$ 25.48$ 27.50$ 20.06$ 27.25$ 27.25$ 25.95
Low price$ 13.64S 14.33$ 19.25$ 19.74$ 16.50$ 19.69$ 22.75$ 21.61
\n\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\nCALL (540) 984-5200 \nCALL (540) 984-5200 \nTransfer Agent - Common Stock \nTransfer Agent - Common Stock \nShenandoah Telecommunications Company \nShenandoah Telecommunications Company \nP.O. Box 459 \nP.O. Box 459 \nEdinburg, VA 22824 \nEdi b \nVA 22824", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENTEL SERVICE AREAS**", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**(27) Employee Benefit Plans**\n\nE u ronet has established a Profit Sharing and 401(k) plan for all employees who have completed six months of service and are not otherw i s e \nc o v e red by a re t i rement benefit plan (national or private) outside of the US. Each plan participant can contribute up to the maximum \namount allowed by the Internal Revenue Service to the Plan through payroll deductions. Euro n e t ’s matching contribution to the plan is \nd i s c re t i o n a ry and is determined each year by the Board of Directors. The employee’s vested percentage re g a rding the employer’s contribution \nvaries according to years of service. Euro n e t ’s contribution accrual to the Plan for the years ended December 31, 2000, 1999 and 1998 was \n$213,000, $159,000 and $26,000 re s p e c t i v e l y. \n\nE u ronet maintains both a fully funded and self-funded health insurance programs, which cover all full-time employees and their families at \nno charge to the employees. In order to administer the self-funded program, Euronet has entered into a contractual agreement with a third \np a rty administrator by which Euronet pays a monthly service fee to the administrator based upon employee enrollment participating in the \nself-funded plan. Euronet has also purchased a stop/loss insurance policy to limit Euro n e t ’s self-funded liability to $25,000 per employee per \nyear and a total loss on all claims to approximately $31,000 per month. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 45, + "page_end": 45, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
EmployerEmployeeTotal
2013$ 101$ ≥ 6$ 127
3 / 17eq> 11 / 8
\n\n\n \n \n \n \n [html]5.1 %4.5 %5.5 %\n
Weighted average of significant assumptions :Defined benefit obligationDiscount rate
Rate of compensation increase3.0 %3.0 %
Mortality rateCPM - RPP2014 PrivUP94 Generational
Pension expenseDiscount rate4.5 %
Rate of compensation increase3.0 %3.0 %
Mortality rateUP94 GenerationalUP94 Generational
", + "page_start": 122, + "page_end": 122, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The cost of pensions is actuarially determined and takes into account
the following assumptions and methods for pension accounting related to our defined benefit plans :
• the expected rates of salary increases for calculating increases in future benefits
• mortality rates for calculating the life expectancy of plan members, and
• past service costs from plan amendments are immediately expensed in net income.
We recognize contributions to defined contribution plans as an employee benefit experse in operating costs in the consolidated statements of income in the periods the employees provide the related senices.
See note 22 for more information about our pension plans.
Termination Benefits
We recognize termination benefits as an expense when we are committed to a formal detailed plan to terminate employment before the normal retirement date and it is not realistic that we will withdraw it.
Property, Plant and Equipment
Recognition and Measurement
We recognize property, plant and equipment at cost, less accumulated depreciation and accumulated impairment losses.
Cost includes expenditures that are directly attributable to the acquisition of the asset. The cost of self - constructed assets also includes :
• the cost of materials and direct labour
· costs directly associated with bringing the assets to a working condition for their intended use
· costs of dismantling and removing the items and restoring the site where they are located ( see Provisions, above ), and • borrowing costs on qualifying assets.
We use estimates to determine certain costs that are directly attributable to self - constructed assets. These estimates primarily includecertain internal and external direct labour associated with the acquisition, construction, d
They also include interest costs, which we capitalize to certain property, plant and equipment during construction and development.
We use significant estimates to determine the estimated useful lives of property, plant and equipment, considering industry tends such as technological advancements, our past experience, our expected use and our review of asset lives
", + "page_start": 101, + "page_end": 101, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The Company maintains a nonqualified deferred retirement plan for certain key \nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their \nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on \nthe deferred balances, as a retirement fund. Participants receive a Company match of \nup to 4% of salary, net of any Company match received under the Company’s 401(k) \nplan. All employee deferrals vest immediately. The Company matching contributions \nvest ratably over a three-year period. The Company recorded charges for matching \ncontributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002.", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**\n\n*statement of financial position*\n*consist of:*\nThe Company has defined contribution profit-sharing plans cover- \n Accrued benefit liability **$** **(493)** $ (9,784) $ (8,882) \ning substantially all employees who are not participants in certain \n Net amount recognized at \nyear-end, included in \ndefined benefit plans. The Company’s annual contribution to the de- \n Other Liabilities **$** **(493)** $ (9,784) $ (8,882) \nfined contribution plans is based on employee eligible earnings and \nEstimated Future Benefit Payments (In thousands) \nresults of operations and amounted to $26,489,000, $23,524,000, \n$ \nand $24,826,000 in 2003, 2002, and 2001, respectively. \n\nThe Company sponsors defined benefit plans which include \n\na limited number of salaried and hourly employees at certain subsidiar- \n\n Fiscal 2004 \n Fiscal 2005 \n Fiscal 2006 \n Fiscal 2007 \n Fiscal 2008 \n Fiscal 2009 – 2013 1,133 \n1,189 \n1,195 \n1,217 \n 1,265 \n 6,874 \nies. The Company’s funding policy is generally to contribute annually \n\n*Expected Contributions During Fiscal 2004*\n Total $ 12,873 \nthe minimum actuarially computed amount. Net pension costs relating \n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, \nPlan Assets – Percentage of Fair Value by Category \n**2003**\nrespectively. The actuarial present value of obligations, less related plan \n\n Equity \n Debit \n Other **0%**\n**0%**\n**100%**\n\nassets at fair value, is not significant. \n\nThe Company also participates in a multiemployer plan, \n Total **100%**\nwhich provides defined benefits to certain of the Company’s union", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "employees. Pension expense for this plan amounted to $309,000, \n\n$309,000, and $310,000 in 2003, 2002, and 2001, respectively. \n\n**Postretirement Health Care**\n\nIn accordance with the guidelines of revised SFAS No. 132, “Employers’ \n\nDisclosures about Pensions and other Postretirement Benefits,” the fol- \n\nlowing table sets forth the funded status of the plan, reconciled to the \n\naccrued postretirement benefits cost recognized in the Company’s bal- \n\nance sheet at: \n\n**2003** 2002 2001 \n\n\n \n \n \n \n [html]\n
Number of SharesWeighted - Average Exercise Price
Outstanding at December 30.2000 Granted Exercised Forfeited918.250266.500 ( 17.500 ) ( 37.000 )$ 21.8923.3918.3121.57
Outstanding at December 29.2001 Granted Exercised Forfeited1.130.250290.000C ( 17.000 )$ 22.3225.77 *** 21.69
Outstanding at December 28.2002 Granted Exercised Forfeited1.403.250446.500 ( 362.000 ) ( 18.500 )$ 23.0326.7823.1023.57
Outstanding of Jumuory 3.2ooid Options exercisable at : dansary 3, zoo4December at 8, zooa December 20.20011.469.250202.250156.250105.0008 34 - 158 = 5.47 ± 5.02 ± 4.86
\n\n*(In thousands)*\n\n*Change in benefit obligation*\n Benefit obligation at beginning \n\n of year \n Service cost \nInterest cost \n Benefits paid \n Actuarial (gain) or loss \n Current year prior service cost **$ 17,617**\n**249**\n**1,105**\n**(1,206)**\n**566**\n**–** $ 17,351 \n398 \n1,091 \n (1,356) \n133 \n– $ 12,229 \n278 \n941 \n(952) \n 3,042 \n1,813 \n Benefit obligation at end of year**$ 18,331** $ 17,617 $ 17,351 \n\n*Change in plan assets*\n Fair value at beginning of year**$**\n Employer contributions \n Benefits paid **–**\n**11,456**\n**(1,206)**\n\n$ \n\n– \n1,356 \n (1,356) – \n952 \n(952) \n\nNumber \nAverage Exercisable \nExercise at January 3, \n2004 \n\n Fair value at end of year **$ 10,250** $ – $ – \n\n*Reconciliation of funded status*\n Funded status \n Unrecognized actuarial (gain) \n\nPrice \n**$ (8,081)** $ (17,617) $ (17,351) \n\nThe following table summarizes information about fixed stock options \n\noutstanding at January 3, 2004: \n\nOptions \nExercisable Options Outstanding \n\nWeighted- \nAverage \nRange of \nRemaining \nExercise Prices Outstanding Contractual Life \n\nWeighted- \n\nNumber \n\n$24.50–$28.25 \n $32.22 \n $23.47 \n$18.31–$26.69 \n$23.32–$25.27 \n$25.75–$25.77 \n$25.50–$42.98 31,000 \n20,000 \n101,250 \n411,000 \n223,500 \n261,000 \n421,500 2.9 years \n4.1 years \n5.1 years \n6.6 years \n7.1 years \n8.1 years \n9.2 years $ 25.71 \n$ 32.22 \n$ 23.47 \n$ 20.42 \n$ 23.41 \n$ 25.77 \n$ 26.83 31,000 \n 20,000 \n 101,250 \n 50,000 \n– \n– \n– \n\n or loss **1,105**\n\n Unrecognized transition \n obligation or (asset) \n**5,361**\n**1,122** Unrecognized prior service cost \n\n Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \nfive years and in the aggregate for the subsequent five years: \n\n**Year Ended June 30, 2012**\n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\nYear Ended June 30, 2011 \n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\nYear Ended June 30, 2010 \n\nNet sales \n\nOperating income for reportable segments \n\nAssets used in the business \n\nDepreciation and amortization of property \n\nCapital expenditures \n\n\n \n \n \n \n [html]Pension BenefitsRetiree Health Care Benefits\n
During Fiscal Years
2013$6.200$240
20145.900240
20155.700240
20164.500240
20171.700260
2018 through 202215.2001.420
\n\n**$ 2,375,445**\n\n**178,476**\n\n**962,183**\n\n**11,236**\n\n**26,021**\n\n$ 2,212,849 \n\n157,591 \n\n914,931 \n\n11,234 \n\n20,431 \n\n$ 1,893,208 \n\n103,823 \n\n891,520 \n\n11,465 \n\n7,216 \n\nService Center \nBased Distribution \n\n**$ 1,904,564**\n\n**135,240**\n\n**731,915**\n\n**9,403**\n\n**24,339**\n\n$ 1,770,798 \n\n115,798 \n\n700,486 \n\n9,152 \n\n19,392 \n\n$ 1,536,543 \n\n77,029 \n\n690,970 \n\n9,336 \n\n6,389 \n\nFluid Power \nBusinesses \n\n**$ 470,881**\n\n**43,236**\n\n**230,268**\n\n**1,833**\n\n**1,682**\n\n$ 442,051 \n\n41,793 \n\n214,445 \n\n2,082 \n\n1,039 \n\n$ 356,665 \n\n26,794 \n\n200,550 \n\n2,129 \n\n827", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "E M P L O Y E E R E T I R E M E N T A N D B E N E F I T P L A N S 11 \n\nA noncontributory defined benefit retirement plan is maintained for all regular employees of the Company except those of Quest Medical. This plan was \namended effective January 1, 1998 to become a cash balance pension plan. The Company’s funding policy is to make the annual contributions required by \napplicable regulations and recommended by its actuary. The Company uses a December 31 measurement date for the plan. \n\nThe changes in the plan’s projected benefit obligation (“PBO”) as of December 31, 2003 and 2002 are as follows (in thousands): \n\n2003 2002 \n\n**C H A N G E I N B E N E F I T O B L I G A T I O N :**\n\nBenefit obligation, January 1 $ 4,170 $ 4,599 \n\nService cost 214 320 \n\nInterest cost 298 307 \n\nAmendments —- (616) \n\nActuarial (gain)/loss 529 (93) \n\nBenefits paid (333) (347) \n\nIn December 2002, the plan was amended to reduce benefit accruals for future service by plan participants by approximately 50 percent. This amendment \ncaused a reduction in the PBO of approximately $616,000, and is reflected as a reduction in pension expense over the estimated employee service lives. \n\nThe changes in the fair value of plan assets, funded status of the plan and the status of the prepaid pension benefit recognized, which is included in the \nCompany’s balance sheets as of December 31, 2003 and 2002 are as follows (in thousands): \n\n\n \n \n \n \n [html]\n
20032002
CBAN GE 1N P1AN ASSET51
Fair value of plan zessets, January 1$4.383$4.550
Actual return on plan assets963( 750 )
Employer contributions400930
Benefits paid( 333 )( 347 )
Fair value of plan assets, December 31$5.413$4.385
Funded status of plan$535$213
Unrecognized actuarial loss1.9412.154
Unrecognized prior service cost( 502 )( 539 )
Unrecognized net transition obligation( 88 )( 132 )
Net amount recognized as other assets$1.886$1.696
", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_ATRI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", + "target_page": 53, + "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\n\nis the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. \nAt December 31, 2003, the Company had external investments totaling $7.5 million. \n\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The \nCompany will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. \nThe bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% \nover the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the \nCompany with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and \nassuming we had converted the stock at the beginning of 2003. \n\n**Financial Condition, Liquidity and Capital Resources**\n\nThe Company has four principal sources of funds available to meet the financing needs of its operations, capital \nprojects, debt service, investments and potential dividends. These sources include cash flows from operations, cash \nand cash equivalents, the liquidation of investments and borrowings. Management routinely considers the alternatives \navailable to determine what mix of sources are best suited for the long-term benefit of the Company. \n\nDuring the 2003 year, with the closing of the sale of the Virginia 10 RSA Limited partnership interest, the Company \nevaluated its capital requirements, and as a result eliminated its $20.0 million revolving line of credit with CoBank in May \n2003. The Company had paid off the outstanding balance in early 2003, and did not borrow on it during the remaining time \nthe facility was in place. In light of the $27.9 million balance in cash equivalent investments, management determined \nadditional debt capacity is not necessary for the near-term. \n\nThe term debt loan agreements with CoBank have three financial covenants. These are measured on a trailing 12-month \nbasis and are calculated on continuing operations. The first of the covenants is the total leverage ratio, which is total debt to \noperating cash flow. This ratio must remain below 3.5, and as of December 31, 2003 it was 1.2. The second measure is \nequity to total assets, which must be 35% or higher. At December 31, 2003 the ratio was 57.3%. The third measure is the \ndebt service coverage ratio, which is operating cash flow to scheduled debt service, which must exceed 2.0. At December 31, \n2003 this measure was 4.3. Management believes the Company will meet these covenant measures for the coming year. The \nCompany has pledged all of its affiliates capital stock as collateral for the CoBank loans. \n\nThe Company’s covenants on the RUS/RTB debt require the pledge of all current and future assets of the Telephone \nsubsidiary until the debt is retired. \n\nAnother external source of funding is a $0.5 million unsecured, variable rate revolving line of credit with SunTrust \nBank. This facility is in place to allow the Company to better manage its daily cash balances. The facility expires \nMay 31, 2004. Management anticipates renewing this facility with SunTrust Bank under similar terms and conditions. \nAt December 31, 2003 there were no balances outstanding under this facility. \n\nDue to make-whole provisions in the Company’s debt agreements it is currently uneconomical for the Company to \nprepay any debt. \n\nThe Company is obligated to make future payments under various contracts it has entered into, including amounts \npursuant to its various long-term debt facilities, and non-cancelable operating lease agreements for retail space, tower \nspace and cell sites. Expected future minimum contractual cash obligations for the next five years and in the aggregate \nat December 30, 2003, are as follows:", + "page_start": 53, + "page_end": 53, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company.", + "page_start": 41, + "page_end": 41, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**2003 Financial Statements**\n\n\n\n**INDEPENDENT AUDITOR’S REPORT**\n\n\n\nThe Board of Directors and Shareholders \nShenandoah Telecommunications Company: \n\nWe have audited the accompanying consolidated balance sheets of Shenandoah Telecommunications Company and \nsubsidiaries (the Company), as of December 31, 2003, 2002, and 2001, and the related consolidated statements of \nincome, shareholders’ equity and comprehensive income, and cash flows for the years then ended. These consolidated \nfinancial statements are the responsibility of the Company’s management. Our responsibility is to express an opinion \non these consolidated financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. \nThose standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. We \nbelieve that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the \nfinancial position of Shenandoah Telecommunications Company and subsidiaries as of December 31, 2003, 2002 and \n2001, and the results of their operations and their cash flows for the years then ended, in conformity with accounting \nprinciples generally accepted in the United States of America. \n\nAs discussed in note 1 to the consolidated financial statements, the Company changed its method of accounting for \ngoodwill in 2002. As further discussed in note 1 to the consolidated financial statements, the Company changed its \nmethod of accounting for asset retirement obligations in 2003. \n\n\n\n\n \n \n \n \n [html]\n
Richmond, Virginia
February 6.2004
", + "page_start": 12, + "page_end": 12, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF SHAREHOLDERS’ EQUITY AND COMPREHENSIVE INCOME**\n\n\n\n\n \n \n \n \n [html]\n
SharesCommon StockRetained EarningsAccumulated Other Comprehensive Income ( loss )Total
Balance, January 1.2001 Comprehensive income :7.518$ 4.817$ 55.873$ 5.645$ 66.335
Net income--16.372-16.372
Net unrealized change in securities available - for - sale, net of tax of $ 3.482 Total comprehensive income vidends declared ($ 0.35 per share )---( 5.603 )__ ( 5.603 )
Statements decisions--( 2.635 )-$ 10.769 – 850 ( 2.635 )
Common stock issued through exercise of incentive stock options12133--133
Balance, December 31.20017.530$ 4.950$ 69.610$42
$ 74.602Comprehensive income : Net income--4.519-
4.519Net unrealized change in securities available - for - sale, net of tax of $ 29---( 46 )
( 46 )Total comprehensive incomeS_4.473Dividends declared ($ 0.37 per share ) Common stock issued through eye--
( 2.794 )-( 2.794 )Common stock issued through exercise of incentive stock options and stock grants22296
--296Balance, December 31.2002 Comprehensive income7.552$ 5.246
$ 71.335$( 4 )$ 76.577Net income.
.32.074.32.074Net unrealized change in securities available - for - sale, net of tax of S ( 18 ) Total comprehensive income.
..30___30Dividends declared ($ 0.39 per share )
--( 2.960 )$ 32.104Common stock issued through exercise of incentive stock optionsBalance, December 31.200341
487--4877.593$ 5.733
", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company provided for income taxes of $5.3 million in 2003, which is an effective tax rate of 35.2% due to the \neffect of state tax apportionment rules and reduction in the liability for tax exposures. On a normalized basis the \nCompany would have recorded taxes at an effective tax rate of approximately 39%. Last year’s effective tax rate was \n42.2% due to the impact of net operating loss carry forwards generated in several states with higher tax rates. The \nCompany currently operates in four states. Due to apportionment rules and geographic operations of subsidiaries \nwhere the Company’s profits and losses arise, the Company is generating profits in states with lower tax rates, while \ngenerating losses in states with higher tax rates. The Company cautions readers that the current effective tax rate may \nnot be the same rate at which tax benefits or tax expenses are recorded in the future. The Company’s state \napportionments, profits and losses and state tax rates may change, therefore changing the effective rate at which taxes \nare provided for or at which tax benefits accrue. In the near term, under existing operating results and current tax rates, \nthe Company anticipates a normalized effective tax rate will be approximately 39%. \n\nNet income from continuing operations was $9.8 million, an increase of $12.7 million from 2002. The results are \nprimarily made up of the improvement in the PCS operation and the one-time impact of the losses on the sale of \nVeriSign stock in 2002. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 48", + "page_start": 49, + "page_end": 49, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n\n\n\n \n \n \n \n [html]\n
200320022001
Cash Flows From Financing Activities
Proceeds from issuance of long - term debt$$-
$ 24.641Principal payments on long - term debt( 8.697 )( 4.393 )
( 23.692 )Net proceeds from ( payments of ) lines of credit( 3.503 )( 2.697 )
6.200Debt issuance costs--
( 175 )Dividends paid( 2.960 )( 2.794 )
( 2.635 )Proceeds from exercise of incentive stock options487296
133Net cash provided by ( used in ) financing activities$( 14.673 )$ ( 9.588 )
$ _4.472Net cash used in continuing operations$ 3.477$ ( 7.573 )
$ ( 6.952 )Net cash provided by discontinued operations23.0107.745
6.444Net increase ( decrease ) in cash and cash equivalents$ 26.487$ 172
$ ( 508 )
Cash and cash equivalents :Beginning2.2092.037
2.545Ending$ 28.696$ 2.209
$ 2.037
Supplemental Disclosures of Cash Flow Information Cash payments for : Interest, net of capitalized interest of S26 in 2003 ; S93 in 2002 ; and S134 in 2001$ 3.577$ 4.274$ 4.217
Income taxes$ 15.569$ 1.045$
\n\nDuring 2002, the Company issued 4,654 shares of Company stock to employees valued at $0.1 million \nin recognition of the Company’s 100th year anniversary. \n\nIn December 2001, the Company received 310,158 shares of VeriSign Inc. common stock in exchange \nfor 333,504 shares of Illuminet Holdings, Inc. stock as a result of the merger of the two entities. \n\nThe Company completed the sale of its GSM network equipment in January 2001, for approximately \n$6.5 million of which approximately $4.9 million was escrowed as part of a like-kind exchange \ntransaction. The escrowed funds were disbursed as new equipment was received during the first six \nmonths of 2001.", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n\n\n\n \n \n \n \n [html]\n
200320022001
Cash Flows from Operating Activities
Income ( loss ) from continuing operations$ 9.761$ ( 2.893 )$ 9.694
Adjustments to reconcile net income to net cash provided by operating activities :
Depreciation16.61214.47610.540
Amortization196723
Deferred income taxes5.6642898.666
Loss on disposal of assets348739506
Net ( gain ) loss on disposal of investments39.034( 14.162 )
Net ( gain ) loss from patronage and equityinvestments52393
789
Other
403443987Changes in assets and liabilities :
( Increase ) decrease in :Accounts receivable1.069( 1.797 )
( 864 )
Materials and supplies( 275 )1.147( 307 )
Increase ( decrease ) in :Accounts payable( 275 )1.067
( 3.968 )Other prepaids, deferrals and accruals( 2.778 )120
( 2.263 )
Net cash provided by operating activities
$ 30.599$ 23.024$ 10.341Cash Flows From Investing Activities
Purchase and construction of plant and equipment, net of retirements$ ( 12.476 )$ ( 22.612 )$ ( 27.972 )
Purchase of investment securities( 796 )( 1.775 )( 1.250 )
Proceeds from sale of equipment109
77482Proceeds from sale of radio spectrum licenseSpecificity
1.133Proceeds from investment activities ( Note 3 )7143.301
", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED BALANCE SHEETS**\n\n\n\n\n \n \n \n \n [html]2003\n
LIABILITIES AND SHAREHOLDERS ’ EQUITY20022001
Current Liabilities
Current maturities of long - term debt ( Note 5 )$ 4.230$ 4.482$ 4.387Revolving line of credit ( Note 5 )
-3.5036.200Accounts payable ( Note 7 )
4.7295.0035.128Advanced billings and customer deposits3.326
3.5382.652Accrued compensation1.015
1.2681.084Other current liabilities2.496
1.5641.455Current liabilities held for sale ( Note 2 )-
542735Total current liabilities$ 15.796
$ 19.900$ 21.641Long - term debt, less current maturities ( Note 5 )$ 39.116
$ 47.561$ 52.049Other LiabilitiesDeferred income taxes ( Note 6 )
$ 20.819
$ 15.859$ 14.977Pension and other ( Note 9 )3.4252.441
2.265Total other liabilities$ 24.244$ 18.300
$ 17.242Minority Interests in discontinued operations ( Note 2 )$-
$ 1.666$ 1.838
\n\n$ \n\n5,246 \n71,335 \n(4) \n$ 76,577 $ 4,950 \n69,610 \n42 \n$ 74,602 **5,733**\n**100,449**\n**26**\n**$ 106,208**\n\n**$**\n\n$164,004 $167,32 \n$167,372 **$ 185,364**", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 1. Summary of Significant Accounting Policies**\n\n***Description of business:***Shenandoah Telecommunications Company and subsidiaries (the Company) provides \ntelephone service, wireless personal communications service (PCS) under the Sprint brand name, cable television, \nunregulated communications equipment sales and services, Internet access, and paging services. In addition, the \nCompany leases towers and operates and maintains an interstate fiber optic network. The Company's operations are \nlocated in the four state region surrounding the Northern Shenandoah Valley of Virginia. Pursuant to a management \nagreement with Sprint Communications Company and its related parties (collectively, “Sprint”), the Company is the \nexclusive PCS Affiliate of Sprint providing wireless mobility communications network products and services in the \ngeographic area extending from Altoona, Harrisburg and York, Pennsylvania, south through Western Maryland, and \nthe panhandle of West Virginia, to Harrisonburg, Virginia. The Company is licensed to use the Sprint brand name in \nthis territory, and operates its network under the Sprint radio spectrum license (Note 7). A summary of the Company's \nsignificant accounting policies follows: \n\n***Stock split:***All share and per share information reflect the two for one stock split announced in October 2003, to \nshareholders of record as of the close of business on January 30, 2004. The additional shares were distributed on \nFebruary 20, 2004. The effective date of the split is February 23, 2004. All previously reported share and per share \ndata included herein are retroactively adjusted to reflect the split. \n\n***Principles of consolidation:***The consolidated financial statements include the accounts of all wholly owned \nsubsidiaries and other entities where effective control is exercised. All significant intercompany balances and \ntransactions have been eliminated in consolidation. \n\n***Use of estimates:***Management of the Company has made a number of estimates and assumptions related to the \nreporting of assets and liabilities, the disclosure of contingent assets and liabilities at the date of the consolidated \nfinancial statements and the reported amounts of revenues and expenses during the reporting periods. Management \nreviews its estimates, including those related to recoverability and useful lives of assets as well as liabilities for income \ntaxes and pension benefits. Changes in facts and circumstances may result in revised estimates and actual results could \ndiffer from those reported estimates. \n\n***Cash and cash equivalents:***The Company considers all temporary cash investments purchased with a maturity of \nthree months or less to be cash equivalents. The Company places its temporary cash investments with high credit \nquality financial institutions. At times, these investments may be in excess of FDIC insurance limits. Cash and cash \nequivalents were $28.7million, $2.2 million, and $2.0 million at December 31, 2003, 2002 and 2001, respectively.", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be \nreleased after February 28, 2005. There are no known claims that have been filed against the amount in escrow. \n\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the \nyear. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of \nthe second phase of renovations on the Shentel Center in Edinburg, Virginia. \n\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving \nunconsolidated, limited purpose entities or commodity contracts. \n\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for \nadditional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and \nreplacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers \nbuilding renovations, vehicles, office equipment, and other miscellaneous capital needs. \n\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures \nand the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the \ntax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal \ntax payments will be due based on anticipated profits expected to be generated in the operation. \n\nManagement anticipates its operations will generate similar operating cash flows in 2004, compared to those of \ncontinuing operations in 2003, although there are events outside the control of the Company that could have an adverse \nimpact on cash flows from operations. The events that could adversely impact operating cash flow results include, but \nare not limited to; changes in overall economic conditions, regulatory requirements, changes in technologies, \navailability of labor resources and capital, and other conditions. The PCS subsidiary's operations are dependent upon \nSprint’s ability to execute certain functions such as billing, customer care, and collections; their ability to develop and \nimplement successful marketing programs and new products and services; and their ability to effectively and \neconomically manage other operating activities under the Company's agreements with Sprint. Additionally, the \nCompany's ability to attract and maintain a sufficient customer base is critical to maintaining a positive cash flow from \noperations. These items individually and/or collectively could impact the Company’s results. \n\nThe Company expects to generate adequate cash to meet its short-term and long-term cash needs, including working \ncapital requirements, capital projects and debt payments, and to fund potential dividend payments from cash on hand, \noperating cash flow, and amounts expected to be available under the Company’s existing financing facilities and its \nanticipated financing facilities discussed above. The Company may, at its election, liquidate some of its investments to \ngenerate additional cash for its capital needs as market conditions allow. \n\n**Recently Issued Accounting Standards**", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", + "target_page": 51, + "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company.", + "page_start": 41, + "page_end": 41, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be \nreleased after February 28, 2005. There are no known claims that have been filed against the amount in escrow. \n\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the \nyear. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of \nthe second phase of renovations on the Shentel Center in Edinburg, Virginia. \n\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving \nunconsolidated, limited purpose entities or commodity contracts. \n\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for \nadditional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and \nreplacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers \nbuilding renovations, vehicles, office equipment, and other miscellaneous capital needs. \n\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures \nand the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the \ntax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal \ntax payments will be due based on anticipated profits expected to be generated in the operation. \n\nManagement anticipates its operations will generate similar operating cash flows in 2004, compared to those of \ncontinuing operations in 2003, although there are events outside the control of the Company that could have an adverse \nimpact on cash flows from operations. The events that could adversely impact operating cash flow results include, but \nare not limited to; changes in overall economic conditions, regulatory requirements, changes in technologies, \navailability of labor resources and capital, and other conditions. The PCS subsidiary's operations are dependent upon \nSprint’s ability to execute certain functions such as billing, customer care, and collections; their ability to develop and \nimplement successful marketing programs and new products and services; and their ability to effectively and \neconomically manage other operating activities under the Company's agreements with Sprint. Additionally, the \nCompany's ability to attract and maintain a sufficient customer base is critical to maintaining a positive cash flow from \noperations. These items individually and/or collectively could impact the Company’s results. \n\nThe Company expects to generate adequate cash to meet its short-term and long-term cash needs, including working \ncapital requirements, capital projects and debt payments, and to fund potential dividend payments from cash on hand, \noperating cash flow, and amounts expected to be available under the Company’s existing financing facilities and its \nanticipated financing facilities discussed above. The Company may, at its election, liquidate some of its investments to \ngenerate additional cash for its capital needs as market conditions allow. \n\n**Recently Issued Accounting Standards**", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\n\nis the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. \nAt December 31, 2003, the Company had external investments totaling $7.5 million. \n\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The \nCompany will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. \nThe bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% \nover the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the \nCompany with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and \nassuming we had converted the stock at the beginning of 2003. \n\n**Financial Condition, Liquidity and Capital Resources**\n\nThe Company has four principal sources of funds available to meet the financing needs of its operations, capital \nprojects, debt service, investments and potential dividends. These sources include cash flows from operations, cash \nand cash equivalents, the liquidation of investments and borrowings. Management routinely considers the alternatives \navailable to determine what mix of sources are best suited for the long-term benefit of the Company. \n\nDuring the 2003 year, with the closing of the sale of the Virginia 10 RSA Limited partnership interest, the Company \nevaluated its capital requirements, and as a result eliminated its $20.0 million revolving line of credit with CoBank in May \n2003. The Company had paid off the outstanding balance in early 2003, and did not borrow on it during the remaining time \nthe facility was in place. In light of the $27.9 million balance in cash equivalent investments, management determined \nadditional debt capacity is not necessary for the near-term. \n\nThe term debt loan agreements with CoBank have three financial covenants. These are measured on a trailing 12-month \nbasis and are calculated on continuing operations. The first of the covenants is the total leverage ratio, which is total debt to \noperating cash flow. This ratio must remain below 3.5, and as of December 31, 2003 it was 1.2. The second measure is \nequity to total assets, which must be 35% or higher. At December 31, 2003 the ratio was 57.3%. The third measure is the \ndebt service coverage ratio, which is operating cash flow to scheduled debt service, which must exceed 2.0. At December 31, \n2003 this measure was 4.3. Management believes the Company will meet these covenant measures for the coming year. The \nCompany has pledged all of its affiliates capital stock as collateral for the CoBank loans. \n\nThe Company’s covenants on the RUS/RTB debt require the pledge of all current and future assets of the Telephone \nsubsidiary until the debt is retired. \n\nAnother external source of funding is a $0.5 million unsecured, variable rate revolving line of credit with SunTrust \nBank. This facility is in place to allow the Company to better manage its daily cash balances. The facility expires \nMay 31, 2004. Management anticipates renewing this facility with SunTrust Bank under similar terms and conditions. \nAt December 31, 2003 there were no balances outstanding under this facility. \n\nDue to make-whole provisions in the Company’s debt agreements it is currently uneconomical for the Company to \nprepay any debt. \n\nThe Company is obligated to make future payments under various contracts it has entered into, including amounts \npursuant to its various long-term debt facilities, and non-cancelable operating lease agreements for retail space, tower \nspace and cell sites. Expected future minimum contractual cash obligations for the next five years and in the aggregate \nat December 30, 2003, are as follows:", + "page_start": 53, + "page_end": 53, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHAREHOLDER INFORMATION**\n\n\n\n**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. \n\n**FORMS 10-K, 10-Q, and 8-K**\n\n**The Company files periodic reports with the Securities and Exchange Commission. The Company's Annual**\n**Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any**\n**amendments to these reports, are available to shareholders through the Company’s website, www.shentel.com.**\n**This website also has recent news releases and other information potentially of interest to shareholders.**\n\n**A copy of the Company’s Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by**\n**writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia**\n**22824, Attention: Secretary.**\n\n**MARKET AND DIVIDEND INFORMATION**\n\nThe Company's stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the \nThe Company’s stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high \nhigh and low sales prices per share of common stock as reported by the NASDAQ National Market for the last two years \nand low closing prices per share of common stock as reported by the NASDAQ National Market for the last two years is \nis set forth below: \nset forth below: \n\n\n \n \n \n \n [html]20032002\n
Qtr. 1Qtr. 2Qtr. 3Qtr. 4Qtr. 1Qtr. 2Qtr. 3Qtr. 4
High price$ 24.31$ 24.98$ 25.48$ 27.50$ 20.06$ 27.25$ 27.25$ 25.95
Low price$ 13.64S 14.33$ 19.25$ 19.74$ 16.50$ 19.69$ 22.75$ 21.61
\n\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\nCALL (540) 984-5200 \nCALL (540) 984-5200 \nTransfer Agent - Common Stock \nTransfer Agent - Common Stock \nShenandoah Telecommunications Company \nShenandoah Telecommunications Company \nP.O. Box 459 \nP.O. Box 459 \nEdinburg, VA 22824 \nEdi b \nVA 22824", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 1. Summary of Significant Accounting Policies (Continued)**\n\n***Reclassifications:***Certain amounts reported in the 2002 and 2001 financial statements have been reclassified to \nconform with the 2003 presentation, with no effect on net income or shareholders' equity. \n\n**Note 2. Discontinued Operations**\n\nIn November 2002, the Company entered into an agreement to sell its 66% General Partner interest in the Virginia 10 \nRSA Limited Partnership (cellular operation) to Verizon Wireless for $37.0 million. The closing of the sale took place \nat the close of business on February 28, 2003. The total proceeds received were $38.7 million, including $5.0 million \nheld in escrow, and a $1.7 million adjustment for estimated working capital at the time of closing. There was a post \nclosing adjustment based on the actual working capital balance as of the closing date, which resulted in a $39 thousand \ncharge for the Company. The $5.0 million escrow was established for any contingencies and indemnification issues \nthat may arise during the two-year post-closing period and is included in deferred charges and other assets in the 2003 \nconsolidated balance sheet. The Company’s gain on the transaction was approximately $35 million. Post closing, the \nCompany provided transition services to Verizon for a period of approximately three months, with compensation for \nthose services being approximately $40 thousand per month during the transition period. \n\nThe assets and liabilities attributable to the cellular operation have been classified as held for sale in the consolidated \nbalance sheets and consist of the following at December 31, 2002 and 2001: \n\n2001 \n2001 \n2002 \n\n2002 \n*(in thousands)*\n*(in thousands)*\n$ \n2,608 \n$ \n$ 2,759 \n309 \n214 \n2,631 \n3,272 \n5,548 \n$ 6,245 \n\n2002 \n*(in thousands)*\n\n2001 \n*(in thousands)*\n$ 2,759 \n$ \n214 \n3,272 \n$ 6,245 \n$ \n\nAssets \n$ \n\n2,608 \n309 \n2,631 \n5,548 \nAccounts receivable \nOther current assets \nProperty, plant and equipment, (net) \n\n$ \n\n2,608 \n309 \n2,631 \n5,548 \n$ $ \n$ Total assets $ \n\nLiabilities and minority interest \n$ \n\n381 \n$ \n161 \n1,666 \n2,208 \n\n$ \n$ \n\n381 \n499 \n161 \n236 \n1,666 \n1,838 \n2,208 \n$ 2,573 \n\nAccounts payable and accrued expenses \nDeferred revenue and deposits \nMinority interest \n\n381 \n161 \n1,666 \n2,208 $ \n$ Total liabilities and minority interest $ \n\n$ \n$ \n\n499 \n236 \n1,838 \n$ 2,573 \n$ \n$ \n\nThe operations of the cellular partnership including the minority interest have been reclassified as discontinued \noperations, net of taxes in the consolidated statements of income for all periods presented. Operating results and the \nsale of the discontinued operations are summarized as follows: \n\n\n \n \n \n \n [html]\n
( in thousands )$3.056
$ 20.895$ 20.012453
3.6184.674-
316$
2.603$ 17.280$ 15.354
( 773 )( 5.200 )( 4.526 )
34.973--
( 14.414 )( 4.668 )( 4.150 )
$22.389$ 7.412
$ 6.678
", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**NEW TELEPHONE DIRECTORY FOR THE NORTHERN SHENANDOAH VALLEY**\n\n\n\nThe Shenandoah Telephone Directory has undergone many changes \n\nsince we published our first directory in 1906, as The Farmers’ Mutual \nTelephone System of Shenandoah County. In 1906, the entire phone number \nlistings were on 15 pages. The first Company directory to include yellow \npages was distributed in 1946. That year local businesses invested in a new \nway to reach their potential customers. \n\n\n\nThe goal has always been to provide a useful tool for our customers. \nThe pace of change has quickened in the last few years. In 2000, for the \nfirst time, Shenandoah Telephone’s directory expanded from telephone \nlistings for only Shenandoah County and Bergton, to include business and \nresidential listings for Rockingham, Frederick, Clarke, and Warren \ncounties. In 2001, Page County listings were added. The name of our \ndirectory was changed to ShentelPages in 2002 to reflect the expanded \nlisting area. Although we included additional information in our \ndirectory, we continued to only furnish it to our local telephone \ncustomers. \n\nEarly in 2003, we conducted a customer survey to measure potential \npublic acceptance of a regional phone directory for the six-county area. The \nfindings of the survey indicated almost 60% would likely use an expanded six-county directory, with a \nfourth of all respondents saying they would use a regional directory more often than the directory they \ncurrently had in their home or business. Based on these positive results, Shentel launched an expanded \ndirectory to meet the demand. \n\nAn extensive public-awareness campaign was launched on television and radio, in a variety of daily and \n\nweekly newspapers and at regional county fairs. The campaign helped build anticipation for the directory \nand increase awareness of yellow page advertising opportunities. As a result of the added value of the \nexpanded distribution area, ShentelPages’ yellow page advertising revenues increased 21%, to $1.8 million \nfor the 2004 book. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nIn December 2003, Shentel mailed out 120,000 ShentelPages \ndirectories to every home and business in Shenandoah, \nRockingham, Frederick, Page, Clarke and Warren counties. \nShentelPages now has a potential audience that exceeds 300,000 \nreaders. The 2004 directory continues to be an important local \nresource. In addition to telephone listings, it contains both \ngeneral and county-specific information - from ZIP codes to area \ncodes, and from international dialing instructions to the listing of \nregional interstate exits. \n\nThrough ShentelPages, businesses have a new way of \nreaching thousands more potential customers within the six- \ncounty area to sell their products and services. ShentelPages is \nbundled with our electronic version, ShentelPages.com. This \nservice allows area residents to use their computer and the \nInternet to let their fingers do the walking. \n\nJust like our first book in 1906, the 2004 ShentelPages provides area residents with a quick and easy way \n\nto stay in touch. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 8", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 1. Summary of Significant Accounting Policies**\n\n***Description of business:***Shenandoah Telecommunications Company and subsidiaries (the Company) provides \ntelephone service, wireless personal communications service (PCS) under the Sprint brand name, cable television, \nunregulated communications equipment sales and services, Internet access, and paging services. In addition, the \nCompany leases towers and operates and maintains an interstate fiber optic network. The Company's operations are \nlocated in the four state region surrounding the Northern Shenandoah Valley of Virginia. Pursuant to a management \nagreement with Sprint Communications Company and its related parties (collectively, “Sprint”), the Company is the \nexclusive PCS Affiliate of Sprint providing wireless mobility communications network products and services in the \ngeographic area extending from Altoona, Harrisburg and York, Pennsylvania, south through Western Maryland, and \nthe panhandle of West Virginia, to Harrisonburg, Virginia. The Company is licensed to use the Sprint brand name in \nthis territory, and operates its network under the Sprint radio spectrum license (Note 7). A summary of the Company's \nsignificant accounting policies follows: \n\n***Stock split:***All share and per share information reflect the two for one stock split announced in October 2003, to \nshareholders of record as of the close of business on January 30, 2004. The additional shares were distributed on \nFebruary 20, 2004. The effective date of the split is February 23, 2004. All previously reported share and per share \ndata included herein are retroactively adjusted to reflect the split. \n\n***Principles of consolidation:***The consolidated financial statements include the accounts of all wholly owned \nsubsidiaries and other entities where effective control is exercised. All significant intercompany balances and \ntransactions have been eliminated in consolidation. \n\n***Use of estimates:***Management of the Company has made a number of estimates and assumptions related to the \nreporting of assets and liabilities, the disclosure of contingent assets and liabilities at the date of the consolidated \nfinancial statements and the reported amounts of revenues and expenses during the reporting periods. Management \nreviews its estimates, including those related to recoverability and useful lives of assets as well as liabilities for income \ntaxes and pension benefits. Changes in facts and circumstances may result in revised estimates and actual results could \ndiffer from those reported estimates. \n\n***Cash and cash equivalents:***The Company considers all temporary cash investments purchased with a maturity of \nthree months or less to be cash equivalents. The Company places its temporary cash investments with high credit \nquality financial institutions. At times, these investments may be in excess of FDIC insurance limits. Cash and cash \nequivalents were $28.7million, $2.2 million, and $2.0 million at December 31, 2003, 2002 and 2001, respectively.", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company participates in the telecommunications industry, which requires substantial investment in fixed assets or \nplant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy \nof the Company is to grow and diversify the business by adding services and geographic areas that can leverage the \nexisting plant, but to do so within the opportunities and constraints presented by the industry. For many years the \nCompany focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary \nbusiness within the Company. This initial diversification was concentrated in other wireline businesses, such as the \ncable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in \nthe wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of \nthe regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the \nCompany’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless \na more significant contributor to total revenues. \n\nDuring the 1990’s significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA \ncellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue \ngrowth and excellent margins in the late 1990’s. The cellular operation covered only six counties, and became \nincreasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins \nwould be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly \nreduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the \nCompany entered the PCS business through an affiliation with American Personal Communications (APC), initiating \nservice along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was \na very close match to the Company’s fiber network, thereby providing economic integration that might not be available \nto other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to \nAPC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further \ninto Central Pennsylvania. The Company’s combined capital investment in 2000 and 2001 in the PCS operation was \n$45.1 million.", + "page_start": 40, + "page_end": 40, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 7. Significant Contractual Relationship**\n\nIn 1999, the Company executed a Management Agreement (the Agreement) with Sprint whereby the Company \ncommitted to construct and operate a PCS network using CDMA air interface technology, replacing an earlier PCS \nnetwork based on GSM technology. Under the Agreement, the Company is the exclusive PCS Affiliate of Sprint \nproviding wireless mobility communications network products and services in its territory which extends from \nAltoona, York and Harrisburg, Pennsylvania, and south along the Interstate 81 corridor through Western Maryland, the \npanhandle of West Virginia, to Harrisonburg, Virginia. The Company is authorized to use the Sprint brand name in its \nterritory, and operate its network under the Sprint radio spectrum license. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 28", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Income from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income \nfrom discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the \ntwo months of its operations in 2003. \n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a \nresult recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes. \n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating \nresults in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations. \n\n**DISCONTINUED OPERATIONS**\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s \nlocal customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December \n31, 2002. The decline was the result of competition with digital technologies and increased competition from national \ncarriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to \ntransform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the \npartnership to one of the minority partners. The agreement was signed in November 2002, and closing was February \n28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, \n$7.4 million and $6.7 million, respectively. \n\n**CONTINUING OPERATIONS**\n\n**2002 compared to 2001**\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million \nof wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 \nmillion or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%. \n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS \nservice revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which \ntotaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end. \n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, \nwas $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the \nCompany’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The \nrate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 \nthrough April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from \nOctober 1, 2001 through December 31, 2001. \n\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 \nmillion of rebates and discounts given at the time of sale, which became more pronounced during the year to meet \nindustry competition for subscriber additions and subscriber retention. \n\nIn accordance with Sprint’s requirements, the Company launched third generation (3G 1X) service in August 2002. \nThe impact of 3G 1X-network enhancements on revenues was not significant in 2002. \n\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the \nresult of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the \n82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "As a product manager, how can I reject an inventory in NAIIS ?", + "target_page": 38, + "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**10.5.2 Rejection of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 66). \n5. Press the “Send for Rejection” button (figure 66, b). \n\nOnce the “Send for Rejection” button was pressed, the status of the selected inventory changes to \n“awaiting_rejection” (figure 67, a). \n\n***Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM \nwill be able to reject the submission. Proceed to section 10.4.2. \n\n***Figure 66. Work on Inventories screen – Rejection of an inventory - Status = awaiting_approval***\n\n\n\n***Figure 67. Work on Inventories screen – Rejection of an inventory - Status = rejected_approval***", + "page_start": 40, + "page_end": 40, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.4.1 Send for approval of an Inventory**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 60, a). \n5. Press the “Send for Approval” button to send it to NFP for his/her review and approval of the inventory \n(figure 60, b). \n\n***Note: A notification email will be sent to the PM, once the “Send for Approval” has been pressed. And the \nstatus changed to “Awaiting_approval” (figure 61). \n\n***Figure 60. Work on Inventories screen – Send for Approval - Status = check***\n\n\n\n***Figure 61. Work on Inventories screen – Status = awaiting_approval***\n\n\n\n**10.4.2 Rejection of an Inventory**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 62, a). \n5. Press the “Reject” button (figure 62, b). \n\n***Note: A notification email will be sent to the PM, once the “Reject” button has been pressed. And the \nstatus changed to “Awaiting_rejection_check” (figure 63).", + "page_start": 37, + "page_end": 37, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.5 Approval or Rejection of an inventory (NFP)**\n\nThis section describes how the NFP approves or rejects an inventory after being sent for approval by the PM \n(See section 10.4). \n\n**10.5.1 Approval of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 64). \n5. Press the “Approve” button (figure 64, b). \n\nOnce the “Approve” button was pressed, the status of the selected inventory changes to “approved” (figure \n65, b). \n\n***Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM \nmay proceed to selecting the tables for preparing the official submission (See section 10.6). \n\n***Figure 64. Work on Inventories screen – Approve an inventory - Status = awaiting_approval***", + "page_start": 39, + "page_end": 39, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.1 Workflow .......................................................................................................................... 35 \n\n10.2 Start of inventory/submission (NFP or PM) ..................................................................... 35 \n\n10.3 Send for checking (PM) .................................................................................................... 37 \n\n10.4 Send for approval/rejection of an Inventory (PM) ............................................................ 38 \n\n10.4.1 Send for approval of an Inventory .............................................................................. 38 \n\n10.4.2 Rejection of an Inventory ........................................................................................... 38 \n\n10.5 Approval or Rejection of an inventory (NFP) ................................................................... 40 \n\n10.5.1 Approval of an inventory ........................................................................................... 40 \n\n10.5.2 Rejection of an inventory ........................................................................................... 41 \n\n10.6 Submit inventory (PM) ...................................................................................................... 42 \n\n10.6.1 Submit select tables for preparing the general submission ........................................ 42 \n\nGlossary of terms and abbreviations ............................................................................................. 44 \n\nAnnex 1: Non-Annex I (NAI) Parties .......................................................................................... 45 \n\nAnnex 2: Fuel categories .............................................................................................................. 47 \n\nAnnex 3: Global Warming Potentials (GWPs) ............................................................................ 48 \n\nAnnex 4: Default values ............................................................................................................... 49", + "page_start": 2, + "page_end": 2, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting \nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating \nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG \ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web \napplication (figure 52). \n\n**10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year \nidentified will be made available in the new inventory/submission. \n\nThese are the steps to start a new inventory: \n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53). \n\n***Figure 53. View Inventories Progress sub menu***\n\n\n\n2. The “View Inventories Progress” screen appears (figure 54). \n3. Select the appropriate inventory by clicking the box under column “Working Inventory” (figure 54, a). \n\n***Note: The selected appropriate inventory should be in status “created” (figure 54, b)", + "page_start": 34, + "page_end": 34, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 54. View Inventories Progress screen***\n\n\n\n***Figure 55. Work on Inventories sub menu***\n\n\n\n5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. \n\n***Figure 56. Work on Inventories screen***\n\n\n\n***Figure 57. Work on Inventories screen – Status = Started***", + "page_start": 35, + "page_end": 35, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after \nbeing approved by the NFP (See section 10.5). \n\n**10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a). \n***Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b). \n5. Click on “Work on Inventories” under Submission Management (figure 68, c). \nThis opens the Submit Inventory initial screen (figure 69). \n\n6. Click the inventory year to be submitted (figure 69, a). \n7. Press the “Generate Official Submission” button (figure 69, c). \n\n***Figure 68. View Inventories Progress screen – select inventory for the preparation for the general submission***", + "page_start": 41, + "page_end": 41, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***3.2.2.2 Add a new GHG inventory year or edit general properties/sectors (only NFP and***\n***PM’s)***\n\n Log in as NFP or PM. \n Click on “Work on Inventories” under Submission Management (figure 10). \n\n***Figure 10: Sub menu “Work on Inventories”***\n\nOnce “Work on Inventories” has been clicked, the initial screen will be displayed, which shows the following boxes \n(figure 11): \n\na. Existing Inventory (with all options) \nb. General properties – include the name, submission year, creator, creation date, status, updater and submission \n\ndate \nc. Sectors \nd. Inventory years \n\n***Figure 11. Initial screen of “Work on Inventories”***\n\nFollow the steps to add/remove an inventory year: \n\n Click on the inventory year (figure 12a) \n Select the inventory year under General properties (figure 12b) \n Select or deselect the appropriate Sectors (figure 12c) \n To**add**or**remove**an inventory year, select or deselect the relevant year under Inventory Years box (figure 12d)", + "page_start": 9, + "page_end": 9, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 62. Work on Inventories screen –Reject - Status = check***\n\n\n\n***Figure 63. Work on Inventories screen – Propose Rejection - Status = awaiting_rejection_check***", + "page_start": 38, + "page_end": 38, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "We strongly suggest that you keep the sending inventory option enabled to IBM Support. \nHowever, it might not be of interest to local users, although inventory content can serve as \na basis for inventory and asset management. \n\n7. \n\nIn Edit mode, you can change any of the previously configured settings. After you are \nfinished editing these parameters, adding more recipients, or testing the connection, save \nthe configuration so that the changes take effect (see Figure 13-53). \n\n**Note:**The Test button appears for new email users after first saving and then editing again. \n\n**Disabling and enabling notifications**\nAt any time, you can temporarily or permanently disable email notifications, as shown in \nFigure 13-54. This is good practice when performing activities in your environment that might \ngenerate errors on your IBM Spectrum Virtualize, such as SAN reconfiguration or \nreplacement activities. After the planned activities, remember to re-enable the email \nnotification function. The same results can be achieved by using the CLI**svctask stopmail**\nand**svctask startmail**commands.", + "page_start": 737, + "page_end": 737, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "What is the global warming potential of Perfluorohexane ?", + "target_page": 48, + "target_passage": "7,400", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Figure 2.**(continued) \n\nis 16.9% in which the temperature would go up more than 3.0 °C, most located in the high latitude regions of \nNorthern Hemisphere; the area is rarely in which the temperature would go up between 0 and 1.0 °C. \n\nThere are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. \n\n\n \n \n \n \n [html]\n
State global warming by 1.5 ° C. The dutributions of maize yield loss under the two scenarios are similar to each otherTableStatementStatesticsPatientsSpecificationStatestratesTableStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 5", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed9.pdf" + }, + { + "text": "less environmentally critical processes (see for example, the principles of ‘green engineering’, like \nprevention instead of treatment of waste288). \n\n**Chemical technologies have ousted traditional materials and processes.**The United Nations’ \n(UNEP) ‘Global Chemical Outlook’289 documents a strong growth of chemical production between 1970 \nand 2010. The value of the global chemical production grew from US$171 billion in 1970, to \napproximately US$ 5.7 trillion in 2019, roughly 33 times more. 290 The EU had a share of $1.3 trillion or \nabout 20% of the global value. In less than two decades between 2000 and 2017, the capacity doubled \nand grew from 1,186 million tons to 2,276 million tons.291,292 \n\nThe reasons for this strong growth are: a) the**replacement of traditional materials**(wood, stone, iron \nand other metals, paper, natural fibres) by chemically based products (foremost plastics and multi- \nmaterial products); b)**the replacement of traditional technologies by chemical processes**(e.g. \ngluing instead of screwing of connections in metal, two-component paints); c) the development of**new**\n**products**(e.g. electronic devices, new types of batteries, nano); and d)**new applications**(e.g. specific \nfertilisers and pesticides). \n\n**Table 29: Production and consumption of chemicals by hazard class in the EU in 2019 – Eurostat293**\n\n\n \n \n \n \n [html]\n
HAZARD ( Labels )2021
Hazardous to health214.3
Carcinogenic, mutagenic and reprotoxic ( CMR ) health hazard39.9
Chronic toxic health hazard25.4
Very toxic health hazard59.2
Toxic health hazard35.5
Harmful health hazard54.5
All labels referring to : Hazardous to the environment169.6
Hazardous and non - hazardous – Total278.9
\n\n\n\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic \nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment \n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294 \n\nThe ESENER 2019 survey provides information about**sectors that reported a particularly high**\n**prevalence of dangerous substances**. The percentage of enterprises reporting handling or exposure \nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and \nelectricity supply’, and 47% in ‘Human health and social work activities’. 295 \n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive \nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework \nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in \nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such \nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling \nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the \nregulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also \nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and \ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural \nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics).", + "page_start": 106, + "page_end": 106, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.**\nIn this study, climate \ndata of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models \ndriven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a \ntotal of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- \nCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- \nshine hours (Fig. 1).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "The SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with \nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a \nrange of outcomes for future climate change, including high and low climate sensitivity, different \nbiases in baseline precipitation climatology, and different global patterns of precipitation change. \nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global \nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global \nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected, \nwhich means that the results here may be sensitive to systematic errors arising from biases in the \npresent-day SST patterns. \n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5 \nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol \nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse \ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk \n\n\n\nChanges in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 \n\nextremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. \n\nand 75%, especially in the Iberian Peninsula. Southern Africa also sees a decrease in low flows \nwhere changes in mean flows were small. Changes in high run-off show similar patterns and \nmagnitudes to those in mean run-off. \n\nThe simulated changes in both mean and low run-off flows show substantial differences \namong the six simulations (figures 10 and 11). In most basins examined here, the range of \noutcomes include both increases and decreases in mean and low flows for any particular basin, \nbut generally with the largest proportion simulating increases in both mean and low flows. In a \nfew cases, notably the Lena in northeast Asia and Ganges in southeast Asia, the ensemble agreed \nentirely or almost entirely on increased flows. Even here, the range of outcomes is large, with the \nprojected flow increases in the Ganges for 2°C global warming ranging from approximately 30% \nto more than 110%. \n\nExceptions to the general picture of consensus on increasing flows are seen in the Amazon, \nOrange, Danube and Guadiana basins where the range of projected extends more towards \ndecreased mean flows. Mean flows in the Amazon are projected to decline by up to 25% for 2°C \nglobal warming. For low flows, the ensemble of projections entirely gives decreased flows at 2°C \nglobal warming for these basins. \n\nThe signal of decreased flows was stronger for low flows than mean flows, and indeed in the \nNiger, the range of mean flow changes extended more towards increases whereas the range of \nlow flow changes extended more towards decreases. \n\n(b) Impacts at 1.5°C global warming compared to 2°C \n\nFor almost all quantities and simulations examined here, global-scale changes in extremes and \nrun-off at 1.5°C global warming (table 6) are smaller than those compared to 2°C (table 5; \nfigures 12 and 13). The exceptions to these are mean and low run-off which each show one \ninstance of a smaller change at 2°C than 1.5°C, but still with a majority of simulations showing \nlarger changes at 2°C (figure 13). For temperature-related indices, the ranges of change at the two \nGWLs do not overlap—the change at 2°C in all members is larger than the change at 1.5°C in", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**\n\n**Climate change is becoming more and more remarkable which has an obvious impact on crop yields**\n**all over the world. Future climate scenario data was simulated by 5 climate models recommended**\n**by ISI-MIP under 4 RCP scenarios, in which the approximate scenarios with global warming by 1.5 °C**\n**and 2 °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the**\n**world under global warming by 1.5 °C and 2.0 °C were analyzed and the market prices of maize at**\n**national and global levels were simulated. The results showed that, the risk of maize yield reduction**\n**under 2.0 °C scenario was much more serious than 1.5 °C scenario; the ratios of yield changes were**\n**separately 0.18% and − 10.8% under 1.5 °C and 2.0 °C scenarios. The reduction trend of total maize**\n**production is obvious in the top five countries and the main producing regions of the world, especially**\n**under the 2.0 °C scenario. The market price of maize would increase by around 0.7% and 3.4% under**\n**1.5 °C and 2.0 °C scenarios. With the quickly increasing population in the world, it is urgent for all**\n**countries to pay enough attention to the risk of maize yield and take actions of mitigation and**\n**adaptation to climate change.**\n\nIn the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "**9**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n –2 –1 0 1 \n2 \n°C \n3 4 5 6 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 2.**Simulated changes in annual daily maximum temperature relative to 1981–2010 at 2°C global warming, for individual \nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The \nlabels above each panel identify the driving CMIP5 model (or ensemble mean). \n\n**Table 4.**Time of reaching GWLs of 1.5°C and 2°C in each bias-corrected output from the HadGEM3 climate simulations, driven \nby different sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data \nis applied to the HCVI calculation and JULES simulations. \n\n\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20242035
GFDL - ESM2M20362051
HadGEM2 - ES20192033
IPSL - CM5A - MR20232036
MIROC - ESM - CHEM20202032
ACCESS1 - 020262040
\n\nland surface sees an increase in annual daily maximum temperature which is similar to the global \nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially \nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By \ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases \nin annual daily maximum temperature larger than the global mean warming. Much of the mid- \nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more \nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the \nMIROC and ACCESS models. \n\nThe percentage of days exceeding the 90th percentile of daily maximum temperature increase \nmore in tropical areas (figure 3). Some areas show over 60% of days above this level at 2°C global \nwarming compared with present day, whereas in the mid-latitudes between 20% and 30% of days \nexceed this level. The global mean is between 20% and 30% in all ensemble members (table 3).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "References \n1. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al*.), pp. \n1–32. Cambridge, UK: Cambridge University Press.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "How can I request access to NAIIS ?", + "target_page": 5, + "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Press the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears. \n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure \n3, number 1) and the log-in page will be displayed. (figure 4) \n\n***Figure 3. UNFCCC non-Annex I Greenhouse Gas Inventories web page***\n\n\n\n***Figure 4. Log-in page of the NAIIS Web Application***", + "page_start": 6, + "page_end": 6, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the \napplication should be sent to the dedicated e-mail address**naiisapp@unfccc.int**.", + "page_start": 4, + "page_end": 4, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**3.3.3 View User**\n\nThis function enables NFP and PM to view all users of their country. \n\n Log in as NFP or PM \n Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 21); \nthis opens the Users Administration screen (figure 22). \n\n***Figure 21. Users Administration***\n\n Click on the row of the respective user to be viewed (figure 22a). All information of the selected user will be \ndisplayed on the**General Properties**,**Sector**and**Role**boxes (figure 22b). \n\n***Figure 22. Users Administration***\n\n*NAIIS-User-Manual.Docx* Page 16 10/02/2013", + "page_start": 15, + "page_end": 15, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**3 Getting started**\n\n**3.1 User Access, Roles and Privileges**\n\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the \npreparation of their national GHG inventories, and each user is assigned a role. \n\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is \nimportant to note that the roles are not necessarily identical to a person’s title (e.g. National Focal Point) and that a \nperson can take on several roles (which may be necessary for some countries). \n\nThere are three types of access rights (roles) to the NAIIS application: \n\n\n \n \n \n \n [html]\n
Type of access rights for specific rolesProcess to gain access rights
National Focal Point ( NFP ): Will be responsible for identifying the members of the team and is the only one who has the right to approve the submission of any GHG inventory.Parties that have not already requested and received access rights can obtain them by having their National Focal Point contact : galigagaga ( Quet ) squipt
NFPs will have the option to create, edit, update or delete all of their country ’ s GHG data entries, and grant access rights to the ‘ Project Manager ’ and ‘ Sectoral Experts ’ for their country if they choose.( Note : Some Parties may have more than one individual acting as the NFP ; however the system can accommodate only one account per Party ).
Project Manager ( PM ): Will have the right to enter / edit data in all sectors, as well as to generate an official submission to the UNPCC, and grant access rights to the “ Sectoral Experts ” for their country.Entities will be provided these rights by their NFP. If a Party decides to grant access to a PM, their NFP will be able to create such user account on the NAIIS application.
Sectoral Experts ( SE ): Will have the right to enter / edit data in respective sector ( s ).Experts will be provided these rights by their NFP and PM. If a Party decides to grant access to Sectoral Experts, the NFP will be able to create such user accounts and assign them in respective sector ( s ).
\n\n**3.2 How to access/ log out / create a GHG inventory**\n\n**3.2.1 How to access the NAIIS application**\n\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on \nthe browser’s address bar. (figure 1 and figure 2) \n\n***Figure 1. Using Internet Explorer browser***\n\n\n\n***Figure 2. Using Firefox browser***", + "page_start": 5, + "page_end": 5, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**3.3.1 Add User**\n\n**Note**: This function is**ONLY**available for NFP’s and PM’s! \n\n Log in as NFP or PM \n Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 18); \nthis opens the Users Administration screen (figure 19). \n\n***Figure 18. Users Administration***\n\n***Figure 19. Initial screen of Users Administration***\n\n Click the “+” sign (figure 19a) creates a new user (figure 20 new User). \n Double click on the cell of the newly created user name and enter a new user name (must be unique and contain at \n\nleast 3 characters). \nOnce done, press the enter key and the new user name will be saved in the respective table of the NAIIS database. \n\nNote: New user name(s) will be generated by the system as default [Non-Annex I Party name] + “newUser” \n(e.g. UgandanewUser, PhilippinesnewUser, ArgentinanewUser)", + "page_start": 13, + "page_end": 13, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting \nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating \nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG \ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web \napplication (figure 52). \n\n**10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year \nidentified will be made available in the new inventory/submission. \n\nThese are the steps to start a new inventory: \n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53). \n\n***Figure 53. View Inventories Progress sub menu***\n\n\n\n2. The “View Inventories Progress” screen appears (figure 54). \n3. Select the appropriate inventory by clicking the box under column “Working Inventory” (figure 54, a). \n\n***Note: The selected appropriate inventory should be in status “created” (figure 54, b)", + "page_start": 34, + "page_end": 34, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Once the “Generate Official Submission” button has been pressed the “Submit Inventory” initial screen for selecting \nthe tables appears (figure 70). \n\n8. Select or deselect by clicking the appropriate year(s) under “Inventory Years” box (figure 70, c) or the sector \ngrids under the “Table” box (figure 70, d) to generate the official submission. \n9. Press the “Submit” button (figure 70, e). An official submission will be generated in the NAIIS system. \n\n***Figure 70. Submit – select tables and grids for the general submission***\n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableNAIIS - User - Manual. DocxPage 43
10 / 02 / 2013
", + "page_start": 42, + "page_end": 42, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 54. View Inventories Progress screen***\n\n\n\n***Figure 55. Work on Inventories sub menu***\n\n\n\n5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. \n\n***Figure 56. Work on Inventories screen***\n\n\n\n***Figure 57. Work on Inventories screen – Status = Started***", + "page_start": 35, + "page_end": 35, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**Protect your API**\n\nTo authenticate and authorize access to your Rest APIs, you can choose from the following: \n\n• Amazon Cognito user pools as an identity source for who access the API. \n\n• Lambda functions to control access to APIs by using a variety of identity sources. \n\n• Resource-based policies to allow or deny specified access from source IP addresses or VPC \n\nendpoints. \n\n• AWS Identity and Access Management roles, policies, and IAM tags to control access for who can \n\ninvoke certain APIs. \n\n**Advanced Topics**\n\nYou can connect a microservice with a REST API and a single integration to a Lambda function. As \n\nyou progress on your journey, you should explore the following advanced topics. \n\n• Choose between REST and HTTP APIs \n\n• Explore non-proxy custom integrations and data transformation \n\n• Optimize your API with caching \n\n• Explore HTTP APIs \n\n• Learn how to use proxy routes and resources \n\n• Send binary media types \n\n• Explore bidirectional connections using WebSocket APIs \n\n• Build and export your API using an OpenAPI 3 definition", + "page_start": 70, + "page_end": 70, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\n**Assign access to additional users**\n\n1. In IAM Identity Center, create a permission set that follows the best practice of applying least- \n\nprivilege permissions. \n\nFor instructions, see Create a permission set in the*AWS IAM Identity Center User Guide*. \n\n2. Assign users to a group, and then assign single sign-on access to the group. \n\nFor instructions, see Add groups in the*AWS IAM Identity Center User Guide*. \n\n**Programming languages**\n\nWe assume that you have some experience with coding and deploying programs using one of the \n\nsupported languages. This guide will*not*teach you how to program, but it will at times provide \ncode samples. \n\nWriting functions in an interpreted language like Python or JavaScript might be more straight- \n\nforward in some scenarios because your code can be added directly through the AWS Management \n\nConsole web interface. \n\nYou can use one of the listed languages, or create your own Lambda runtime container. \n\n• Python, JavaScript/TypeScript — Commonly used interpreted languages \n\n• Java, C#, Go — Compiled languages \n\n• Ruby, PowerShell — Less frequently used options \n\n**Development environment**\n\nFor serverless development, you will likely want to set up and use a familiar editor or IDE, such as \n\nVisual Studio Code or PyCharm. Alternatively, you may prefer AWS Cloud9, a browser-based IDE \n\nand terminal \"in the cloud\" with direct access to your AWS account. \n\nYou should definitely install the AWS CLI for command line control and automation of services. For \n\nexample, you can list your Amazon S3 buckets, update Lambda functions, or send test events to \n\ninvoke service resources. Many tutorials will show how to complete tasks with the AWS CLI. \n\nAnother useful, but optional, tool is the AWS Serverless Application Model CLI, aka the \"SAM CLI\". \n\nAWS SAM templates define infrastructure services and code. You can use AWS SAM CLI to build and", + "page_start": 15, + "page_end": 15, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What is the problem regarding the use of the Book3 dataset ?", + "target_page": 2, + "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "•**Breadth, Diversity, and Mitigating Bias:**Books can serve a critical role in ensuring AI \nmodels are inclusive of a broad range of topics and categories that may be under- \nrepresented in other content. For all that the Internet has generated an explosion in \nhuman creativity and information sharing, it generally represents only a few decades \nof information and a small portion of the world’s creative population. A books \ndataset, by comparison, is capable of representing centuries of human knowledge. As \na result such a dataset can help ensure AI systems behavior is based on centuries of \nhistorical information from modern books. It can help ensure broad geographic and \nlinguistic diversity. What’s more, the greater breadth and diversity of high-quality \ncontent help mitigate challenges around bias and misinformation. Using a more \ndiverse pool of training data can help support the production of a model and outputs \nof the model that are more representative of that diversity. Books can be useful in \nevaluation datasets to test existing models for memorization capabilities, which can \nhelp prevent unintended reproduction of existing works. Of course, this is all \ncontingent on actual composition of the corpus; in order to have the benefits \ndescribed, the books would need to be curated and included with characteristics like \ntime, geographic and linguistic diversity. \n\n•**Other Modalities:**Finally, books do not just contain text, they often contain images \nand captions of those images. As such, they can be an important training source for \nmulti-modal LLMs, which can receive and generate data in media other than text. \n\n**Lowering Barriers to Entry & Facilitating Competition**\n\nBroad access to books for AI training is critical to ensure powerful AI models are not \nconcentrated in the hands of only a few companies. Access to training data, in general, has \nbeen cited as a potential competitive concern \n11 \n in the AI field because of the performance \nbenefits to be gained by training on larger and larger datasets. But this competitive wedge is \neven more acute when we look specifically at access to book datasets. \n\nThe largest technology companies building commercial AI models have the resources and \ncapacity to mass digitize books for AI training. Google has scanned 40 million books, many \nof which came from digitization partnerships they formed with libraries. They may already \nuse some or all of these books to train their AI systems. \n It’s unclear to what extent other \ncompanies already have acquired books for AI training (for instance, whether Amazon’s \nlicenses with publishers or self-published authors may permit such uses); \nexisting \n\n12 \n\n See e.g. Trendacosta, Katherine and Doctorow, Cory. “AI Art Generators and the Online Image Market.” \n\n11 \n*Electronic Frontier Foundation*, 3 Apr. 2023, www.eff.org/deeplinks/2023/04/ai-art-generators-and- \nonline-image-market; Narechania, Tejas N., and Sitaraman, Ganesh. “An Antimonopoly Approach to \nGoverning Artificial Intelligence.”*SSRN Electronic Journal*, 2023, cdn.vanderbilt.edu/vu-URL/wp-content/ \nuploads/sites/412/2023/10/09151452/Policy-Brief-2023.10.08-.pdf, https://doi.org/10.2139/ \nssrn.4597080. Accessed 25 Feb. 2024. \n\n See white paper for Google’s Gemini models https://arxiv.org/pdf/2312.11805.pdf — “Gemini models \n12 \nare trained on a dataset that is both multimodal and multilingual. Our pretraining dataset uses data from \nweb documents, books, and code, and includes image, audio, and video data.”", + "page_start": 6, + "page_end": 6, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***1. Introduction***1 \n\nWhile the field of artificial intelligence research and technology has a long history, broad \npublic attention grew over the last year in light of the wide availability of new generative AI \nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These \ntools are developed using machine learning and other techniques that analyze large datasets \nof written text, and they are capable of generating text in response to a user’s prompts. \n\nWhile many large language models rely on website text for training, books have also played \nan important role in developing and improving AI systems. Despite the widespread use of e- \nbooks and growth of sales in that market, books remain difficult for researchers and \nentrepreneurs to access at scale in digital form for the purposes of training AI. \n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books \n The Books3 dataset contains text from over 170,000 books, \ncalled “Books3” to train LLMs. \nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been \noriginally sourced from a website that was not authorized to distribute all of the works \ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and \nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3 \n\n2 \n\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role \ndo books play in training AI models, and how might digitized books be made widely \naccessible for the purposes of training AI? What dataset of books could be constructed and \nunder what circumstances? \n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series \nof workshops to investigate the concept of a responsibly designed, broadly accessible \ndataset of digitized books to be used in training AI models. Conducted under the Chatham \nHouse Rule, we set out to ask if there is a possible future in which a “books data commons \nfor AI training” might exist, and what such a commons might look like. The workshops \nbrought together practitioners on the front lines of building next-generation AI models, as \nwell as legal and policy scholars with expertise in the copyright and licensing challenges \nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of \n\n Authored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello (Proteus \n1 \nStrategies) in collaboration with Creative Commons. We are grateful to participants in the workshops, \nincluding Luis Villa, Tidelift and openml.fyi; Jonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, \nCornell; Lila Bailey, Internet Archive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, \nLibrary Futures/NYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik \nStallman, UC Berkeley School of Law. The paper represents the views of the authors, however, and \nshould not be attributed to the workshop as a whole. All mistakes or errors are the authors’. \n\n See e.g. Knibbs, Kate. “The Battle over Books3 Could Change AI Forever.”*Wired*, 4 Sept. 2023, \n2 \nwww.wired.com/story/battle-over-books3/. \n\n For key documents in these cases, see the helpful compendium at “Master List of Lawsuits v. AI, \n3 \nChatGPT, OpenAI, Microsoft, Meta, Midjourney & Other AI Cos.”*Chat GPT Is Eating the World*, 27 Dec. \n2023, chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft- \nmeta-midjourney-other-ai-cos. See also “Fair Use Week 2024: Day Two with Guest Expert Brandon \nButler.”*Fair Use Week*, sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with- \nguest-expert-brandon-butler/. Accessed 20 Mar. 2024 (arguing that use of this dataset is not \nconsequential for the fair use analysis).", + "page_start": 1, + "page_end": 1, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***7. Conclusion***\n\nThis paper is a snapshot of an idea that is as underexplored as it is rooted in decades of \nexisting work. The concept of mass digitization of books, including to support text and data \nmining, of which AI is a subset, is not new. But AI training is newly of the zeitgeist, and its \ntransformative use makes questions about how we digitize, preserve, and make accessible \nknowledge and cultural heritage salient in a distinct way. \n\nAs such, efforts to build a books data commons need not start from scratch; there is much \nto glean from studying and engaging existing and previous efforts. Those learnings might \ninform substantive decisions about how to build a books data commons for AI training. For \ninstance, looking at the design decisions of HathiTrust may inform how the technical \ninfrastructure and data management practices for AI training might be designed, as well as \nhow to address challenges to building a comprehensive, diverse, and useful corpus. In \naddition, learnings might inform the process by which we get to a books data commons — \nfor example, illustrating ways to attend to the interests of those likely to be impacted by the \ndataset’s development. 41 \n\nWhile this paper does not prescribe a particular path forward, we do think finding a path (or \npaths) to extend access to books for AI training is critical. In the status quo, large swaths of \nknowledge contained in books are effectively locked up and inaccessible to most everyone. \nGoogle is an exception — it can reap the benefits of their 40 million books dataset for \nresearch, development, and deployment of AI models. Large, well-resourced entities could \ntheoretically try to replicate Google’s digitization efforts, although it would be incredibly \nexpensive, impractical, and largely duplicative for each entity to individually pursue their own \nefforts. Even then, it isn’t clear how everyone else — independent researchers, entrepreneurs, \nand smaller entities — will have access. The controversy around the Books3 dataset \ndiscussed at the outset should not, then, be an argument in favor of preserving the status \nquo. Instead, it should highlight the urgency of building a books data commons to support an \nAI ecosystem that provides broad benefits beyond the privileged few. \n\n For other existing and past examples, one might look to the work of Europeana, https:// \n\n41 \nwww.europeana.eu/en, as well as the mountain of commentary on the failed class action settlement \nbetween Google, the Authors Guild, and the Association of American Publishers — see e.g. the excellent \ncollection of court filings created by James Grimmelmann and colleagues (now archived at the Internet \nArchive) — https://web.archive.org/web/20140425012526/http://thepublicindex.org/. The Settlement \nexpressly would have set up a “Research Corpus” for non-consumptive research. HathiTrust created a \nResearch Center, with the intention of becoming one of the hosts for the “Research Corpus.” The \nSettlement was criticized and was ultimately rejected by the district court for both substantive reasons \n(that is, what the settlement would specifically do) and procedural (in the sense of violating class-action \nlaw, but also in a broader sense of representing a “backroom deal” without sufficient participation from \nimpacted interests). The Research Corpus was not a core locus of critique, though it did receive concern \nin terms of providing too much control to Google, for example. Our purpose in mentioning this is not to \nrelitigate the issue, but rather to call out that design decisions of this sort have been considered in the \npast.", + "page_start": 20, + "page_end": 20, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "engagement. And, at least in the U.S., it could generate billions of dollars in damages if the \nspecific design choices and technical constraints are not adequate to justify a finding of fair \nuse. \n\nThis sort of books dataset could be built by expanding use of in-copyright books that have \nalready been digitized from existing libraries and other sources. Specifically, workshop \nparticipants mentioned that the Internet Archive, HathiTrust, and Google as entities that have \ndigitized books and could repurpose their use to build a books commons, although \nchallenges with using these datasets were noted. The Internet Archive is in the midst of \nlitigation brought by book publishers for its program for lending digital books; while not \ndirectly relevant to the issue of AI training using their corpus of books, this sort of litigation \ncreates a chilling effect on organizations seeking to make new uses of these digitized books. \nMeanwhile, Google encumbered HathiTrust’s digital copies with certain contractual \nrestrictions, which would need to be addressed to develop a books dataset for AI training, \nand Google itself is unlikely to share its own copies while it provides them a competitive \nadvantage. \n\nPerhaps as a matter of public policy, these existing copies could be made more freely \navailable. For instance, to ensure robust competition around AI and advance other public \ninterests, policymakers could remove legal obstacles to the sharing of digitized book files for \nuse in AI training. Alternatively, policymakers could go further and affirmatively compel \nsharing access to these digital book files for AI training. \n\nIt's possible that there could be a new mass digitization initiative, turning physical books into \nnew digital scans. At least in theory, one could try to replicate the existing corpora of \nHathiTrust, for example, without Google’s contractual limitations. At the same time, such an \neffort would take many years, and it seems unlikely that many libraries would want to go to \nthe trouble to have their collections digitized a second time. Moreover, while new scans may \nprovide some incremental benefit over use of existing ones (e.g., by using the most modern \ndigitization and OCR tools and thus improving accuracy), there is no inherent social value to \nmaking every entity that wants to do or allow AI training invest in their own redundant \nscanning. \n\nA new digitization effort could target works that have not been yet digitized. This may be \nparticularly useful given that previous book digitization efforts, and the Google Books project \nin particular, have focused heavily (though not exclusively) on libraries in English-speaking \ncountries. Additional digitization efforts might make more sense for books in those \nlanguages that have not yet been digitized at a meaningful scale. Any new digitization effort \nmight therefore start with a mapping of the extent to which a books corpus in a given \nlanguage has been digitized. \n\n\n \n \n \n \n [html]\n
TableTableTable
TableTowards a Books Data Commons for AI Training16
", + "page_start": 16, + "page_end": 16, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "*What dataset management practices are necessary?*\n\nNo matter how a books data commons gets built, it will be important to consider broader \naspects of data governance. For example: \n\n•**Dataset documentation and transparency:**Transparent documentation is important \nfor any dataset used for AI training. A datasheet is a standardized form of \ndocumentation that includes information about provenance and composition of data, \nand includes information on management practices, recommended uses or collection \nprocess. \n\n•**Quality assurance:**Above, we note the many features that make books useful for AI \ntraining, as compared with web data, for example. That said, the institution managing \na books commons dataset may still want to collect and curate the collection to meet \nthe particular purposes of its users. For instance, it may want to take steps to \nmitigate biases inherent in the dataset, by ensuring books are representative of a \nvariety of languages and geographies. \n\n•**Understanding uses:**The institution managing a books commons dataset could \nmeasure and study how the dataset is used, to inform future improvements. Such \nmonitoring may also enable accountability measures with respect to uses of the \ndataset. Introducing community norms for disclosing datasets used in AI training and \nother forms of AI research would facilitate such monitoring. \n\n•**Governance mechanisms:**In determining matters like acceptable and ethical use, the \nfundamental question is “who decides.” While this might be settled simply by whoever \nsets up and operates the dataset and related \ninfrastructure, participatory \nmechanisms — such as advisory bodies bringing together a broad range of users and \nstakeholders of a collection — could also be incorporated. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 19, + "page_end": 19, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "INTRODUCTION \n\n∗Joint first authors \n\n\n\nJust as environmental impact scales with model size, so does \nthe difficulty of understanding what is in the training data. In §4, \nwe discuss how large datasets based on texts from the Internet \noverrepresent hegemonic viewpoints and encode biases potentially \ndamaging to marginalized populations. In collecting ever larger \ndatasets we risk incurring documentation debt. We recommend \nmitigating these risks by budgeting for curation and documentation \nat the start of a project and only creating datasets as large as can \nbe sufficiently documented. \n\nAs argued by Bender and Koller [14], it is important to under- \nstand the limitations of LMs and put their success in context. This \nnot only helps reduce hype which can mislead the public and re- \nsearchers themselves regarding the capabilities of these LMs, but \nmight encourage new research directions that do not necessarily \ndepend on having larger LMs. As we discuss in §5, LMs are not \nperforming natural language understanding (NLU), and only have \nsuccess in tasks that can be approached by manipulating linguis- \ntic form [14]. Focusing on state-of-the-art results on leaderboards \nwithout encouraging deeper understanding of the mechanism by \nwhich they are achieved can cause misleading results as shown \n\nThis work is licensed under a Creative Commons Attribution International 4.0 License. \nFAccT ’21, March 3–10, 2021, Virtual Event, Canada \nACM ISBN 978-1-4503-8309-7/21/03. \nhttps://doi.org/10.1145/3442188.3445922", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "different rightsholders and authors. Managing opt-outs for so many different interests within \none book may get overly complicated very fast. \n\nIn any event, creating an opt-out system will need some ways of authenticating whether \nsomeone has the relevant authority to make choices about inclusion of a work. \n\n*Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The \nPile. Another possible design choice is to restrict access only to authorized users and to \nenforce particular responsibilities or obligations in return for authorization. Three particular \ndimensions of permitted uses and users came up in our discussions: \n\n•**Defining and ensuring acceptable and ethical use:**Participants discussed to what \nextent restrictions should be put on use of the resource. In the case of HathiTrust, \nacceptable use is implicitly ensured by limiting access to researchers from member \ninstitutions; other forms of “gated access” are possible, allowing access only to \ncertain types of users and for certain uses. \n One can imagine more fine-grained \nmechanisms, based on a review of the purpose for which datasets are used. This \nimagined resource could become a useful lever to demand responsible development \nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that \ncould incentivize good behavior. At the same time, drawing the lines around, let alone \nenforcing, “good behavior” would constitute a significant challenge. \n\n39 \n\n•**Charging for use to support sustainability of the training corpus itself:**While wanting \nto ensure broad access to this resource, it is important to consider economic \nsustainability, including support for continuing to update the resource with new works \nand appropriate tooling for AI training. Requiring some form of payment to use the \nresource could support sustainability, perhaps with different requirements for \ndifferent types of users (e.g., differentiating between non-commercial and \ncommercial users, or high-volume, well-resourced users and others). 40 \n\n•**Ensuring benefits of AI are broadly shared, including with book authors or**\n**publishers:**The creation of a training resource might \nlower barriers to the \ndevelopment of AI tools, and in that way support broadly shared benefits by \nfacilitating greater competition and mitigating concentration of power. On the other \nhand, just as concentration of technology industries is already a significant challenge, \nAI might not look much different, and the benefits of this resource may still simply go \nto a few large firms in “winner takes all-or-most” markets. The workshops discussed \nhow, for instance, large commercial users might be expected to contribute to a fund \nthat supported contributors of training data, or more generally to fund writers, to \nensure everyone contributing to the development of AI benefits. \n\n For examples of gated access to AI models, see https://huggingface.co/docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise.", + "page_start": 18, + "page_end": 18, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "In the United States, before which date is book out of copyright for sure ?", + "target_page": 9, + "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 \n\n See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. \n\n In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 \n\n**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate \n\n For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024.", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Reliance on Copyright Limitations and Exceptions**\n\nEven if a book is in copyright, it’s possible that copying books for AI training may be covered \nby existing limitations and exceptions to copyright law in particular jurisdictions. For \nexample: \n\n• In the United States, many argue using existing works to train generative AI is “fair \nuse,” consistent with existing law and legal precedents. \n This is the subject of a \nnumber of currently active court cases, and different actors and tools may yield \ndifferent results, as fair use is applied case-by-case using a flexible balancing test. \n\n19 \n\n• In the European Union, there are explicit exceptions in the law for “text and data \nmining” uses of in-copyright works, both for non-commercial research and for \ncommercial purposes. However, for commercial uses and for users outside of \nresearch and heritage institutions, they must respect the rights of rightsholders who \nchoose to “reserve their rights” (i.e., opt-out of allowing text and data mining) via \n The exception also requires that users have “lawful \nmachine readable mechanisms. \naccess” to the works. \n\n20 \n\n• Finally, Japan provides a specific text and data mining exception, without any \ncomparable opt-out requirement for commercial uses as is embedded in EU law. 21 \n\nWhile exceptions that allow AI training exist in several other countries, such as Singapore and \nIsrael, most countries do not provide exceptions that appear to permit AI training. Even where \npotentially available, as in the United States, legal uncertainty and risk create a hurdle for \nanyone building a books commons. 22 \n\n See e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at https:// \n19 \nwww.regulations.gov/comment/COLC-2023-0006-10299 as well as many other submissions to the US \ncopyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal \nRelations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow, \nAmerican Library Association (ALA) Office of Public Policy and. “Training Generative AI Models on \nCopyrighted Works Is Fair Use.”*Association of Research Libraries*, 23 Jan. 2024, www.arl.org/blog/ \ntraining-generative-ai-models-on-copyrighted-works-is-fair-use/. \n\n See Articles 3 and 4 of the EU’s Directive on Copyright and Related Rights in the Digital Single Market \n20 \n— https://eur-lex.europa.eu/eli/dir/2019/790/oj. \n\n Japan clarified its laws in 2018 to make clear that this type of use is permitted — see discussion in \n\n21 \nTestimony of Matthew Sag, July 2023, https://www.judiciary.senate.gov/imo/media/doc/ \n2023-07-12_pm_-_testimony_-_sag.pdf, see also Fiil-Flynn, S.*et al.*(2022)*Legal reform to enhance global*\n*text and Data Mining Research*,*Science*. Available at: https://www.science.org/doi/10.1126/ \nscience.add6124 (Accessed: 28 Sept. 2023). \n\n See supra note 22*.*See also Jonathan Band,*Copyright Implications of the Relationship between*\n\n22 \n*Generative Artificial Intelligence and Text and Data Mining | Infojustice*. infojustice.org/archives/45509. In \naddition, for an in-depth look at the cross-border legal challenges involved see:*Wrapping up Our NEH-*\n*Funded Project to Help Text and Data Mining Researchers Navigate Cross-Border Legal and Ethical*\n*Issues*. 2 Oct. 2023, buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-and- \ndata-mining-researchers-navigate-cross-border-legal-and-ethical-issues/. Accessed 20 Mar. 2024.", + "page_start": 10, + "page_end": 10, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "It is also important to note two other issues that can affect the application of limitations and \nexceptions, in particular, their application to e-books. \n\nThe first important limitation is that almost every digital book published today comes with a \nset of contractual terms that restrict what users can do with it. In many cases, those terms \nwill explicitly restrict text data mining or AI uses of the content, meaning that even where \ncopyright law allows for reuse (for example, under fair use), publishers by contract can \nimpose restrictions anyway. In the United States, those contract terms are generally thought \nto override the applicability of fair use or other limitations and exceptions. \n Other \njurisdictions, such as those in the EU, provide that certain limitations and exceptions cannot \nbe contractually overridden, though experience to date varies with how those anti-contractual \noverride protections work in practice. \n\n23 \n\n 24 \n\nThe second limitation is the widespread adoption of “anti-circumvention” rules in copyright \nlaws and the interplay of these with a choice to rely on copyright limitations and exceptions. \nDigital books sold by major publishers are generally encumbered with “digital rights \nmanagement” (DRM) that limits how someone can use the digital file. For instance, DRM can \nlimit the ability to make a copy of the book, or even screenshot or excerpt from it, among \nother things. Anti-circumvention laws restrict someone's ability to evade these technical \nrestrictions, even if it is for an ultimately lawful use. \n\nWhat this means for our purposes is that even if one acquires a digital book from, for \nexample, Amazon, and it is lawful under copyright law to use that book in AI training, it can \nstill generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. \n 25 \nThus, the ability to use in-copyright books encumbered by DRM — that is, most all books sold \nby major publishers — is generally limited. 26 \n\nPractically, using in-copyright books to build a books commons for AI training — while relying \non copyright’s limitations and exceptions — requires turning a physical book into digital form, \nor otherwise engaging in the laborious process of manually re-creating a book’s text (i.e., re- \ntyping the full text of the book) without circumventing the technical restrictions themselves. \n\n See Hansen, Dave. “Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.”*Authors Alliance*, \n23 \n23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-two- \neasy-steps/. Accessed 20 Mar. 2024. \n\n See Band, Jonathan. “Protecting User Rights against Contract Override.”*Joint PIJIP/TLS Research*\n24 \n*Paper Series*, 1 May 2023, digitalcommons.wcl.american.edu/research/97/. Accessed 20 Mar. 2024. \n\n In the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for \n\n25 \nresearchers engaged in text and data mining. See their rulemaking in 2021 https:// \nwww.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on- \ncircumvention-of-copyright-protection-systems-for-access-control. These rules are reviewed triennially \nand are currently under review, with submissions suggesting both contraction and expansion; see the \nAuthors’ Alliance comments in January 2024 https://www.authorsalliance.org/2024/01/29/authors- \nalliance-submits-long-form-comment-to-copyright-office-in-support-of-petition-to-expand-existing-text- \nand-data-mining-exemption/. It is possible that one could argue for these exceptions to be expanded, \nand then work to renew that exception every three years. The EU’s text and data mining exception may \nalso limit use of DRM to impede data mining, but only for particular covered research and heritage \ninstitutions; commercial and other users are not covered, however.", + "page_start": 11, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on \nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust, \nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32 \n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university \nlibraries and today is “an international community of research libraries committed to the \nlong-term curation and availability of the cultural record.” \n It started in what it calls the “early \ndays of mass digitization” — that is, at a time when it started to become economical to take \nexisting physical artifacts in libraries and turn them into digital files at a large scale. \n\n33 \n\nThe founding members of HathiTrust were among the initial partners for Google’s Book \nSearch product, which allows people to search across and view small snippets of text from \nin-copyright books and read full copies of public domain books scanned from libraries’ \ncollections. The libraries provided Google with books from their collections, Google would \nthen scan the books for use in Book Search, and return to the libraries a digital copy for their \nown uses. These uses included setting up HathiTrust not only to ensure long-term \npreservation of the digital books and their metadata, but also to facilitate other uses, \nincluding full text search of books and accessibility for people with print disabilities. In \nseparate court cases, both Google and HathiTrust’s uses of the books were deemed \nconsistent with copyright law. \n\n34 \n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as \nthe Research Center. The Center grew in part out of a research discipline called “digital \nhumanities,” which, among other things, seeks to use computational resources or other \ndigital technologies to analyze information and contribute to the study of literature, media, \nhistory, and other areas. For instance, imagine you want to understand how a given term \n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used \nand how often it was used over time by analyzing a vast quantity of sources, searching out \nthe term’s use. The insight here is that there is much to be learned not just from reading or \notherwise consuming specific material, but also from “non-consumptive research,” or \n\"research in which computational analysis is performed on one or more volumes (textual or \nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use. \n\nToday, the Center “[s]upports large-scale computational analysis of the works in the \nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18 \nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly \n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has \nlimitations in terms of its representation across subject matter, language, geography, and \nother dimensions. In terms of subject matter, the corpus is skewed towards humanities \n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English, \n\n*Authors Guild v. HathiTrust,*902 F.Supp.2d 445 (SDNY October 10, 2012) and*Authors Guild v.*\n32 \n*HathiTrust*, 755 F.3d 87 (2d Cir. 2014). \n\n\n \n \n \n \n [html]\n
Table
Patients without
Age, years
Table
\n\nTowards a Books Data Commons for AI Training 14", + "page_start": 14, + "page_end": 14, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "engagement. And, at least in the U.S., it could generate billions of dollars in damages if the \nspecific design choices and technical constraints are not adequate to justify a finding of fair \nuse. \n\nThis sort of books dataset could be built by expanding use of in-copyright books that have \nalready been digitized from existing libraries and other sources. Specifically, workshop \nparticipants mentioned that the Internet Archive, HathiTrust, and Google as entities that have \ndigitized books and could repurpose their use to build a books commons, although \nchallenges with using these datasets were noted. The Internet Archive is in the midst of \nlitigation brought by book publishers for its program for lending digital books; while not \ndirectly relevant to the issue of AI training using their corpus of books, this sort of litigation \ncreates a chilling effect on organizations seeking to make new uses of these digitized books. \nMeanwhile, Google encumbered HathiTrust’s digital copies with certain contractual \nrestrictions, which would need to be addressed to develop a books dataset for AI training, \nand Google itself is unlikely to share its own copies while it provides them a competitive \nadvantage. \n\nPerhaps as a matter of public policy, these existing copies could be made more freely \navailable. For instance, to ensure robust competition around AI and advance other public \ninterests, policymakers could remove legal obstacles to the sharing of digitized book files for \nuse in AI training. Alternatively, policymakers could go further and affirmatively compel \nsharing access to these digital book files for AI training. \n\nIt's possible that there could be a new mass digitization initiative, turning physical books into \nnew digital scans. At least in theory, one could try to replicate the existing corpora of \nHathiTrust, for example, without Google’s contractual limitations. At the same time, such an \neffort would take many years, and it seems unlikely that many libraries would want to go to \nthe trouble to have their collections digitized a second time. Moreover, while new scans may \nprovide some incremental benefit over use of existing ones (e.g., by using the most modern \ndigitization and OCR tools and thus improving accuracy), there is no inherent social value to \nmaking every entity that wants to do or allow AI training invest in their own redundant \nscanning. \n\nA new digitization effort could target works that have not been yet digitized. This may be \nparticularly useful given that previous book digitization efforts, and the Google Books project \nin particular, have focused heavily (though not exclusively) on libraries in English-speaking \ncountries. Additional digitization efforts might make more sense for books in those \nlanguages that have not yet been digitized at a meaningful scale. Any new digitization effort \nmight therefore start with a mapping of the extent to which a books corpus in a given \nlanguage has been digitized. \n\n\n \n \n \n \n [html]\n
TableTableTable
TableTowards a Books Data Commons for AI Training16
", + "page_start": 16, + "page_end": 16, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", + "page_start": 1, + "page_end": 1, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Reisner, Alex (19 August 2023), \"Revealed: The Authors Whose Pirated Books are Powering \n\nGenerative AI\" (https://www.theatlantic.com/technology/archive/2023/08/books3-ai-meta-lla \nma-pirated-books/675063/),*The Atlantic*, archived (https://web.archive.org/web/2024100307 \n1505/https://www.theatlantic.com/technology/archive/2023/08/books3-ai-meta-llama-pirated- \nbooks/675063/) from the original on 3 October 2024, retrieved 5 October 2024", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", + "target_page": 13, + "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "correlated (see Figure 12). We preferred to propose \ndatasets even if they could introduce biases rather \nthan not address the task in the benchmark. Note \nthat each task type can be considered individually. \nWe hope additional resources will be developed \nin the French-speaking community to enrich our \ncomparison. \n\nBenchmark validity over time As with all \nbenchmarks, their reliability over time can be dis- \ncussed as the field evolves fast. The models se- \nlected for the analysis conducted in this paper are \nthose available at this time, new outperforming \nmodels will be created and shall be evaluated. Our \nwork extends MTEB and thus simplifies the ad- \ndition of new datasets for evaluation and allows \nrunning new models. With this effort, we hope \nthis will simplify the evaluation of new models pro- \nposed by the community to keep our work up to \ndate. \n\nSana Al-Azzawi, Blessing K. Sibanda, Davis \nDavid, Lolwethu Ndolela, \nJonathan Mukiibi, \nTunde Oluwaseyi Ajayi, Tatiana Moteu Ngoli, Brian \nOdhiambo, Abraham Toluwase Owodunni, Nnae- \nmeka Obiefuna, Shamsuddeen Hassan Muham- \nmad, Saheed Salahudeen Abdullahi, Mesay Gemeda \nYigezu, Tajuddeen Rabiu Gwadabe, Idris Abdulmu- \nmin, Mahlet Taye Bame, Oluwabusayo Olufunke \nAwoyomi, Iyanuoluwa Shode, Tolulope Anu Ade- \nlani, Habiba Abdulganiy Kailani, Abdul-Hakeem \nOmotayo, Adetola Adeeko, Afolabi Abeeb, An- \nuoluwapo Aremu, Olanrewaju Samuel, Clemen- \ncia Siro, Wangari Kimotho, Onyekachi Raphael \nOgbu, Chinedu E. Mbonu, Chiamaka Ijeoma Chuk- \nwuneke, Samuel Fanijo, Jessica Ojo, Oyinkansola F. \nAwosan, Tadesse Kebede Guge, Sakayo Toadoum \nSari, Pamela Nyatsine, Freedmore Sidume, Oreen \nYousuf, Mardiyyah Oduwole, Ussen Kimanuka, \nKanda Patrick Tshinu, Thina Diko, Siyanda Nx- \nakama, Abdulmejid Tuni Johar, Sinodos Gebre, \nMuhidin A. Mohamed, Shafie Abdi Mohamed, \nFuad Mire Hassan, Moges Ahmed Mehamed, Evrard \nNgabire, and Pontus Stenetorp. 2023. Masakhanews: \nNews topic classification for african languages. In \nInternational Joint Conference on Natural Language \nProcessing. \n\nData contamination issues Bias may exist for \nmodels that use the training sets of the provided \nevaluation datasets for their training. It consider- \nably improves their performance on the benchmark, \nfavouring them over other models. This is particu- \nlarly worrying for models that do not communicate \nabout the datasets used during training, such as pro- \nprietary models. Generally speaking, it would be \ninteresting to calculate the similarity between the \ndatasets used to train the models and those used to \ntest them to check that they are far enough apart to \ndraw general conclusions. \n\nEneko Agirre, Carmen Banea, Daniel Cer, Mona Diab, \nAitor Gonzalez-Agirre, Rada Mihalcea, German \nRigau, and Janyce Wiebe. 2016. SemEval-2016 \ntask 1: Semantic textual similarity, monolingual \nand cross-lingual evaluation. In Proceedings of the \n10th International Workshop on Semantic Evaluation \n(SemEval-2016), pages 497–511, San Diego, Califor- \nnia. Association for Computational Linguistics. \n\nArthur Barbosa, Máverick Ferreira, Rafael Fer- \nreira Mello, Rafael Dueire Lins, and Dragan Ga- \nsevic. 2021. The impact of automatic text transla- \ntion on classification of online discussions for social \nand cognitive presences. In LAK21: 11th Interna- \ntional Learning Analytics and Knowledge Confer- \nence, LAK21, page 77–87, New York, NY, USA. \nAssociation for Computing Machinery. \n\nFocus on sentence embeddings Finally, like the \noriginal version of MTEB, the comparison focuses \nmainly on sentence embeddings. Other tasks could \nbe added to cover word embeddings and, therefore, \nmore NLP tasks. \n\nRachel Bawden, Eric Bilinski, Thomas Lavergne, and \nSophie Rosset. 2021. Diabla: A corpus of bilingual \nspontaneous written dialogues for machine transla- \ntion. Language Resources and Evaluation, 55:635– \n660. \nAcknowledgements \n\nWe would like to thank Wikit11 and Esker12 for \nproviding compute and funding this research.", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv4.pdf" + }, + { + "text": "Dataset x Task \nAmazonReviewsClassification \nMasakhaNEWSClassification \nMassiveIntentClassification \nMassiveScenarioClassification \nMTOPDomainClassification \nMTOPIntentClassification \nAlloProfClusteringP2P \nAlloProfClusteringS2S \nHALClusteringS2S \nMasakhaNEWSClusteringP2P \nMasakhaNEWSClusteringS2S \nMLSUMClusteringP2P \nMLSUMClusteringS2S \nOpusparcusPC \nPawsX \nSTSBenchmarkMultilingualSTS \nSTS22 \nSICKFr \nDiaBLaBitextMining \nFloresBitextMining \nAlloprofReranking \nSyntecReranking \nAlloprofRetrieval \nBSARDRetrieval \nSyntecRetrieval \nSummEvalFr Average # tokens \n49.6 \n1398.2 \n11.4 \n11.4 \n12.5 \n12.5 \n1021.8 \n8.8 \n25.6 \n1398.1 \n21.7 \n1062.1 \n20.8 \n9.7 \n34.9 \n18.4 \n722.1 \n15.1 \n12.02 \n33.42 \n48.3 - 1179.4 - 1196.4 \n19.2 - 402.2 - 467.2 \n48.31 - 1117.91 \n144.03 - 24530.8 \n19.22 - 295.65 \n657.08 - 71.18 - 107.56 \n\nReference \nMcAuley and Leskovec (2013) \nAdelani et al. (2023) \nFitzGerald et al. (2023) \nFitzGerald et al. (2023) \nLi et al. (2021) \nLi et al. (2021) \nLefebvre-Brossard et al. (2023) \nLefebvre-Brossard et al. (2023) \nIntroduced by our paper \nAdelani et al. (2023) \nAdelani et al. (2023) \nScialom et al. (2020) \nScialom et al. (2020) \nCreutz (2018) \nYang et al. (2019) \nMay (2021) \nChen et al. (2022) \nhttps://huggingface.co/datasets/Lajavaness/SICK-fr \nBawden et al. (2021) \nGoyal et al. (2021) \nLefebvre-Brossard et al. (2023) \nIntroduced by our paper \nLefebvre-Brossard et al. (2023) \nLouis and Spanakis (2022) \nIntroduced by our paper \nCreated from Fabbri et al. (2021) \n\nLicense \nN/A \nAFL-3.0 \nN/A \nN/A \nN/A \nN/A \nMIT \nMIT \nApache-2.0 \nAFL-3.0 \nAFL-3.0 \nOther \nOther \nCC-BY-NC-4.0 \nOther \nN/A \nN/A \nApache-2.0 \nCC-BY-SA-4.0 \nCC-BY-SA-4.0 \nMIT \nApache-2.0 \nMIT \nCC-BY-NC-SA-4.0 \nApache-2.0 \nMIT \n\n# samples \n5000 \n422 \n2974 \n2974 \n3193 \n3193 \n2556 \n2556 \n26233 \n422 \n422 \n15828 \n15828 \n1007 \n2000 \n1379 \n104 \n4906 \n5748 \n1012 \n2316 - 2975 - 22064 \n100 - 100 - 917 \n2316 - 2556 \n222 - 22600 \n100 - 90 \n100 - 1100 - 1600 \n\nTable 3: Details of the data used for each task. The average number of tokens of texts is computed using the \ncl100k_base tokenizer. For Reranking, the three numbers refer to the queries, the pairs of queries with relevant \ndocuments and the pairs of queries with irrelevant ones, respectively. The pairs of queries and documents are \nobtained from the 90 dataset’s documents. For Retrieval datasets, the two numbers refer to the queries and the \ndocuments, respectively. For SummEvalFr, the three numbers refer to the texts, human and machine summaries. \nReferences to all the datasets used are available. \n\nFigure 3: Cosine similarity between tasks’ data. Ninety random samples per task’s data are embedded using the \nmultilingual-e5-small model. The embeddings of each task’s data sample are averaged. The similarity between each \ndataset is then calculated using cosine similarity as in (Muennighoff et al., 2022).", + "page_start": 12, + "page_end": 12, + "source_file": "arxiv4.pdf" + }, + { + "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. \n\nUnder the fine-tuning protocol, V-JEPA also achieves the \nbest performance of any model trained with a ViT-L/16, \nand matches the performance of the Hiera-L on SSv2, \nwhich benefits from a hierachical prior (Ryali et al., 2023). \nThe V-JEPA models achieve this result while processing \nsignificantly fewer samples during pretraining (Figure 4), \ndemonstrating the efficiency of feature prediction as a \nlearning principle. \n\nand image task with notable margin (see Table 6). Our \nH/16 model outperforms the largest publicly available \nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera \nmodels by at least +5 points in motion understanding \n(Something-Something-v2), +2 points in action recogni- \ntion (Kinetics-400), +5 points on action detection (AVA), \n+1 point on object recognition (ImageNet-1K), +2 points \nin scene recognition (Places205), and +0.2 points on fine- \ngrained recognition (iNaturalist). Moreover, when com- \nparing pretraining wallclock time in Figure 5, we see that \nV-JEPA achieves this performance with a roughly 2 \n× \nspeedup compared to the large pixel prediction models. \n\n5.2 Comparison with State-of-the-Art \n\nNext, in Table 6, we inspect how the V-JEPA models \npretrained on video stack up next to the largest state- \nof-the-art self-supervised image and video models when \nfreezing the backbone encoder and training an attentive \nprobe on top. Our image pretrained baselines include \nOpenCLIP (Cherti et al., 2023), DINOv2 (Oquab et al., \n2023), and I-JEPA (Assran et al., 2023). The Open- \nCLIP model is trained with a contrastive image-text \nalignment objective, DINOv2 and I-JEPA are trained \nwith self-supervision. These models are known to excel \nin their frozen-evaluation performance (Oquab et al., \n2023); i.e., their ability to produce visual features that \ncan be applied to many downstream tasks simultane- \nously, without end-to-end fine-tuning, and thus pro- \nvide highly competitive baselines. Our video pretrained \nbaselines include VideoMAE (Tong et al., 2022), Omni- \nMAE (Girdhar et al., 2023), Hiera (Ryali et al., 2023), \nVideoMAEv2 (Wang et al., 2023a), and MVD (Wang \net al., 2023b). The OpenCLIP, DINOv2 and Video- \nMAEv2 models are parameterized as Giant/Gigantic \nvision transformer architectures containing over 1B pa- \nrameters trained on large-scale image or video datasets. \n\nComparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. \n\n\n \n \n \n \n [html]MethodArch.# Samples SeenIter.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )ViT - L / 16\n
AVAIN1KPlaces205iNat21K400 - ft ( 16 × 5 × 3 )SSv2 - ft ( 36 × 2 × 3 )Methods pretroined using pivel prolictionOmniMAE
2400M1170K65.660.614.475.159.866.184.074.2VideoMAEViT - L / 16
410M400K77.865.521.671.159.364.685.474.3HieraHiera - L
770M1500K75.564.215.868.958.556.987.375.1V - JEPAViT - L / 16
270M90K80.869.525.674.860.367.885.675.1
\n\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
DatasetBLEUROUGE - 1ROUGE - 2ROUGE - L
SummEval0.2050.2920.0990.193
SummEvalFr0.2760.3020.1170.194
Correlation En - Fr0.700.850.800.84
\n\n3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\nTable 2: Average ROUGE and BLUE scores computed \nbetween machine summaries and human summaries \nfor the original English SummEval and its translation \nto French. The correlations of the individual scores \nbetween English and French are also reported. \n\nThe reranking task, as evaluated in MTEB, requires \ndatasets composed of a set of queries, each as- \nsociated with relevant and irrelevant documents. \nDespite our efforts, we found no French dataset \nthat natively exhibits such a structure. Thus, to \nevaluate this task, we built data for the reranking \ntask based on the Syntec and Alloprof (Lefebvre- \nBrossard et al., 2023) datasets. These already fea- \nture queries and labeled relevant documents. Irrele- \nvant ones were added using the following process: \n\n3.2 Models \n\nFor comparison on our benchmark, we selected \nvarious models to fulfil three objectives. \n\nIt was imperative to include \ntop performers from the MTEB benchmark \n(Muennighoff et al., 2022). We mainly se- \nlected multilingual models and some English \nmodels to asses their language-transferring \nabilities. Additionally, we integrated natively \nFrench transformer-based models such as \nCamemBERT (Martin et al., 2019), FlauBERT \n(Le et al., 2020) and even the very recent \nCroissantLLM (Faysse et al., 2024). \n\n• Quantity: The aim was to compare a substan- \ntial number of models (51 in total) to provide \ncomprehensive results, facilitating the com- \nmunity in selecting effective French models. \n\n• Relevance: \n\n• To avoid bias, we use the BM25 algorithm \n(Robertson and Jones, 1976) (which is a deter- \nministic method) to rank documents in terms \nof relevance regarding each query. \n\n• The top 10 documents that are not labeled as", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\n\n \n \n \n \n [html]TargetArch.Frozen Evaluation\n
Fine - Tuning
K400 ( 16 × 1 × 1 )SSv2 ( 36 × 1 × 1 )IN1KK400 - ft ( 16 × 5 × 3 )
PixelsViT - L / 1668.666.073.385.4
FeaturesViT - L / 1673.766.274.885.6
\n\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\n\n \n \n \n \n [html]Frozen EvaluationArch.Data# SamplesK400 ( 96 × 1 × 1 )ViT - L / 16ViT - H / 16\n
SSv2 ( 15 × 1 × 1 )IN1KAvg.
K710700K75.863.273.770.9
K710 + SSv2900K72.967.472.871.0
K710 + HT1900K74.564.274.871.1
VideoMix2M2000K73.766.274.871.5
K710 + SSv2900K75.766.873.772.0
VideoMix2M2000K74.068.575.972.8
\n\nversus pixel prediction objective, b) the construction of \nthe pretraining data distribution, c) the feature pooling \nstrategy for leveraging the model’s representations in \ndownstream tasks, and d) the masking strategy, towards \nidentifying: what to predict from what?", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "Figure 4: 2D projection of tasks’ data. 90 random samples per task’s data are embedded using multlingual-e5-small \nmodel (Wang et al., 2022). The embeddings are reduced to 2 dimensions using PCA. The centroid of each task’s \ndata is represented, along with the ellipse showing the standard deviation along each axis. \n\n\n \n \n \n \n [html]\n
Task typeModelScore
Classification ( F1 - score )TF - IDF + LR0.60 (± 0.002 )
TF - IDF + SVC0.61 (± 0.001 )
CarnemBERT ( finc - tuned )*0.6 (± 0.008 )
GPT - 4 ( ICL )**0.30
Topic ModelingTF - IDF + LDA0.49 ( Coherence )
\n\nTable 5: Baselines results for HAL on a classification \ntask and topic modeling. \n*CamemBERT was finetuned for 5 epochs with learn- \ning rate of 1e−4 (+ lr scheduler) and a batch size of 64. \n**Due to limited budget, we evaluate GPT-4 ICL ca- \npabilities on a limited subset of our dataset (600 first \nsamples from the test set that is generated using the \nsame seed as for other experiments). \n\nLabel \nshs # raw # mteb_eval Description \n58706 \n\nHuman and social sciences (Sci- \nences humaines et sociales) \nLife science [Biology] (Sciences du \nvivant [Biologie]) \nEngineering science (Sciences de \nl’ingénieur [Physics]) \nComputer Science (Informatique) \nEnvironment science (Sciences de \nl’environnement) \nPhysics (Physique) \nPlanet and Universe [Physics] \n(Planète et Univers [Physique]) \nMathematics (Mathématiques) \nChemistry (Chimie) \nCognitive sciences (Sciences cogni- \ntives) \nEconomy and quantitative finance \n(Économie et finance quantitative \nStatistics (Statistiques) \nOther (Autre) \nN/A \nNon-linear Science [Physics] (Sci- \nence non linéaire [Physique]) \nElectro-magnetism \nmagnétisme) \nInstrumentation [Physics] (Instru- \nmentation [Physique]) \nImage \n\n6701 \n\nsdv 11049 4803 \n\nspi 3601 3451 \n\ninfo \nsde 3446 \n2830 3263 \n2754 \n\nphys \nsdu 2003 \n1177 1926 \n1158 \n\nmath \nchim \nscco 862 \n764 \n652 824 \n734 \n619 \n\nqfin 183 N/A \n\nstat \nother \nstic \nnlin 52 \n18 \n14 \n12 N/A \nN/A \nN/A \nN/A \n\n(Electro- electromag 3 N/A \n\ninstrum 2 N/A \n\nimage 1 N/A \n\nTable 4: Distribution of classes in HAL the raw and \nmteb_eval subsets of the dataset. \n\n• Bitext Mining: F1 score \n\n• Classification: Accuracy \n\n• Clustering: V measure \n\n• Pair Classification: Average Precision (AP) \n\n• Reranking: Mean Average Precision (MAP) \n\n• Retrieval: Normalized Discounted Cumula- \n\ntive Gain at k (NDCG@k) \n\n• STS: Spearman correlation based on cosine \n\nsimilarity", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv4.pdf" + }, + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "3.1 New Datasets \n\nWe identified 7 datasets relevant to French in the ex- \nisting MTEB, which we assume are of good quality. \nWe complemented these with 8 external relevant \ndatasets proposed in the literature, such as BSARD \n(Louis and Spanakis, 2022) and Alloprof (Lefebvre- \nBrossard et al., 2023), which are proven to be good \nquality. We created 3 new ones presented in Table 1 \nand assessed their quality with various procedures \nand metrics. In addition to all performed checks, \nwe run multiple models on these datasets and pro- \nvide results to show that they are neither trivial nor \nimpossible to solve (see Tables 10, 11, 12 and 13). \nTherefore, as of today, our French MTEB \nruns on 18 datasets. Some datasets are framed \ndifferently according to the task category they \nare used with. For example, MasakhaNEWS \ndataset \nis used for \nboth Classification (MasakhaNEWSClassification) \nand Clustering (MasakhaNEWSClusteringS2S and \n\n\n \n \n \n \n [html]\n
Accuracy
3https : // w
4 https :// hmteb - fr - retri
5 https : // h
\n\n(Adelani et al., 2023) \n\n2Models on the HuggingFace hub: sentence-camebert, \nsentence_croissant_alpha_v0.3, Solon-embeddings-large-0.1. \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "MasakhaNEWSClusteringP2P). Table 3 shows de- \ntails of each task data used for running the bench- \nmark. \n\n2019; Le et al., 2020). Most French models for \nsentence embeddings have been developed by the \nopen-source community2, by fine-tuning models \nlike CamemBERT(Martin et al., 2019) or Crois- \nsantLLM(Faysse et al., 2024). \n\nThis section describes the 3 new datasets we in- \ntroduce, quality checks performed and an analysis \nof the semantic similarities between datasets. \n\nBenchmarks Embedding models are generally \ncompared on specific tasks, such as information \nretrieval, STS or reranking (Thakur et al., 2021; \nAgirre et al., 2016; Wang et al., 2021). Other \nworks evaluate embedding models on multiple \ntasks (Wang et al., 2018; et al., 2022; Conneau and \nKiela, 2018) or compare meta-embeddings (García- \nFerrero et al., 2021). The most comprehensive \nbenchmark to date is MTEB (Muennighoff et al., \n2022). MTEB still has a critical limit: it mainly \nfocuses on English. Some initiatives already ex- \ntended this benchmark to other languages, such as \nChinese (Xiao et al., 2024) and German (Wehrli \net al., 2024). Our work comes with the same am- \nbition for French. It relies on the MTEB structure \nthat provides a solid basis for analysis and extends \nit to a new language. \n\n3.1.1 Syntec (Retrieval) \n\nThe Syntec French collective bargaining agree- \nment3 comprises around 90 articles. Despite its \ntopic, the language used does not feature the speci- \nficity of the legal vocabulary, making the data \nsuitable for benchmarking general-purpose mod- \nels. The articles have been scraped for use as doc- \numents. Four annotators were divided into two \ngroups. Each group was given half of the articles \nand asked to choose an article and write a question \nabout it. Each annotator wrote 25 questions. Thus, \na hundred questions have been manually created \nand paired with the articles containing the answer4. \nExamples of the dataset are available in the ap- \npendix Figure 5. This dataset could also be used \nfor text classification, clustering or topic modeling. \nRegarding quality checks, every article’s integrity \nhas been reviewed while manually creating ques- \ntions. We also manually checked that the questions \ncould only be answered using the annotated article. \n\n3 MTEB for French \n\nIn this section, we describe the datasets and the \nmodels that we propose for the French extension \nof MTEB. We also list the research questions we \nwant to discuss with the results. \n\n3.1.2 HAL (Clustering) \n\nHyper Articles en Ligne (HAL) is a French open \narchive of scholarly documents from all academic \nfields. Scrapping this resource, we fetched 85,000 \npublications in French5. We extracted IDs, titles \nand the author’s choice among domain labels. The \nlast 2 are provided by authors when submitting \ntheir papers to HAL. Since domain annotations are \nprovided, the dataset can be used for many tasks, \nsuch as topic modeling or text classification. To en- \nsure the dataset quality is suitable for a benchmark, \nfurther data cleaning has been performed: \n\n3.1 New Datasets", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "Where will the 2024 AI + Energy summit take place ?", + "target_page": 1, + "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. \n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… \n\n\n\n\n\nMar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": ". \n0 \n. \n4 \nY \nB \nC \nC \n\nr \ne \nd \nn \nu \nd \ne \ns \nn \ne \nc \ni \nl \ne \nr \na \ns \no \nt \no \nh \np \n\nC \nC \n\n\n\n**cc global summit**\n\nOver 300 attendees from 45 countries joined us this past October in \nMexico City for the first in-person**CC Global Summit**since 2019. The \ntheme was AI & the Commons with over 60 sessions and 180 speakers. \n**Learn more here.**\n\n**Thank you to our sponsors:**John D. and Catherine T. MacArthur \nFoundation, Microsoft Corporation, Filecoin Foundation for the \nDecentralized Web, Akin, Anthropic, Mozilla Foundation, The Michelson \n20MM Foundation, MHz Curationist, Frontiers Media, Arnold & Porter, \nand Crowell & Moring.", + "page_start": 5, + "page_end": 5, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] \n\n**History**\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. \nThe study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, \nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical \nreasoning.[319][320] This, along with concurrent discoveries in cybernetics, information theory and \nneurobiology, led researchers to consider the possibility of building an \"electronic brain\".[r] They \ndeveloped several areas of research that would become part of AI,[322] such as McCullouch and Pitts \ndesign for \"artificial neurons\" in 1943,[115] and Turing's influential 1950 paper 'Computing Machinery \nand Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was \nplausible.[323][320] \n\nThe field of AI research was founded at a workshop at Dartmouth College in 1956.[s][6] The attendees \nbecame the leaders of AI research in the 1960s.[t] They and their students produced programs that the \npress described as \"astonishing\":[u] computers were learning checkers strategies, solving word problems \nin algebra, proving logical theorems and speaking English.[v][7] Artificial intelligence laboratories were \nset up at a number of British and U.S. universities in the latter 1950s and early 1960s.[320] \n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in \ncreating a machine with general intelligence and considered this the goal of their field.[327] In 1965 \nHerbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can \ndo\".[328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating \n'artificial intelligence' will substantially be solved\".[329] They had, however, underestimated the difficulty \nof the problem.[w] In 1974, both the U.S. and British governments cut off exploratory research in \nresponse to the criticism of Sir James Lighthill[331] and ongoing pressure from the U.S. Congress to fund \nmore productive projects.[332] Minsky's and Papert's book*Perceptrons*was understood as proving that \nartificial neural networks would never be useful for solving real-world tasks, thus discrediting the \napproach altogether.[333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, \nfollowed.[9] \n\nIn the early 1980s, AI research was revived by the commercial success of expert systems,[334] a form of \nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for \nAI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired \nthe U.S. and British governments to restore funding for academic research.[8] However, beginning with \nthe collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer- \nlasting winter began.[10]", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "FAccT ’21, March 3–10, 2021, Virtual Event, Canada \n\nAdvances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, \n2020. AAAI Press, 8968–8975. https://aaai.org/ojs/index.php/AAAI/article/ \nview/6428 \n\n[150] Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ R Salakhutdinov, \nand Quoc V Le. 2019. Xlnet: Generalized autoregressive pretraining for language \nunderstanding. In Advances in neural information processing systems. 5753–5763. \n[151] Ze Yang, Can Xu, Wei Wu, and Zhoujun Li. 2019. Read, Attend and Comment: \nA Deep Architecture for Automatic News Comment Generation. In Proceed- \nings of the 2019 Conference on Empirical Methods in Natural Language Process- \ning and the 9th International Joint Conference on Natural Language Processing \n(EMNLP-IJCNLP). Association for Computational Linguistics, Hong Kong, China, \n5077–5089. https://doi.org/10.18653/v1/D19-1512 \n\n[152] Meg Young, Lassana Magassa, and Batya Friedman. 2019. Toward Inclusive \nTech Policy Design: A Method for Underrepresented Voices to Strengthen Tech \nPolicy Documents. Ethics and Information Technology (2019), 1–15. \n[153] Ofir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe Wasserblat. 2019. Q8BERT: \n\nQuantized 8Bit BERT. arXiv:1910.06188 [cs.CL] \n\n[154] Nico Zazworka, Rodrigo O. Spínola, Antonio Vetro’, Forrest Shull, and Carolyn \nSeaman. 2013. A Case Study on Effectively Identifying Technical Debt. In \nProceedings of the 17th International Conference on Evaluation and Assessment \nin Software Engineering (Porto de Galinhas, Brazil) (EASE ’13). Association for \nComputing Machinery, New York, NY, USA, 42–47. https://doi.org/10.1145/ \n2460999.2461005 \n\n[155] Rowan Zellers, Yonatan Bisk, Roy Schwartz, and Yejin Choi. 2018. SWAG: \nA Large-Scale Adversarial Dataset for Grounded Commonsense Inference. In \nProceedings of the 2018 Conference on Empirical Methods in Natural Language \nProcessing. Association for Computational Linguistics, Brussels, Belgium, 93–104. \nhttps://doi.org/10.18653/v1/D18-1009 \n\n[156] Haoran Zhang, Amy X Lu, Mohamed Abdalla, Matthew McDermott, and \nMarzyeh Ghassemi. 2020. Hurtful words: quantifying biases in clinical contex- \ntual word embeddings. In Proceedings of the ACM Conference on Health, Inference, \nand Learning. 110–120. \n\n[157] Jieyu Zhao, Tianlu Wang, Mark Yatskar, Ryan Cotterell, Vicente Ordonez, and \nKai-Wei Chang. 2019. Gender Bias in Contextualized Word Embeddings. In \nProceedings of the 2019 Conference of the North American Chapter of the Associ- \nation for Computational Linguistics: Human Language Technologies, Volume 1 \n(Long and Short Papers). Association for Computational Linguistics, Minneapolis, \nMinnesota, 629–634. https://doi.org/10.18653/v1/N19-1064 \n\n[158] Li Zhou, Jianfeng Gao, Di Li, and Heung-Yeung Shum. 2020. The Design and \nImplementation of XiaoIce, an Empathetic Social Chatbot. Computational Lin- \nguistics 46, 1 (March 2020), 53–93. https://doi.org/10.1162/coli_a_00368 \n\nACKNOWLEDGMENTS \nThis paper represents the work of seven authors, but some were \nrequired by their employer to remove their names. The remaining \nlisted authors are extremely grateful to our colleagues for the effort \nand wisdom they contributed to this paper. \n\nIn addition, in drafting and revising this paper, we benefited \nfrom thoughtful comments and discussion from many people: Alex \nHanna, Amandalynne Paullada, Ben Hutchinson, Ben Packer, Bren- \ndan O’Connor, Dan Jurafsky, Ehud Reiter, Emma Strubell, Emily \nDenton, Gina-Anne Levow, Iason Gabriel, Jack Clark, Kristen How- \nell, Lucy Vasserman, Maarten Sap, Mark Díaz, Miles Brundage, Nick \nDoiron, Rob Munro, Roel Dobbe, Samy Bengio, Suchin Gururangan, \nVinodkumar Prabhakaran, William Agnew, William Isaac, and Yejin \nChoi and our anonymous reviewers.", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "energy will be produced. The cost for re-opening and upgrading is estimated at $1.6 billion (US) and is \ndependent on tax breaks for nuclear power contained in the 2022 US Inflation Reduction Act.[210] The \nUS government and the state of Michigan are investing almost $2 billion (US) to reopen the Palisades \nNuclear reactor on Lake Michigan. Closed since 2022, the plant is planned to be reopened in October \n2025. The Three Mile Island facility will be renamed the Crane Clean Energy Center after Chris Crane, a \nnuclear proponent and former CEO of Exelon who was responsible for Exelon spinoff of \nConstellation.[211] \n\nAfter the last approval in September 2023, Taiwan suspended the approval of data centers north of \nTaoyuan with a capacity of more than 5 MW in 2024, due to power supply shortages.[212] Taiwan aims to \nphase out nuclear power by 2025.[212] On the other hand, Singapore imposed a ban on the opening of \ndata centers in 2019 due to electric power, but in 2022, lifted this ban.[212] \n\nAlthough most nuclear plants in Japan have been shut down after the 2011 Fukushima nuclear accident, \naccording to an October 2024*Bloomberg*article in Japanese, cloud gaming services company Ubitus, in \nwhich Nvidia has a stake, is looking for land in Japan near nuclear power plant for a new data center for \ngenerative AI.[213] Ubitus CEO Wesley Kuo said nuclear power plants are the most efficient, cheap and \nstable power for AI.[213] \n\nOn 1 November 2024, the Federal Energy Regulatory Commission (FERC) rejected an application \nsubmitted by Talen Energy for approval to supply some electricity from the nuclear power station \nSusquehanna to Amazon's data center.[214] According to the Commission Chairman Willie L. Phillips, it \nis a burden on the electricity grid as well as a significant cost shifting concern to households and other \nbusiness sectors.[214] \n\n**Misinformation**\n\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI \nprograms were given the goal of maximizing user engagement (that is, the only goal was to keep people \nwatching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme \npartisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch \nmore content on the same subject, so the AI led people into filter bubbles where they received multiple \nversions of the same misinformation.[215] This convinced many users that the misinformation was true, \nand ultimately undermined trust in institutions, the media and the government.[216] The AI program had \ncorrectly learned to maximize its goal, but the result was harmful to society. After the U.S. election in \n2016, major technology companies took steps to mitigate the problem . \n\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real \nphotographs, recordings, films, or human writing. It is possible for bad actors to use this technology to \ncreate massive amounts of misinformation or propaganda.[217] AI pioneer Geoffrey Hinton expressed \nconcern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among \nother risks.[218] \n\n**Algorithmic bias and fairness**\nMachine learning applications will be biased[k] if they learn from biased data.[220] The developers may \nnot be aware that the bias exists.[221] Bias can be introduced by the way training data is selected and by \nthe way a model is deployed.[222][220] If a biased algorithm is used to make decisions that can seriously", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Franzen) sued AI companies for using their work to train generative AI.[195][196] Another discussed \napproach is to envision a separate*sui generis*system of protection for creations generated by AI to ensure \nfair attribution and compensation for human authors.[197] \n\n**Dominance by tech giants**\n\nThe commercial AI scene is dominated by Big Tech companies such as Alphabet Inc., Amazon, Apple \nInc., Meta Platforms, and Microsoft.[198][199][200] Some of these players already own the vast majority of \nexisting cloud infrastructure and computing power from data centers, allowing them to entrench further in \nthe marketplace.[201][202] \n\n**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] \n\nA 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "International Conference on Learning Represen- \ntations. \n\nChangmao Li and Jinho D. Choi. 2020. Transform- \ners to Learn Hierarchical Contexts in Multiparty \nDialogue for Span-based Question Answering. \nIn Proceedings of the 58th Annual Meeting of \nthe Association for Computational Linguistics, \npages 5709–5714, Online. Association for Com- \nputational Linguistics. \n\nOlga Kovaleva, Alexey Romanov, Anna Rogers, \nand Anna Rumshisky. 2019. Revealing the Dark \nSecrets of BERT. In Proceedings of the 2019 \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4356–4365, Hong \nKong, China. Association for Computational \nLinguistics. \n\nZhuohan Li, Eric Wallace, Sheng Shen, Kevin Lin, \nKurt Keutzer, Dan Klein, and Joseph E Gonzalez. \n2020. Train large, then compress: Rethinking \nmodel size for efficient training and inference of \ntransformers. arXiv preprint arXiv:2002.11794. \n\nIlia Kuznetsov and Iryna Gurevych. 2020. A Mat- \nter of Framing: The Impact of Linguistic For- \nmalism on Probing Results. arXiv:2004.14999 \n[cs]. \n\nGuillaume Lample and Alexis Conneau. 2019. \nCross-Lingual Language Model Pretraining. \narXiv:1901.07291 [cs]. \n\nKalpesh Krishna, Gaurav Singh Tomar, Ankur P. \nParikh, Nicolas Papernot, and Mohit Iyyer. 2020. \nThieves on Sesame Street! Model Extraction of \nBERT-Based APIs. In ICLR 2020. \n\nYongjie Lin, Yi Chern Tan, and Robert Frank. 2019. \nOpen Sesame: Getting inside BERT’s Linguistic \nKnowledge. In Proceedings of the 2019 ACL \nWorkshop BlackboxNLP: Analyzing and Inter- \npreting Neural Networks for NLP, pages 241– \n253. \n\nVarun Kumar, Ashutosh Choudhary, and Eunah \nCho. 2020. Data Augmentation using Pre- \nTrained Transformer Models. arXiv:2003.02245 \n[cs]. \n\nNelson F. Liu, Matt Gardner, Yonatan Belinkov, \nMatthew E. Peters, and Noah A. Smith. 2019a. \nLinguistic Knowledge and Transferability of \nIn Proceedings \nContextual Representations. \nof the 2019 Conference of the North Ameri- \ncan Chapter of the Association for Computa- \ntional Linguistics: Human Language Technolo- \ngies, Volume 1 (Long and Short Papers), pages \n1073–1094, Minneapolis, Minnesota. Associa- \ntion for Computational Linguistics. \n\nZhenzhong Lan, Mingda Chen, Sebastian Good- \nman, Kevin Gimpel, Piyush Sharma, and Radu \nSoricut. 2020a. ALBERT: A Lite BERT for \nSelf-Supervised Learning of Language Repre- \nsentations. In ICLR. \n\nYinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, \nMandar Joshi, Danqi Chen, Omer Levy, Mike \nLewis, Luke Zettlemoyer, and Veselin Stoyanov. \n2019b. RoBERTa: A Robustly Optimized BERT \nPretraining Approach. arXiv:1907.11692 [cs]. \n\nZhenzhong Lan, Mingda Chen, Sebastian Good- \nman, Kevin Gimpel, Piyush Sharma, and Radu \nSoricut. 2020b. ALBERT: A Lite BERT for \nSelf-supervised Learning of Language Represen- \ntations. In ICLR 2020. \nXiaofei Ma, Zhiguo Wang, Patrick Ng, Ramesh \nNallapati, and Bing Xiang. 2019. Universal Text \nRepresentation from BERT: An Empirical Study. \narXiv:1910.07973 [cs]. \n\nCheolhyoung Lee, Kyunghyun Cho, and Wanmo \nKang. 2019. Mixout: Effective regularization to \nfinetune large-scale pretrained language models. \narXiv preprint arXiv:1909.11299. \n\nChristopher D. Manning, Kevin Clark, John He- \nwitt, Urvashi Khandelwal, and Omer Levy. 2020. \nEmergent linguistic structure in artificial neural \nnetworks trained by self-supervision. Proceed- \nings of the National Academy of Sciences, page \n201907367. \n\nMike Lewis, Yinhan Liu, Naman Goyal, Mar- \njan Ghazvininejad, Abdelrahman Mohamed, \nOmer Levy, Ves Stoyanov, and Luke Zettle- \nmoyer. 2019. BART: Denoising Sequence-to- \nSequence Pre-Training for Natural Language \nGeneration, Translation, and Comprehension. \narXiv:1910.13461 [cs, stat]. Chandler May, Alex Wang, Shikha Bordia, \nSamuel R. Bowman, and Rachel Rudinger. 2019. \nOn Measuring Social Biases in Sentence En- \nIn Proceedings of the 2019 Confer- \ncoders.", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", + "page_start": 56, + "page_end": 56, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What is the United States SCSP ?", + "target_page": 1, + "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. \n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… \n\n\n\n\n\nMar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "**Security Key Lifecycle Manager**\nSecurity Key Lifecycle Manager (SKLM) centralizes, simplifies, and automates the encryption \nkey management process to help minimize risk and reduce operational costs of encryption \nkey management. \n\n**Serial-attached SCSI**\nSAS is a method that is used in accessing computer peripheral devices that employs a serial \n(1 bit at a time) means of digital data transfer over thin cables. The method is specified in the \nAmerican National Standard Institute standard called SAS. In the business enterprise, SAS is \nuseful for access to mass storage devices, particularly external hard disk drives. \n\n**Service Location Protocol**\nThe Service Location Protocol (SLP) is an internet service discovery protocol that enables \ncomputers and other devices to find services in a local area network (LAN) without prior \nconfiguration. It was defined in the request for change (RFC) 2608. \n\n**Small Computer System Interface (SCSI)**\nSmall Computer System Interface (SCSI) is an ANSI-standard electronic interface with which \npersonal computers can communicate with peripheral hardware, such as disk drives, tape \ndrives, CD-ROM drives, printers, and scanners, faster and more flexibly than with previous \ninterfaces. \n\n**Snapshot**\nA snapshot is an image backup type that consists of a point-in-time view of a volume. \n\n**Solid-state disk**\nA solid-state disk (SSD) or Flash Disk is a disk that is made from solid-state memory and \ntherefore has no moving parts. Most SSDs use NAND-based flash memory technology. It is \ndefined to the Storwize V7000 as a disk tier generic_ssd. \n\n**Space efficient**\nSee “Thin provisioning” on page 786. \n\n**Spare**\nAn extra storage component, such as a drive or tape, that is predesignated for use as a \nreplacement for a failed component. \n\n**Spare goal**\nThe optimal number of spares that are needed to protect the drives in the array from failures. \nThe system logs a warning event when the number of spares that protect the array drops \nbelow this number. \n\n**Space-efficient volume**\nFor more information about a space-efficient volume, see “Thin-provisioned volume” on \npage 786. \n\n\n \n \n \n \n [html]\n
Stand - alone relationship
In FlashCopy, Metro Mirror, and Global Mirror, relationships that do not belong to a consistency group and that have a null consistency - group attribute.
\n\n**785** Appendix C. Terminology", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\nThe following table summarizes the balance sheet impact of adopting SFAS 143 and the Company's \n\n\n \n \n \n \n [html]December 31.2002ChangeJanuary 1.2003$ 1.026.3$188.6.270.9( 11.7 ).( 304.1 )( 245.4 )$993.1$< underline >$ _924.6 .$ 1.687.7( 6.9 )$ 1.680.8.(. 1 )( 143.6 )$ 1.544.2( 7.0 )$ 1.537.2...17.9$.179.0( 14.5 )\n
.
$ 1.214.9
259.2
( 549.5 )
( 68.5 )
$
( 143.5 )
$
$
$ 17.9
\n\nIn January 2003, the Financial Accounting Standards Board issued Interpretation 46, \"\"Consolidation of \nVariable Interest Entities'' (\"\"FIN 46''). FIN 46 introduced a new consolidation model which determines \ncontrol and consolidation based upon the primary beneÑciary of the potential variability in gains and losses of \nthe entity being evaluated. This interpretation was eÅective for all variable interest entities beginning \nMarch 31, 2004. The Company evaluated its organizational structure and concluded that FIN 46 has no \nimpact on its consolidated Ñnancial position, results of operations or cash Öows. \n\n**2. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**Use of Estimates**\n\nThe consolidated Ñnancial statements have been prepared in accordance with U.S. generally accepted \naccounting principles and necessarily include amounts based on estimates and assumptions made by \nmanagement. Actual results could diÅer from these amounts. SigniÑcant items subject to such estimates and \nassumptions include the depletion and amortization of landÑll development costs, liabilities for Ñnal capping, \nclosure and post-closure costs, valuation allowances for accounts receivable, liabilities for potential litigation, \nclaims and assessments, and liabilities for environmental remediation, deferred taxes and self-insurance. \n\n**Accounts Receivable**\n\nAccounts receivable represent receivables from customers for collection, transfer, disposal and other \nservices. Receivables are recorded when billed. Accounts receivable, net of the allowance for doubtful \naccounts, represents their estimated net realizable value. Provisions for doubtful accounts are recorded based \non historical collection experience, the age of the receivables, speciÑc customer information and economic \nconditions. In general, reserves are provided for accounts receivable in excess of ninety days old. Accounts \nreceivable are written oÅ when they are deemed uncollectible. \n\n58", + "page_start": 65, + "page_end": 65, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on \nthe products and services each provides. Each segment is managed and evaluated separately because of differing \ntechnologies and marketing strategies. \n\nThe reporting segments and the nature of their activities are as follows: \n\nShenandoah Telecommunications Company (Holding) \nHolding company, which invests in both affiliated \nand non-affiliated companies. \n\nShenandoah Telephone Company (Telephone) \n\nProvides both regulated and unregulated telephone \nservices and leases fiber optic facilities primarily \nthroughout the Northern Shenandoah Valley. \n\nShenandoah Cable Television Company (CATV) \nProvides cable television service in Shenandoah \nCounty. \n\nShenTel Service Company (ShenTel) \n\nProvides Internet access to a multi-state region \nsurrounding the Northern Shenandoah Valley, hosts \nTravel 511 for Virginia, and sells and services \ntelecommunication equipment. \n\nShenandoah Long Distance Company (Long Distance) Provides long distance services. \n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities. \n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation. \n\nShenandoah Personal Communications Company (PCS) \n\nAs a PCS Affiliate of Sprint, provides digital wireless \nservice to a portion of a four-state area covering the \nregion from Harrisburg, York and Altoona, \nPennsylvania, to Harrisonburg, Virginia. \n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting \npolicies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties. \n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows: \n\n\n \n \n \n \n [html]\n
YearHoldingTelephoneConsolidated Totals
( in thousands )
2003$( 441 )$ 65
$ _ ( 376 )2002$( 822 )
$ 45$ ( 777 )2001$
", + "page_start": 36, + "page_end": 36, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "UNITED STATES \nSECURITIES AND EXCHANGE COMMISSION \nWashington, D.C. 20549 \nFORM 10-Q \n\n(Mark One) \nx QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the quarterly period ended September 30, 2024 \nOR \no TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the transition period from__ ____ ___to__ ____ ___\n\nCommission File Number: 001-34756 \n\nTesla, Inc. \n\n(Exact name of registrant as specified in its charter) \n\nTexas 91-2197729 \n\n(State or other jurisdiction of \nincorporation or organization) (I.R.S. Employer \nIdentification No.) \n\n1 Tesla Road \nAustin, Texas \n(Address of principal executive offices) 78725 \n(Zip Code) \n\n(512) 516-8177 \n(Registrant’s telephone number, including area code) \nSecurities registered pursuant to Section 12(b) of the Act: \n\n\n \n \n \n \n [html]\n
Intle of each classTrading Symbol ( s )Name of each exchange on which registered
Common stockTSLAThe Nasdaq Global Select Market
\n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of \n\n1934 (“Exchange Act”) during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been \nsubject to such filing requirements for the past 90 days. Yes x No o \n\nIndicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 \n\nof Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). \nYes x No o \n\nIndicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, a smaller reporting company, or \n\nan emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company” and “emerging growth \ncompany” in Rule 12b-2 of the Exchange Act: \n\nx Accelerated filer \n\no Smaller reporting company \n\no \n\nIf an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised \nfinancial accounting standards provided pursuant to Section 13(a) of the Exchange Act. o \nIndicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes o No x \nAs of October 18, 2024, there were 3,210,059,659 shares of the registrant’s common stock outstanding.", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "10.Enter the system location details. Figure 4-16 shows some details as an example only. \nClick**Next**. \n\n**Note:**If your system is not in the US, enter XX into the state or province field. \n\n\n \n \n \n \n [html]\n
1894
1254 Plain Streat
See 3ose
CA
12346
United States1at Reor, Lab 10
", + "page_start": 123, + "page_end": 123, + "source_file": "sg247938.pdf" + }, + { + "text": "\n \n \n \n \n [html]SCHEDULESPortugal, including the Azores and MadeiraSaint Helena, Ascension and Tristan da CunhaSingaporeCategory 2 countries and territories\n
SCHEDULE 1Regulation 2 ( 1 )
Category 1 countries and territories
Australia
Brunei
Falkland Islands
Faroe Islands
Gibraltar
Iceland
Israel
New Zealand
South Georgia and the South Sandwich IslandsSCHEDULE 2
Regulation 2 ( 1 )
Any country or territory outside the common travel area not listed in Schedule 1 or Schedule 3.SCHEDULE 3
Regulation 2 ( 1 )
Category 3 countries and territories
Angola
Argentina
Bangladesh
Bolivia
Botswana
Brazil
Burundi
Cape Verde
", + "page_start": 31, + "page_end": 31, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Key Executive Restoration Plan \n\nIn fiscal 2012, the Executive Organization & Compensation Committee of the Board of Directors adopted the Key Executive \nRestoration Plan (KERP), an unfunded, non-qualified deferred compensation plan, to replace the SERP. The Company recorded \n$128 of expense associated with this plan in fiscal 2012. \n\nQualified Defined Benefit Retirement Plan \n\nThe Company has a qualified defined benefit retirement plan that provides benefits to certain hourly associates at retirement. \nThese associates do not participate in the Retirement Savings Plan. The benefits are based on length of service and date of \nretirement. \n\nUnrecognized compensation cost related to unvested restricted stock awards and RSUs aggregated $3,670 at June 30, 2012, \nand is expected to be recognized over the weighted-average remaining vesting period of 2.1 years.", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "\n \n \n \n \n [html]( In millions of dollars )Accrued benefit obligation at end of fiscal 2013Pension expense fiscal 2013Discount rate5.10 %4.50 %Impact of :3.00 %Impact of :0.25 % increase5265\n
0.5 % increase5( 105 )5( 11 )
0.5 % decrease12013Rate of compensation increase3.00 %
14$30.25 % decrease( 14 )
( 2 )Mortality rateImpact of :1 year increase5
41 year decrease( 27 )( 3 )
\n\non an annual basis or more often if events or circumstances warrant. A \ncash generating unit is the smallest identifiable group of assets that \ngenerates cash inflows that are largely independent of the cash inflows \nfrom other assets or groups of assets. Goodwill and indefinite life \nintangible assets are allocated to cash generating units (or groups of \ncash generating units) based on the level at which management \nmonitors goodwill, which is not higher than an operating segment. The \nallocation involves significant estimates of future cash flows, estimated \nperiods of use, applicable discount rates and considerable management \njudgment, and is made to cash generating units (or groups of cash \ngenerating units) that are expected to benefit from the synergies of the \nbusiness combination. If key estimates differ unfavourably in the future, \nwe could experience impairment charges that could decrease net \nincome. We did not record an impairment charge in 2013 since the \nthe cash generating units exceeded their \nrecoverable amounts of \ncarrying values. In 2012, we recorded an impairment charge of $80 \nmillion related to certain Media assets, due to the challenging economic \nconditions, weakening industry expectations and a decline in \nadvertising revenues. \n\nThe table below shows what the impact of an increase or decrease in \nthe primary assumptions and estimates on our accrued benefit \nobligation and pension expense for 2013 would be: \n\n**Stock-Based Compensation**\n*Stock Option Plans*\nOur employee stock option plans attach cash-settled share appreciation \nrights (SARs) to all new and previously granted options. The SARs \nfeature allows the option holder to elect to receive in cash an amount \nequal to the intrinsic value, \ninstead of exercising the option and \nacquiring Class B Non-Voting shares. \n\n**Financial Instruments**\nThe fair values of our Derivatives are recorded using an estimated \ncredit-adjusted mark-to-market valuation. If the Derivatives are in an \nasset position (i.e., the counterparty owes Rogers), the credit spread for \nthe bank counterparty is added to the risk-free discount rate to \ndetermine the estimated credit-adjusted value. If the Derivatives are in a \nliability position (i.e., Rogers owes the counterparty), our credit spread is \nadded to the risk-free discount rate. The estimated credit-adjusted value \nof Derivatives is affected by changes in credit spreads between us and \nour counterparties.", + "page_start": 83, + "page_end": 83, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**ITEM 7. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND**\n**RESULTS OF OPERATIONS**\n\nYou should read the following discussion in conjunction with our Consolidated Financial Statements and \ntheir Notes contained in this Annual Report on Form 10-K. \n\n**Overview of Our Business**\n\nWe are a leading provider of non-hazardous solid waste collection and disposal services in the United \nStates. We provide solid waste collection services for commercial, industrial, municipal and residential \ncustomers through 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid \nwaste landÑlls and 35 recycling facilities. \n\nWe generate revenue primarily from our solid waste collection operations. Our remaining revenue is from \nother services including landÑll disposal, recycling, compost, mulch and soil operations. \n\nThe following table reÖects our revenue by source for the years ended December 31, 2004, 2003 and 2002 \n(in millions): \n\n\n \n \n \n \n [html]200420032002$\n
655.224.2 %$601.223.9 %$530.7
22.4 %737.927.2706.028.0696.729.5
558.120.6523.020.8501.621.262.2
2.350.92.050.82.1Placebody2.013.4
74.31.881.174.71.779.875.2.........................................1.031.0
967.5854.1( 519.8 )( 493.7 )
( 428.5 )Possible metabolic net511.218.9
473.818.8425.618.0183.56.8162.9
6.5159.76.8$ 2.708.1100.0 %$ 2.517.8100.0 %
$ 2.365.1100.0 %
\n\nThe cost of our collection operations is primarily variable and includes transfer, disposal, labor, self- \ninsurance, fuel and equipment maintenance costs. We try to be more eÇcient by controlling the movement of \nwaste streams from the point of collection through disposal. During the three months ended December 31, \n2004, approximately 54% of the total volume of waste we collected was disposed of at landÑlls we own or \noperate. \n\nOur landÑll costs include daily operating expenses, costs of capital for cell development, costs for Ñnal \ncapping, closure and post-closure, and the legal and administrative costs of ongoing environmental compli- \nance. Daily operating expenses include leachate treatment and disposal, methane gas and groundwater \nmonitoring and system maintenance, interim cap maintenance and costs associated with the application of \ndaily cover materials. We expense all indirect landÑll development costs as they are incurred. We use life cycle \naccounting and the units-of-consumption method to recognize certain direct landÑll costs related to cell \ndevelopment. In life cycle accounting, certain direct costs are capitalized, and charged to expense based upon \n\n23", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What are some example of uses AI by the US departement of energy ?", + "target_page": 1, + "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Franzen) sued AI companies for using their work to train generative AI.[195][196] Another discussed \napproach is to envision a separate*sui generis*system of protection for creations generated by AI to ensure \nfair attribution and compensation for human authors.[197] \n\n**Dominance by tech giants**\n\nThe commercial AI scene is dominated by Big Tech companies such as Alphabet Inc., Amazon, Apple \nInc., Meta Platforms, and Microsoft.[198][199][200] Some of these players already own the vast majority of \nexisting cloud infrastructure and computing power from data centers, allowing them to entrench further in \nthe marketplace.[201][202] \n\n**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] \n\nA 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. \n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… \n\n\n\n\n\nMar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] \n\n**Other industry-specific tasks**\n\nThere are also thousands of successful AI applications used to solve specific problems for specific \nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in \nsome offerings or processes.[178] A few examples are energy storage, medical diagnosis, military \nlogistics, applications that predict the result of judicial decisions, foreign policy, or supply chain \nmanagement. \n\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if \nand how people evacuated in large scale and small scale evacuations using historical data from GPS, \nvideos or social media. Further, AI can provide real time information on the real time evacuation \nconditions.[179][180][181] \n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments \nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict \nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct \npredictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, \nand save water. \n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and \napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the \ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting \nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave \nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the \nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, \nand more autonomous operation.", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. \n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
innovative internaogramTablecessesofTableTableandTableParameterTableTableTableTableTableTableTableTableTableBaselineTableComparisonTableNumberTableprogramTableAge, yearsTableThereofwateTablePaulicTablehighlyofTableTableolumTablen / if0n
\n\n**Environmentally Friendly Operations**\nAt Chesapeake, we realize that the way a great product is produced is \nas important as the product itself. For example, we have helped pioneer \nthe use of multiwell padsites to drill up to 16 wells from a single loca- \ntion, greatly reducing our land and road use and overall environmental \nfootprint. We use the latest horizontal and directional drilling technology \nto place wells at a safe distance from homes, schools and businesses. In \naddition, we build and maintain access roads and work to eliminate soil \nerosion near our sites, as well as restore local vegetation. \n\nWe implement advanced, modern protective measures known as Best \nManagement Practices (BMPs) to help ensure energy development is con- \nducted in an environmentally responsible manner. Procedures are imple- \nmented throughout our operations to protect freshwater aquifers and \nreduce environmental impacts. BMPs protect wildlife, air quality, water and \nlandscapes as we work to develop vitally needed domestic energy sources. \nImplemented throughout the entire life cycle of a well, BMPs can be \nas simple as strategically placing a berm, or land barrier, on locations \nto control surface water runoff. Others involve cutting-edge operational \ntechnologies such as utilizing the most advanced techniques offered in \ndrilling fluids, well casing and cement design. Regardless of complex- \nity, all BMPs are based on the idea that the environmental footprint of", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "energy will be produced. The cost for re-opening and upgrading is estimated at $1.6 billion (US) and is \ndependent on tax breaks for nuclear power contained in the 2022 US Inflation Reduction Act.[210] The \nUS government and the state of Michigan are investing almost $2 billion (US) to reopen the Palisades \nNuclear reactor on Lake Michigan. Closed since 2022, the plant is planned to be reopened in October \n2025. The Three Mile Island facility will be renamed the Crane Clean Energy Center after Chris Crane, a \nnuclear proponent and former CEO of Exelon who was responsible for Exelon spinoff of \nConstellation.[211] \n\nAfter the last approval in September 2023, Taiwan suspended the approval of data centers north of \nTaoyuan with a capacity of more than 5 MW in 2024, due to power supply shortages.[212] Taiwan aims to \nphase out nuclear power by 2025.[212] On the other hand, Singapore imposed a ban on the opening of \ndata centers in 2019 due to electric power, but in 2022, lifted this ban.[212] \n\nAlthough most nuclear plants in Japan have been shut down after the 2011 Fukushima nuclear accident, \naccording to an October 2024*Bloomberg*article in Japanese, cloud gaming services company Ubitus, in \nwhich Nvidia has a stake, is looking for land in Japan near nuclear power plant for a new data center for \ngenerative AI.[213] Ubitus CEO Wesley Kuo said nuclear power plants are the most efficient, cheap and \nstable power for AI.[213] \n\nOn 1 November 2024, the Federal Energy Regulatory Commission (FERC) rejected an application \nsubmitted by Talen Energy for approval to supply some electricity from the nuclear power station \nSusquehanna to Amazon's data center.[214] According to the Commission Chairman Willie L. Phillips, it \nis a burden on the electricity grid as well as a significant cost shifting concern to households and other \nbusiness sectors.[214] \n\n**Misinformation**\n\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI \nprograms were given the goal of maximizing user engagement (that is, the only goal was to keep people \nwatching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme \npartisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch \nmore content on the same subject, so the AI led people into filter bubbles where they received multiple \nversions of the same misinformation.[215] This convinced many users that the misinformation was true, \nand ultimately undermined trust in institutions, the media and the government.[216] The AI program had \ncorrectly learned to maximize its goal, but the result was harmful to society. After the U.S. election in \n2016, major technology companies took steps to mitigate the problem . \n\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real \nphotographs, recordings, films, or human writing. It is possible for bad actors to use this technology to \ncreate massive amounts of misinformation or propaganda.[217] AI pioneer Geoffrey Hinton expressed \nconcern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among \nother risks.[218] \n\n**Algorithmic bias and fairness**\nMachine learning applications will be biased[k] if they learn from biased data.[220] The developers may \nnot be aware that the bias exists.[221] Bias can be introduced by the way training data is selected and by \nthe way a model is deployed.[222][220] If a biased algorithm is used to make decisions that can seriously", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Glossary of artificial intelligence – List of definitions of terms and concepts commonly used \nin the study of artificial intelligence \nIntelligence amplification – Use of information technology to augment human intelligence \nIntelligent agent – Software agent which acts autonomously \nMind uploading – Hypothetical process of digitally emulating a brain \nOrganoid intelligence – Use of brain cells and brain organoids for intelligent computing \nRobotic process automation – Form of business process automation technology \nWetware computer – Computer composed of organic material \n\n\n \n \n \n \n [html]\n
a. This fot of intelligent traits is based on the topics covered by the major AI textbooks, including : Rassafl & Nonyig ( 2923 ) Luger & Stablefield ( 2004 ), Pooles, Mackworth & Govebel ( 1398 ) and Nilisonn ( 1398 )
b. This list of tools is based on the topics covered by the major A ’ textbooks, including : Russell & Nonig ( 2021 ). Lusper & Stubbletield ( 2004 ). Procle, Maclisxotti & Goebel [ 13989 ] and Nitson ( 2993 )
c. It is among the reasons that expert systems proved to be inefficient for capturing knowledge. 3993.1
d. “ National agent ” is general term used in economics, phylosophy and theoretical antificial intelligence. It can meler to anything that directs to behavior to accomplist posts, such as a person, an animal, a compration, a ration, or int
f. See A ) winter 5 Machine translation and the ALPAC report of 1966
g. Compared with symbolic logic, formal Bayesian infecence is computationally experoxive. For inference to be tractable, most observations must be conditionally independent of one another. AdSense uses a Bayesian network with overa
h. Expectation - maximization, one of the most popular algorithms in machine learning, allows clustering in the presence of unknown latent variables [ 35 ]
1. Some form of design measure interventions ( self - turks ) a specific learning adopting area described and specific providers ( self - there ) and administration of their complexible and their complex and their provided ( Self - 15 ) besta
j. Geoffrey Hinton said, of his work on neural networks in the 1999s, \" our labeled datasets were thousands of times too small. [ And ] our computers were millions of times too slow 1221.–
", + "page_start": 28, + "page_end": 28, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "181. Zhao, Xilei; Lovreglio, Ruggiero; Nilsson, Daniel (1 May 2020). \"Modelling and interpreting \n\npre-evacuation decision-making using machine learning\" (https://www.sciencedirect.com/sci \nence/article/pii/S0926580519313184).*Automation in Construction*.**113**: 103140. \ndoi:10.1016/j.autcon.2020.103140 (https://doi.org/10.1016%2Fj.autcon.2020.103140). \nhdl:10179/17315 (https://hdl.handle.net/10179%2F17315). ISSN 0926-5805 (https://search. \nworldcat.org/issn/0926-5805). Archived (https://web.archive.org/web/20240519121548/http \ns://www.sciencedirect.com/science/article/abs/pii/S0926580519313184) from the original on \n19 May 2024. Retrieved 5 October 2024. \n\n182. \"India's latest election embraced AI technology. Here are some ways it was used \n\nconstructively\" (https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-tech \nnology-here-are-some-ways-it-was-used-constructively).*PBS News*. 12 June 2024. \nRetrieved 28 October 2024. \n\n183. Müller, Vincent C. (30 April 2020). \"Ethics of Artificial Intelligence and Robotics\" (https://plat \n\no.stanford.edu/archives/fall2023/entries/ethics-ai/).*Stanford Encyclopedia of Philosophy*\n*Archive*. Archived (https://web.archive.org/web/20241005165650/https://plato.stanford.edu/a \nrchives/fall2023/entries/ethics-ai/) from the original on 5 October 2024. Retrieved 5 October \n2024. \n\n184. Simonite (2016). \n185. Russell & Norvig (2021), p. 987. \n186. Laskowski (2023). \n187. GAO (2022). \n188. Valinsky (2019). \n189. Russell & Norvig (2021), p. 991. \n190. Russell & Norvig (2021), pp. 991–992. \n191. Christian (2020), p. 63. \n192. Vincent (2022). \n193. Kopel, Matthew. \"Copyright Services: Fair Use\" (https://guides.library.cornell.edu/copyright/f \nair-use).*Cornell University Library*. Archived (https://web.archive.org/web/20240926194057/ \nhttps://guides.library.cornell.edu/copyright/fair-use) from the original on 26 September 2024. \nRetrieved 26 April 2024. \n\n194. Burgess, Matt. \"How to Stop Your Data From Being Used to Train AI\" (https://www.wired.co \nm/story/how-to-stop-your-data-from-being-used-to-train-ai).*Wired*. ISSN 1059-1028 (https:// \nsearch.worldcat.org/issn/1059-1028). Archived (https://web.archive.org/web/202410031801 \n00/https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai/) from the \noriginal on 3 October 2024. Retrieved 26 April 2024. \n\n195. Reisner (2023). \n196. Alter & Harris (2023). \n197. \"Getting the Innovation Ecosystem Ready for AI. An IP policy toolkit\" (https://www.wipo.int/e \ndocs/pubdocs/en/wipo-pub-2003-en-getting-the-innovation-ecosystem-ready-for-ai.pdf) \n(PDF).*WIPO*. \n\n198. Hammond, George (27 December 2023). \"Big Tech is spending more than VC firms on AI \n\nstartups\" (https://arstechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai- \nstartups).*Ars Technica*. Archived (https://web.archive.org/web/20240110195706/https://arst \nechnica.com/ai/2023/12/big-tech-is-spending-more-than-vc-firms-on-ai-startups) from the \noriginal on 10 January 2024. \n\n199. Wong, Matteo (24 October 2023). \"The Future of AI Is GOMA\" (https://www.theatlantic.com/t \n\nechnology/archive/2023/10/big-ai-silicon-valley-dominance/675752).*The Atlantic*. Archived \n(https://web.archive.org/web/20240105020744/https://www.theatlantic.com/technology/archi \nve/2023/10/big-ai-silicon-valley-dominance/675752) from the original on 5 January 2024.", + "page_start": 40, + "page_end": 40, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How can I contact Investor Relations of HON industries through email ?", + "target_page": 63, + "target_passage": "E-mail: investorrelations@honi.com", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the \n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. \n\n\nStan A. Askren \n\n\nAbbie J. Smith \n\n\nDennis J. Martin \n\n\nGary M. Christensen \n\n Richard H. Stanley \n\n\nJack D. Michaels \n\n\nCheryl A. Francis \n\n\nBrian E. Stern \n\n\nJoseph Scalzo \n\n\n\n\n\nRobert L. Katz", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp", + "page_start": 111, + "page_end": 111, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
\n\n**F O R W A R D - L O O K I N G S T A T E M E N T S**\n\nStatements in this report that are not strictly historical, including statements as to **•**changes in demand and order patterns from the Company’s customers, par- \n\nplans, objectives, and future financial performance, are “forward-looking” state- ticularly its top ten customers, which represented approximately 36% of net sales \n\nments that are made pursuant to the safe harbor provisions of the Private Securities in 2003; \n\nLitigation Reform Act of 1995. Forward-looking statements involve known and **•** issues associated with acquisitions and integration of acquisitions; \n\nunknown risks, which may cause the Company’s actual results in the future to dif- **•**the ability of the Company to realize cost savings and productivity improve- \n\nfer materially from expected results. These risks include, among others: ments from its cost containment and business simplification initiatives; \n\n**•**competition within the office furniture and fireplace industries, including **•**the ability of the Company to realize financial benefits from investments in new \n\ncompetition from imported products and competitive pricing; products; \n\n**•** increases in the cost of raw materials, including steel, which is the Company’s **•**the ability of the Company’s distributors and dealers to successfully market \n\nK \nR \nO \nY \n\nW \nE \nN \n,", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a \n\nreasonable basis for our opinion. The financial statements of the Company as of December 29, 2001, and for the fiscal year then ended, prior to the \n\nadjustments discussed in the Goodwill and Other Intangible Assets note, were audited by other independent accountants who have ceased opera- \n\ntions. Those independent accountants expressed an unqualified opinion on those financial statements in their report dated February 1, 2002. \n\nAs disclosed in the Goodwill and Other Intangible Assets note, the Company changed the manner in which it accounts for goodwill and \n\nother intangible assets upon adoption of the accounting guidance of Statement of Financial Accounting Standards No. 142, Goodwill and Other \n\nIntangible Assets, on December 30, 2001. \n\nAs discussed above, the financial statements of HON INDUSTRIES Inc., as of December 29, 2001, and for the period then ended, were \n\naudited by other independent accountants who have ceased operations. As described in the Goodwill and Other Intangible Assets note, these \n\nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial Accounting Standards (Statement) \n\nNo. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of December 30, 2001. We audited the transitional disclo- \n\nsures described in the Goodwill and Other Intangible Assets note. In our opinion, the transitional disclosures for 2001 in the Goodwill and Other \n\nIntangible Assets note are appropriate. However, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements \n\nof the Company other than with respect to such disclosures, and, accordingly, we do not express an opinion or any other form of assurance on the \n\n2001 financial statements taken as a whole.", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. \n\n**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 \n\n\n \n \n \n \n [html]Common Stock Price20012000\n
Dividends
HighLowDeclared
First quarter$ 67.75$ 55.15$ 0.25
Second quarter70.4656.880.25
Third quarter69.2850.100.25
Fourth quarter62.8353.910.26
First quarter$ 52.75$ 29.38$ 0.24
Second quarter64.0044.250.24
Third quarter73.7556.380.24
Fourth quarter79.3165.440.25
\n\nTo send certificates for transfer and address changes: \n\nThe Bank of New York \nReceive and Deliver Department–11W \nP.O. Box 11002 \nChurch Street Station \nNew York, NY 10286 \n\nAddress inquiries about The Hartford’s Dividend \nReinvestment and Cash Payment Plan to: \n\nThe Bank of New York \nDividend Reinvestment Department \nP.O. Box 1958 \nNewark, NJ 07101-9774 \n\nE-mail: shareowner-svcs@bankofny.com \n\nInternet address: www.stockbny.com", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. \n\n**W E W I L L P U R S U E P R O F I T A B L E G R O W T H .**\n\nWe pursue profitable growth on a global basis in order to provide continued job opportunities for members and finan- \n\ncial success for all stakeholders. \n\n**W E W I L L B E A S U P P L I E R O F Q U A L I T Y P R O D U C T S A N D S E R V I C E S .**\n\nWe provide reliable products and services of high quality and brand value to our end-users. Our products and services \n\nexceed our customers’ expectations and enable our distributors and our company to make a fair profit. \n\n**W E W I L L B E A G R E A T P L A C E T O W O R K .**\n\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active \n\ninvolvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that \n\nattracts and retains the most capable people who work safely, are motivated, and are devoted to making our company \n\nand our members successful. \n\n**W E W I L L B E A R E S P O N S I B L E C O R P O R A T E C I T I Z E N .**\n\nWe conduct our business in a way that sustains the well-being of society, our environment, and the economy in which \n\nwe live and work. We follow ethical and legal business practices. Our company supports our volunteer efforts and \n\nprovides charitable contributions so that we can actively participate in the civic, cultural, educational, environmental, \n\nand governmental affairs of our society. \n\n**T O O U R S T A K E H O L D E R S :**\n\nWhen our company is appreciated by its*members,*favored by its*customers,*supported by its*suppliers,*respected by \n\n*the public,*and admired by its*shareholders,*this Vision is fulfilled. \n\n**H O N I N D U S T R I E S I n c . ( H N I )**\n\n**414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071**\n\n**www.honi.com**", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "L E F T : St an A . A skren, P R E S I D E N T \n\nR I G H T : Jack D. Michaels, C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\nAs we celebrate our 60th year, HON INDUSTRIES has seen leaner, more focused, and have more clearly defined brands \n\nmuch change. The industry has changed. The world has than ever before. Our challenge is to grow, aggressively and \n\nchanged. Our business has changed. What has not changed profitably, through market-driven solutions while maintain- \n\nare the culture and values on which we were founded: integ- ing focus on what we do best — operational excellence. Our \n\n\n \n \n \n \n [html]\n
Sigue and powerfulBUILDING BRA
Sort - every memberWe are investing significantly in our brands and increasing our
Accuracy testing the businessunderstanding of our diverse range of end - users aind the solutions pheughous ways bond - toose thoughout
Pregnancy of complex andinitiatives : focused selling models ; clear brand identity ; tar -
Strong brands,geted advertising ; expanded channel presence ; and aggressive
Per value to our end -products and solutions development. We are strengthening our
Proposed margins, a directability to be the “ perfect match ” with end - users in every seg -
Controlled processedment we serve.
ComponentsDemonstrated
MaximumACH1EV1NG BES1 TOTAL UUS1 AND
Components of completesLEAN ENTERPRIS
Proportion of phi -“ Best total cost ” means more than being a low - cost manufae -
us to continue toturer. It requires us to think about the entire value stream —
Age to succeed in awhere and how to manufacture, ship, install, outsource,
Continuous trans -assemble, service, procure, and sell – all to provide the best
Total, Total, Absencetotal value to our end - users. We implemented lean initiatives,
", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "The truth is, The HON Company, “practical \n\nand professional” is only one part of who you \n\nare. When it comes to partnering with small to \n\nmid-sized businesses as we are, you are the \n\nchampion of the hardworking office: sensible, \n\nhonest, and unpretentious, yet strong, well \n\nbuilt, and totally committed to quality. You \n\nhelp us to be more productive by keeping us \n\ncomfortable and relieving our stress. Your \n\nfiles, desks, panel systems, and other products \n\nare as contemporary, intelligent, and adapt- \n\nable as we are! So call us*both*practical and \n\nprofessional; call us a perfect match. \n\n\n\nP E R F E C T M A T C H # 3 \n\n\n\n T H E S M A L L T O \n\nM I D - S I Z E D B U S I N E S S \n\nA N D T H E H O N C O M P A N Y", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing \n\n\n\nment process and allows us to embrace change. As we continue on our heritage while remaining true to our culture and values. \n\nto add and develop talent to support our growth strategies, we The new name will serve to better align the corporate identity \n\nbecome more diverse in our perspectives, strengthening our with the direction of the company, as a strategic manager of \n\nability to understand and meet the needs of our customers and multiple, distinct, and independent brands. \n\nend-users. We thank our member-owners for their continued \n\ndedication, and look forward to the challenges and opportuni- \n\nOn January 5, 2004, we completed the acquisition of ties of 2004. \n\nPaoli Inc., a leading provider of wood case goods and seating. \n\nThe acquisition reflects our commitment to achieving profit- \n\nable growth. With annual sales in excess of $80 million, Paoli \n\nhas well-known brands, a broad product offering, and strong \n\nJack D. Michaels independent representative sales and dealer networks. This \n\nacquisition supports our operating philosophy to work through C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\n\n\nautonomous, decentralized businesses with strong brands \n\nfocused on distinct markets. \n\nImportant to our company’s success, is a strong Board \n\nof Directors who bring their individual skills, knowledge, and \n\nStan A. Askren experience to our company. Their involvement, independence, \n\nand integrity provide the ongoing foundation for effective gov- P R E S I D E N T \n\nernance and corporate oversight for you, our shareholders. \n\nThis year we recognize retiring directors Lorne R. \n\nWaxlax, Robert W. Cox, and M. Farooq Kathwari. We thank \n\nthem for their dedication. We are also pleased to welcome \n\nJoseph Scalzo, President, Personal Care Products, The Gillette \n\nCompany, to our board. \n\nOur CEO succession process is progressing smoothly. \n\nThe appointment of Stan Askren as President of HON \n\nINDUSTRIES and as a member of the Board of Directors,", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "What explains the decrease in net sales of HON industries in 2002 ?", + "target_page": 34, + "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include \n\nAt January 3, 2004, and December 28, 2002, cash, cash \n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire- equivalents and investments consisted of the following (cost approxi- \n\nplace inserts, stoves, and gas logs. These products are sold through a mates market value): \n\nnational system of dealers, wholesalers, large regional contractors, and \n\nCash and \ncash \nequivalents Short- \nterm \ninvestments Long- \nterm \ninvestments \nCompany-owned retail outlets. The Company’s products are marketed \n*(In thousands)*\npredominantly in the United States and Canada. The Company exports \n\nY E A R - E N D 2 0 0 3 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nselect products to a limited number of markets outside North America, \n\n**$ 31,000**\n**–**\n**–**\n\n**$**\n\n**–**\n**–**\n**–** **$ 2,396**\n**–**\n**400**\nprincipally Latin America and the Caribbean, through its export subsid- \n\niary; however, based on sales, these activities are not significant. \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities \n\n**Summary of Significant Accounting Policies**\n\n**–**\n**–**\n**–** **4,259**\n**–**\n**60,949** **–**\n**–**\n**12,835**\n\n**107,982** **–** **–**\n\n**$ 138,982** **$ 65,208** **$ 15,631**\n\n***PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END***\n*Cash and money market accounts*\nThe consolidated financial statements include the accounts and trans- \n Total \nactions of the Company and its subsidiaries. Intercompany accounts \n\nY E A R - E N D 2 0 0 2 \n*Held-to-maturity securities*\nMunicipal bonds \nU.S. government securities \nCertificates of deposit \n\nand transactions have been eliminated in consolidation. \n\n$ 82,300 \n– \n– \n\nThe Company follows a 52/53-week fiscal year which ends \n\non the Saturday nearest December 31. Fiscal year 2003 ended on \n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended \n\n*Available-for-sale securities*\nU.S. treasury notes \nMoney market preferred stock \nAsset- and mortgage-backed securities – \n– \n– 3,478 \n 11,000 \n– \n\non December 29, 2001. The financial statements for fiscal year 2003 \n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a \n*Cash and money market accounts* 56,865 **–**\n52-week basis. \n$ 16,378 \n\n$ \n\n1,900 \n– \n– $ 5,396 \n11,995 \n400 \n\n– \n– \n7,098 \n\n**–**\n Total $ 24,889", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "L E F T : St an A . A skren, P R E S I D E N T \n\nR I G H T : Jack D. Michaels, C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\nAs we celebrate our 60th year, HON INDUSTRIES has seen leaner, more focused, and have more clearly defined brands \n\nmuch change. The industry has changed. The world has than ever before. Our challenge is to grow, aggressively and \n\nchanged. Our business has changed. What has not changed profitably, through market-driven solutions while maintain- \n\nare the culture and values on which we were founded: integ- ing focus on what we do best — operational excellence. Our \n\n\n \n \n \n \n [html]\n
Sigue and powerfulBUILDING BRA
Sort - every memberWe are investing significantly in our brands and increasing our
Accuracy testing the businessunderstanding of our diverse range of end - users aind the solutions pheughous ways bond - toose thoughout
Pregnancy of complex andinitiatives : focused selling models ; clear brand identity ; tar -
Strong brands,geted advertising ; expanded channel presence ; and aggressive
Per value to our end -products and solutions development. We are strengthening our
Proposed margins, a directability to be the “ perfect match ” with end - users in every seg -
Controlled processedment we serve.
ComponentsDemonstrated
MaximumACH1EV1NG BES1 TOTAL UUS1 AND
Components of completesLEAN ENTERPRIS
Proportion of phi -“ Best total cost ” means more than being a low - cost manufae -
us to continue toturer. It requires us to think about the entire value stream —
Age to succeed in awhere and how to manufacture, ship, install, outsource,
Continuous trans -assemble, service, procure, and sell – all to provide the best
Total, Total, Absencetotal value to our end - users. We implemented lean initiatives,
", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a \n\nreasonable basis for our opinion. The financial statements of the Company as of December 29, 2001, and for the fiscal year then ended, prior to the \n\nadjustments discussed in the Goodwill and Other Intangible Assets note, were audited by other independent accountants who have ceased opera- \n\ntions. Those independent accountants expressed an unqualified opinion on those financial statements in their report dated February 1, 2002. \n\nAs disclosed in the Goodwill and Other Intangible Assets note, the Company changed the manner in which it accounts for goodwill and \n\nother intangible assets upon adoption of the accounting guidance of Statement of Financial Accounting Standards No. 142, Goodwill and Other \n\nIntangible Assets, on December 30, 2001. \n\nAs discussed above, the financial statements of HON INDUSTRIES Inc., as of December 29, 2001, and for the period then ended, were \n\naudited by other independent accountants who have ceased operations. As described in the Goodwill and Other Intangible Assets note, these \n\nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial Accounting Standards (Statement) \n\nNo. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of December 30, 2001. We audited the transitional disclo- \n\nsures described in the Goodwill and Other Intangible Assets note. In our opinion, the transitional disclosures for 2001 in the Goodwill and Other \n\nIntangible Assets note are appropriate. However, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements \n\nof the Company other than with respect to such disclosures, and, accordingly, we do not express an opinion or any other form of assurance on the \n\n2001 financial statements taken as a whole.", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "[html]Millions of yenFiscal year 2002 ( For the year ended Mar. 31.2003 )Automobile and EliminationsSales FinancingConsolidated totalOperating activitiesIncome before income taxes and minority interests — oxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxoxox¥ 634.818¥ 59.806¥ 694.624Depreciation and amortization — oneoconcentration — oneoconcentratenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenomenome213.569157.556371.125Decrease ( increase ) in finance receivables..................................................................................................................................................................64.057( 391.414 )( 327.357 )Others —––( 115.097 )( 47.917 )( 163.014 )Net cash provided by ( used in ) operating activities — overanceoceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaece797.347( 221.969 )575.378Investing activitiesProceeds from sales of investment securities including shares of subsidiaries ——————————————39.81613.84253.658Proceeds from sales of property, plant and equipment — oceoceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceaeceae94.8283.87198.699Purchases of fixed assets --( 376.429 )( 1.500 )( 377.929 )Purchases of leased vehicles ---( 33.522 )( 450.182 )( 483.704 )Prioceeda from sales of leased vehicles oxoconcenceratesococcales of leased vehicles15.644243.431259.075Others ·~––( 46.720 )( 18.453 )( 65.173 )Net cash used in investing activities........................................................................................................................................................................( 306.383 )( 208.991 )( 515.374 )Financing activities( Decrease ) increase in short - term borrowings................................................................................................................................................................( 369.506 )315.196( 54.310 )( Decrease ) increase in long - ferm borrowings -----------------------------------------------------------------------------------------------------------------------------------------------------------------( 81.106 )91.0449.938Increase in bonds and deberrtures — socio - socio - socio - socio - socio - socio - socio - socio - socio - socio - socio - socio - socio -85.000–85.000Prioceeds from sales of treasury stock - exonomics - exonomics - exonomics - exonomics - exonomics -5.670–5.670OPg1 ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------( 144.062 )25.000( 119.062 )Net cash ( used in ) provided by financing", + "page_start": 101, + "page_end": 101, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "*Thousands of*\n*U.S. dollars*\n2004 \n*Mar. 31, 2005*\n\n*Millions of yen*\n\n2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* 2002 \n*Mar. 31, 2003* *For the years ended*\n\nSales proceeds....................................................................................................................................................................... ¥2,032 \n1,225 \nAggregate gain....................................................................................................................................................................... \n(13) \nAggregate loss ....................................................................................................................................................................... \n$18,991 \n11,449 \n(121) \n¥4,048 \n1,500 \n(32) ¥12,770 \n3,446 \n(3,167) \n\nc) The redemption schedule for securities with maturity dates classified as other securities and held-to-maturity debt securities as of March 31, \n\n\n \n \n \n \n [html]< underline > Fiscal year 2004 ( As of Mer. 91.2005 )Due in one year or less\n
Due after one year through five years.Due after five years through ten yearsDue after ten yearsGovernment bonds -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
¥ 20¥ 0¥ 0¥ 0Corporate konds ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1470540OltS1 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
04007. ( II ) between recommendations
¥ 167¥ 4¥ 54¥ 0
", + "page_start": 89, + "page_end": 89, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the \n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. \n\n\nStan A. Askren \n\n\nAbbie J. Smith \n\n\nDennis J. Martin \n\n\nGary M. Christensen \n\n Richard H. Stanley \n\n\nJack D. Michaels \n\n\nCheryl A. Francis \n\n\nBrian E. Stern \n\n\nJoseph Scalzo \n\n\n\n\n\nRobert L. Katz", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "previously laid off or terminated employees, management determined in 2002 that \na portion of the remaining accrual was no longer necessary. This resulted in a \nrestructuring credit of $10 million in 2002. \n\nProperty transactions, net consisted of the following: \n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Gain on sale of North Las Vegas land............ $$ ( 36.776 )$
Sieghled & Roy theatre write - down – The Mirage...1.408
Storm damage – Beau Rivage...................
7.824Write - off of Detroit development costs............
4.754Impairment of assets to be disposed of.........4735.764
2.134Demolition costs.........................................................................................................................................................................................7.0576.614
Other net losses on asset sales or disposals......1.1354.049
$8.665$ ( 18.941 )$
\n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Interest cost............................................................................................................................................................................................$401.391$
352.820$345.448Less : Capitalized interest.................................................
( 23.005 )( 15.234 )( 61.712 )Interest expense, net....................................................................
$378.386$337.586
$283.736Cash paid for interest, net of amounts capitalized...$
321.008$308.198$
", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing \n\n\n\nment process and allows us to embrace change. As we continue on our heritage while remaining true to our culture and values. \n\nto add and develop talent to support our growth strategies, we The new name will serve to better align the corporate identity \n\nbecome more diverse in our perspectives, strengthening our with the direction of the company, as a strategic manager of \n\nability to understand and meet the needs of our customers and multiple, distinct, and independent brands. \n\nend-users. We thank our member-owners for their continued \n\ndedication, and look forward to the challenges and opportuni- \n\nOn January 5, 2004, we completed the acquisition of ties of 2004. \n\nPaoli Inc., a leading provider of wood case goods and seating. \n\nThe acquisition reflects our commitment to achieving profit- \n\nable growth. With annual sales in excess of $80 million, Paoli \n\nhas well-known brands, a broad product offering, and strong \n\nJack D. Michaels independent representative sales and dealer networks. This \n\nacquisition supports our operating philosophy to work through C H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R \n\n\n\nautonomous, decentralized businesses with strong brands \n\nfocused on distinct markets. \n\nImportant to our company’s success, is a strong Board \n\nof Directors who bring their individual skills, knowledge, and \n\nStan A. Askren experience to our company. Their involvement, independence, \n\nand integrity provide the ongoing foundation for effective gov- P R E S I D E N T \n\nernance and corporate oversight for you, our shareholders. \n\nThis year we recognize retiring directors Lorne R. \n\nWaxlax, Robert W. Cox, and M. Farooq Kathwari. We thank \n\nthem for their dedication. We are also pleased to welcome \n\nJoseph Scalzo, President, Personal Care Products, The Gillette \n\nCompany, to our board. \n\nOur CEO succession process is progressing smoothly. \n\nThe appointment of Stan Askren as President of HON \n\nINDUSTRIES and as a member of the Board of Directors,", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Fiscal year 2002 ( For the year ended Mar. 31.2003 )Automobile and EliminationsSales FinancingConsolidated total
Net salest ------------------------------------------------------------------------------------------------------------------------------------¥ 6.432.720¥ 395.868¥ 6.828.588
Cost of sales -------------------------------------------------------------------------4.617.368254.9564.872.324
Gross profit -----------------------------------------------------1.815.352140.9121.956.264
Operating income ----------------------------------------------------------------------------------------------677.34859.882737.230
Operating income as a percentage of net sales -----10.5 %15.1 %10.8 %
Net financial cost ---------------------------------------------------------------------( 16.543 )3( 16.540 )
Income before income taxes and minority interests -------------------------------------------------------------------------------------------------------------------------------------------------------------634.81859.806694.624
Net income ---------------------------------------------------------¥ 458.6¥36.554
¥495.165Total net financial cost -----------------------------------------------------------------------------------------κ_ ( 16.5 )
Ψ3Y( 16.540 )
Intersegment elimination -----------------------------------------------------------------------------------------( 5.677 )( 5.677 )
Net financial cost for segment →—~~~~–~––––––––––––––( 10.866 )3( 10.863 )
", + "page_start": 98, + "page_end": 98, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Operating Loss**The total Network Services Segment operating loss decreased to $6.1 million for the year ended December 31, 2000 from $12.9 \nmillion for the year ended December 31, 1999, an improvement of 53%, as a result of the factors discussed above. The Central European Sub- \nsegment re c o rded an operating loss of $3.1 million for the year ended December 31, 2000 compared to a loss of $8.0 million for the year ended \nDecember 30, 1999, an improvement of 61%, as a result of the factors discussed above. The We s t e rn European Sub-segment operating loss \nd e c reased to $2.3 million for year ended December 31, 2000 compared to a loss of $3.8 million for the year ended December 31, 1999, an \ni m p rovement of 39%, as a result of the factors discussed above. The Other ATM Operations Sub-segment incurred an operating loss of $700,000 \nfor the year ended December 31, 2000 compared to a loss of $1.0 million for the year ended December 31, 1999, an improvement of 30%, as a \nresult of the factors discussed above. \n\nSoftware Solutions Segment \n\n**Software Solutions Revenue**Revenues from the Software Solutions Segment totaled $16.0 million before inter-segment eliminations for the \nyear ended December 31, 2000 as compared to revenue of $15.1 for the year ended December 31, 1999. Software revenues are grouped into four \nb road categories: software license fees, professional service fees, maintenance fees and hard w a re sales. Software license fees are the initial fees \nc h a rged by the Company for the licensing of its pro p r i e t a ry application software to customers. Professional service fees are charged for \ncustomization, installation and consulting services provided to customers. Software maintenance fees are the ongoing fees charged to customers \nfor the maintenance of the software products. Hard w a re sales revenues are derived from the sale of computer products and are re p o rted net of \ncost of sales. The components of software solutions revenue for the years ended December 31, 2000 and 1999 were: \n\n\n \n \n \n \n [html]( in thousonols )Years ending December 31,20001999\n
Software license fees$+, 11782.430
Professional service fees6.8678.298
Maintenance fees4.487+. 051
Hardware sales535370
Total direct operating expenses$16.006815.149
\n\nThe increases in software license fees from 1999 to 2000 can be attributed to an increased number of software sales contracts signed in 2000 as \nc o m p a red to 1999, primarily in the first half of the year 2000. Sales of the Company’s core software products have dropped off substantially in \nthe third and fourth quarter of 2000 and are expected to be soft again during 2001. The Company believes that revenues of the Software \nSolutions Segment will increasingly be derived from the Company’s new set of software solutions, including its wireless banking solutions. \nThe decreases in professional service fees from 1999 to 2000 can be attributed to increased efficiency in the installation of software.", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What operations were discontinued in 1997 by Atrion Corp ?", + "target_page": 17, + "target_passage": "During 1997, the Company sold all of its natural gas operations. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*\n\n**S t o c k I n f o r m a t i o n**\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were \napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below \nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the \nCompany for each quarter of 2002 and 2003. \n\n2003 Quarter Ended \nMarch 31 \nJune 30 \nSeptember 30 \nDecember 31 \n\n$ \n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying \nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. \n\n**E S T I M A T E S**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United States of America requires management \nto make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosures of contingent assets and liabilities at the dates \nof the financial statements and the reported amount of revenues and expenses during the reporting periods. Actual results could differ from those estimates. \n\n**F I N A N C I A L P R E S E N T A T I O N**\nCertain prior-year amounts have been reclassified to conform with the current-year presentation. \n\n**C A S H A N D C A S H E Q U I V A L E N T S**\nCash equivalents are securities with original maturities of 90 days or less. \n\n**T R A D E R E C E I V A B L E S**\nTrade accounts receivable are recorded at the original sales price to the customer. The Company maintains an allowance for doubtful accounts to reflect \nestimated losses resulting from the inability of customers to make required payments. On an ongoing basis, the collectibility of accounts receivable is \nassessed, based upon historical collection trends, current economic factors, and the assessment of the collectibility of specific accounts. The Company \nevaluates the collectibility of specific accounts using a combination of factors, including the age of the outstanding balances, evaluation of customers’ \ncurrent and past financial condition, recent payment history, current economic environment, and discussions with appropriate Company personnel and \nwith the customers directly. Accounts are written off when it is determined the receivable will not be collected. \n\n\n \n \n \n \n [html]DEGEMBER 332015218.12\n
Raw materials$5.641$6.082
Finished goods4.0442.818
Work in process1.6291.411
Total inventories$11.314$10.311
", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**Discontinued Operations**\nA discontinued operation is a component of our business that has \noperations and cash flows that are clearly distinguished from the rest of \nRogers and: \n(cid:129) represents a separate major line of business \n(cid:129) is part of a single coordinated plan to dispose of a separate major \nline of business, or \n(cid:129) is a subsidiary we have acquired with the intention to re-sell. \n\nWhen we classify a component as a discontinued operation, we restate \nour comparative income and comprehensive income as though the \noperation had been discontinued from the start of the comparative \nyear. \n\nSee note 6 for information about discontinued operations. \n\n**New Accounting Pronouncements Effective in 2013**\nWe adopted the following accounting changes \nconsolidated financial statements on January 1, 2013. \n(cid:129) IFRS 10, Consolidated Financial Statements \n(cid:129) IFRS 11, Joint Arrangements \n(cid:129) IFRS 12, Disclosure of Interest in Other Entities \n(cid:129) IFRS 13, Fair Value Measurement \n(cid:129) IAS 19, Employee Benefits (2011) \n(cid:129) IAS 28, Investments in Associates and Joint Ventures \n(cid:129) IAS 36, Impairment of Assets \n\nfor our 2013", + "page_start": 104, + "page_end": 104, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "1,868 \n998 \n477 \nNOTE 6: DISCONTINUED OPERATIONS \n\nOperating revenue \nOperating costs \nRestructuring, acquisition and other expenses \n3,343 \n15 \n\n3,358 \n\nLoss before income taxes \nIncome tax recovery \n162 \n183 \nLoss from discontinued operations for the year \n\n345 \n6 \n\nWe discontinued our Video segment in the second quarter of 2012 and \nreported the Video results of operations as discontinued operations at \nthat time. \n351 \n\n784 \n264 \n276 \n296 \n\nThe Video segment did not have any results from discontinued \noperations \nliabilities as at \nDecember 31, 2013 and 2012. Cash flows from operating activities for \nthe segment for 2013 were nil (2012 – $2 million). The Video segment \ndid not have any cash flows from investing or financing activities for the \nyears ended December 31, 2013 and 2012. \n\n1,620 \nin 2013 or any significant assets or \n**(117)** (123) \n\n**$ 12,706** $ 12,486 \n\n**2013** 2012 \n\n**$ 1,541**\n**190**\n**4,126** $ 1,605 \n173 \n4,138", + "page_start": 106, + "page_end": 106, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Income from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income \nfrom discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the \ntwo months of its operations in 2003. \n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a \nresult recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes. \n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating \nresults in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations. \n\n**DISCONTINUED OPERATIONS**\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s \nlocal customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December \n31, 2002. The decline was the result of competition with digital technologies and increased competition from national \ncarriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to \ntransform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the \npartnership to one of the minority partners. The agreement was signed in November 2002, and closing was February \n28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, \n$7.4 million and $6.7 million, respectively. \n\n**CONTINUING OPERATIONS**\n\n**2002 compared to 2001**\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million \nof wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 \nmillion or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%. \n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS \nservice revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which \ntotaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end. \n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, \nwas $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the \nCompany’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The \nrate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 \nthrough April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from \nOctober 1, 2001 through December 31, 2001. \n\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 \nmillion of rebates and discounts given at the time of sale, which became more pronounced during the year to meet \nindustry competition for subscriber additions and subscriber retention. \n\nIn accordance with Sprint’s requirements, the Company launched third generation (3G 1X) service in August 2002. \nThe impact of 3G 1X-network enhancements on revenues was not significant in 2002. \n\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the \nresult of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the \n82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**NOTE 3 — DISCONTINUED OPERATIONS**\nIn June 2003, the Company entered into an agreement to sell the Golden Nugget \nSubsidiaries, including substantially all of the assets and liabilities of those resorts, \nfor approximately $215 million, subject to certain working capital adjustments. \nThis transaction closed in January 2004, with net proceeds to the Company of \n$210 million. Also in June 2003, the Company ceased operations of \nPLAYMGMMIRAGE.com, its online gaming website (“Online”). In February \n2004, the Company entered into an agreement to sell the subsidiaries that own", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**B O A R D O F D I R E C T O R S**\n\nEmile A. Battat \n*Chairman of the Board and President*\n*Atrion Corporation*\n\nRichard O. Jacobson \n*Chairman of the Board*\n*Jacobson Companies*\n*Des Moines, Iowa*\n\nJohn H. P. Maley \n*Chairman of the Board*\n*Compex Technologies, Inc.*\n*Minneapolis, Minnesota*\n\nHugh J. Morgan, Jr. \n*Private Investor, Former Chairman of the Board*\n*National Bank of Commerce of Birmingham*\n*Birmingham, Alabama*\n\nRoger F. Stebbing \n*President and Chief Executive Officer*\n*Stebbing and Associates, Inc.*\n*Signal Mountain, Tennessee*\n\nJohn P. Stupp, Jr. \n*President*\n*Stupp Bros., Inc.*\n*St. Louis, Missouri*\n\n**E X E C U T I V E O F F I C E R S**\n\nEmile A. Battat \n*Chairman of the Board and President*\n\nJeffery Strickland \n*Vice President and Chief Financial*\n*Officer, Secretary and Treasurer*", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "The results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia \nare classified as discontinued operations in the accompanying consolidated \nstatements of income for all periods presented. Net revenues of discontinued \noperations were $45 million, $231 million and $222 million, respectively, for the \nyears ended December 31, 2004, 2003 and 2002. Included in income from \ndiscontinued operations is an allocation of interest expense based on the ratio of the \nnet assets of the discontinued operations to the total consolidated net assets and \ndebt of the Company. Interest allocated to discontinued operations was $2 million, \n$9 million and $9 million for the years ended December 31, 2004, 2003 and 2002, \nrespectively. Included in discontinued operations for the year ended December 31, \n2003 is a loss on disposal of Online of $7 million relating primarily to \nunrecoverable costs of computer hardware and software. Included in the tax benefit \nfrom discontinued operations for the year ended December 31, 2003 is $2 million \nof previously unrecognized tax benefits relating to prior year operating losses of \nOnline. Included in discontinued operations for the year ended December 31, \n2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a \ngain on sale of the MGM Grand Australia Subsidiaries of $74 million. \n\n\n \n \n \n \n [html]At December 31.2003 ( In thousands )\n
Cash$15.230
Accounts receivable, net6.024
Inventories.4.321
Prepaid expenses and other5.174
Total current assets30.749
Property and equipment185.516
Other assets, net9.817
Total assets226.082
Accounts payable2.180
Other current liabilities.20.885
Total current liabilities23.065
Long - term debt391
Total liabilities23.456
", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", + "target_page": 21, + "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*\n\n**S t o c k I n f o r m a t i o n**\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were \napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below \nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the \nCompany for each quarter of 2002 and 2003. \n\n2003 Quarter Ended \nMarch 31 \nJune 30 \nSeptember 30 \nDecember 31 \n\n$ \n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying \nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n\n \n \n \n \n [html]\n
We make products that meet the specific needs of niche markets.One of the principal strengths of our company lies in the diversity of our product lines. Atrion makes
medical devices and components for end - essers and mandacturers throughout the health care industry,ranging from ophthalmology and cardiovascular products to fluid delivery devices. Our repostation for quality,
precision : and reliability has belped a number of our products gain the leading market positions in the UnitedStates in their respective niches.
In the ophthalinic sector, Atrion is a leading IU. S. manufacturer of sofi contact lenes disinfection cases. Inaddition, our LacriCATIVIb, balloon catheter positions us as a market leader with a patented product for the
treatment of tear duct blockages.We serve the cardiac surgery market as a leading U. S. provider of vaccuum relief valves, minimally invasive
surgical tapes and chock valves. Serving the same market, our MPS ® Myocardial Protection System continuesto make headway, as hospitals and surgeons increasingly recognize the value of this proprietary technology.
The MPS delivers essential fluids and medications to the heart during open - heart surgery, and it is the onlysystem that provides integrated control over temperature, pressure, flow rate and the precise delivery of
medications to the heart during surgery, hittisto adso is the leading I '. 5. provider of clamps for IV sets, whichare used in many surgical and medical settings.
One expertise and leadership in valve design and manufacturing extend beyond the health care industry.We are the leading donestic mandfacturer of valves and inflation devices used in marine and zotation safety products.
We support this stable of solidly performing products with two essential programs. One is a highlyeffective sales and marketing effort that keeps our products moving into the marketplace. Our sales team is
comprised of professionals who possess clinical knowledge and specific product experience, and alsoconcentrate on building, strong relationships with customers and within the industry.
Our other essential program is research and development. We believe it is vital to keep a pipeline ofproducts in various stages of development so that we can take advantage of neur - and long - term opportunities
in our markets. Understandably, proposed new products for the health care industry must undergo stringenttesting and rigorous approval procedures. Often, this means that the process of bringing a new product from
the design stage to the marketplace is a long and ardisous one. A strong, proactive research and developmentprogram ensures that we are couniting the resources and time required to successfully stay the course.
", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. \n\n**E S T I M A T E S**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United States of America requires management \nto make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosures of contingent assets and liabilities at the dates \nof the financial statements and the reported amount of revenues and expenses during the reporting periods. Actual results could differ from those estimates. \n\n**F I N A N C I A L P R E S E N T A T I O N**\nCertain prior-year amounts have been reclassified to conform with the current-year presentation. \n\n**C A S H A N D C A S H E Q U I V A L E N T S**\nCash equivalents are securities with original maturities of 90 days or less. \n\n**T R A D E R E C E I V A B L E S**\nTrade accounts receivable are recorded at the original sales price to the customer. The Company maintains an allowance for doubtful accounts to reflect \nestimated losses resulting from the inability of customers to make required payments. On an ongoing basis, the collectibility of accounts receivable is \nassessed, based upon historical collection trends, current economic factors, and the assessment of the collectibility of specific accounts. The Company \nevaluates the collectibility of specific accounts using a combination of factors, including the age of the outstanding balances, evaluation of customers’ \ncurrent and past financial condition, recent payment history, current economic environment, and discussions with appropriate Company personnel and \nwith the customers directly. Accounts are written off when it is determined the receivable will not be collected. \n\n\n \n \n \n \n [html]DEGEMBER 332015218.12\n
Raw materials$5.641$6.082
Finished goods4.0442.818
Work in process1.6291.411
Total inventories$11.314$10.311
", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the \npast number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business \nsegment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using \nthe Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total \nrevenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s \ntotal revenue for 2003, 2002 and 2001.", + "page_start": 34, + "page_end": 34, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "2003 2002 \n\n$ 62,803 $ 59,533 $ 57,605 $ 51,447 $ 49,917 \n\n4,892 4,065 4,262 2,663 2,128 \n\n2,589(b) 9,754(c) 5,057 2,792 2,293 \n\n60,050 60,807 65,555 63,690 64,640 \n\n4,287 10,337 17,125 7,400 10,417 \n\n2.66 2.18 1.88 1.25 .81 \n\n1.39(b) 4.30(c) 2.75 1.31 .87 \n\n.24(a) — — — — \n\n1,839 1,863 2,272 2,135 2,631 \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) \n\nRevenues \n\nIncome from continuing operations \n\nNet income \n\nTotal assets \n\nLong-term debt \n\nIncome from continuing operations, per diluted share \n\nNet income per diluted share \n\nCash dividends per common share \n\nAverage diluted shares outstanding \n\n(a) Dividends on outstanding common shares paid in the 3rd and 4th quarter at $.12 per share (see Note 6) \n(b) Includes a $1.6 million after-tax goodwill impairment charge ($ .88 per diluted share) (see Note 2) \n(c) Includes a $5.5 million after-tax gain ($ 2.42 per diluted share) from discontinued operations (see Note 3) \n\n126 354 \n\n1,879 1,403 \n\n4,746 4,384 \n\n$ 11,643 $ 10,206 $ 10,857 $ 8,359 $ 7,101 \n\n1,839 1,863 2,272 2,135 2,631 \n\n$ 6.33 $ 5.48 $ 4.78 $ 3.92 $ 2.70 \n\nEBITDA Per Diluted Share From Continuing Operations \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) 2003 2002 \n\nIncome from continuing operations $ 4,892 $ 4,065 $ 4,262 $ 2,663 $ 2,128 \n\nAdd: \n\nInterest expense (income), net \n\nIncome tax expense \n\nDepreciation and amortization \n\nEBITDA \n\nAverage diluted shares outstanding \n\nEBITDA per Diluted Share from Continuing Operations \n\nEBITDA per diluted share from continuing operations, a non-GAAP financial measure, is computed by the Company as EBITDA divided by weighted average diluted shares outstanding. \nThe company computes EBITDA by adding income from continuing operations, net interest expense/(income), income tax expense, depreciation and amortization. \n\nReturn on Equity \n\n(IN THOUSANDS) 2003 1999 \n\nNet Income $ 5,057 $ 2,293 \n\nStockholders’ Equity $ 41,691 $ 49,369 \n\nReturn on Equity 12% 5% \n\nReturn on equity, a non-GAAP financial measure, is computed by the Company by dividing annual net income by the Company’s beginning \nof the year stockholders’ equity balance as shown on its balance sheet.", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Of total segment revenue, approximately 87% is attributable to those ATMs owned by the Company for the year ended December 31, 2000 and \n94% for the year ended December 31, 1999. Of total transactions processed, approximately 78% is attributable to those ATMs owned by the \nCompany for the year ended December 31, 2000 and 76% for the year ended December 31, 1999. The Company believes the shift from a larg e l y \np ro p r i e t a ry, Euronet Worldwide owned ATM network to a more balanced mix between pro p r i e t a ry ATMs and customer-owned ATMs is a positive \ndevelopment and will provide higher marginal re t u rns on investments. \n\nTransaction fees charged by the Company vary for the three types of ATM transactions that are currently processed on the Company’s ATMs: cash \nwithdrawals, balance inquiries and transactions not completed because the relevant card issuer does not give authorization. Transaction fees for \ncash withdrawals vary from market to market but generally range from $0.60 to $1.75 per transaction while transaction fees for the other two \ntypes of transactions are generally substantially less. Transaction fees payable under the electronic re c h a rge solutions sold by the Company are \nincluded in Network Services Segment revenues and vary substantially from market to market and based upon the specific prepaid solution and \nthe denomination of prepaid hours purchased. Generally the range of transaction fees vary from $1.10 to $1.80 per prepaid mobile re c h a rg e \np u rchase. \n\n**Operating Expenses**Total segment operating expenses increased to $43.0 million for the year ended December 31, 2000 from $39.4 million \nfor the year ended December 31, 1999. The increases are due primarily to costs associated with the growth in the numbers of ATMs and \nexpansion of the Company’s operations during the period.", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "1,981,104 \n4,537,787 \n4,196,667 81,794 \n3,808,250 \n3,392,676 51,109 \n1,305,116 \n1,249,110 7,622 \n1,046,753 \n996,529 2,121,629 ¥(2,121,629) \n(2,121,629) \n(2,119,865) \n\n10,697,906 \n9,834,982 \n862,924 56,006 ¥ 50,224 ¥ \n\nGeographical areas \n\nThe geographical segment information for the Company and its consolidated subsidiaries for the years ended March 31, 2005, 2004 and 2003 \nis as follows: \nFiscal year 2004*(For the year ended Mar. 31, 2005)*\n\nOther foreign \ncountries \n*Millions of yen*\nJapan North America Europe \n\nSales to third parties .......................................... ¥2,556,683 ¥3,726,456 ¥1,254,007 ¥1,039,131 ¥ 8,576,277 ¥ \n— ¥8,576,277 \nInter-area sales and transfers .................... \n— \nTotal sales................................................................... \n8,576,277 \nOperating expenses ........................................... \n7,715,117 \nOperating income................................................. ¥ 341,120 ¥ 415,574 ¥ \n¥(1,764) ¥ 861,160 \nTotal assets ............................................................... ¥5,590,397 ¥4,714,272 ¥ 799,778 ¥ 637,065 ¥11,741,512 ¥(1,892,989) ¥9,848,523 \n\n*Thousands of U.S. dollars*\n\n$9,711,503 $ 80,152,121 $ \n\n18,514,991 \n42,409,225 \n39,221,187 764,430 \n35,591,122 \n31,707,252 71,234 \n9,782,737 \n9,313,355 19,828,309 \n99,980,430 \n91,915,719 (19,828,309) \n(19,828,309) \n(19,811,822) \n\n\n \n \n \n \n [html]Fiscal year 2003 ( For the year ended Mer. 31.2004 )Eliminations\n
JapanNorth AmericaEuropeOther foreign countriesTotalConsolidated
Millions of yen
Sales to third parties --------------------------------------------¥ 2.559.806¥ 3.278.966¥ 1.164.032¥ 426.415¥ 7.429.219¥¥ 7.429.219
Inter - area sales and transfers -------------------------------------1.725.49135.38431.6904.6631.797.228( 1.797.228 )Tofal sales ------------------------------------------
4.285.2973.314.3501.195.722431.0789.226.447( 1.797.228 )7.429.219Operating expenses →— ‐– ‐– ‐–––––––––––––3.932.835
2.914.5291.146.549412.9388.406.851( 1.802.487 )6.604.364Operating income --------------------------------------------------------¥ 352.462Y
399.821¥ __49.173¥_18.140¥_819.596Y5.259¥ 824.855Tofal assets -----------------------------------------------¥ 4.805.718
¥fi64.382¥ 607.926¥ 219.109¥ 9.297.135¥( 1.437.279 )¥ 7.859.856
\n\na) As described in Note 2(b), effective April 1, 2003, Nissan Motor Manufacturing (UK) Ltd., a consolidated subsidiary, implemented early \nadoption of a new accounting standard for retirement benefits in the United Kingdom. The effect of this change was to decrease operating \nincome in the “Europe” segment by ¥1,686 million for the year ended March 31, 2004 as compared with the corresponding amount which \nwould have been recorded if the previous method had been followed.", + "page_start": 102, + "page_end": 102, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company.", + "page_start": 41, + "page_end": 41, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", + "target_page": 10, + "target_passage": "Gross Profit 22,239", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*\n\n**S t o c k I n f o r m a t i o n**\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were \napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below \nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the \nCompany for each quarter of 2002 and 2003. \n\n2003 Quarter Ended \nMarch 31 \nJune 30 \nSeptember 30 \nDecember 31 \n\n$ \n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying \nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n\n \n \n \n \n [html]\n
We make products that meet the specific needs of niche markets.One of the principal strengths of our company lies in the diversity of our product lines. Atrion makes
medical devices and components for end - essers and mandacturers throughout the health care industry,ranging from ophthalmology and cardiovascular products to fluid delivery devices. Our repostation for quality,
precision : and reliability has belped a number of our products gain the leading market positions in the UnitedStates in their respective niches.
In the ophthalinic sector, Atrion is a leading IU. S. manufacturer of sofi contact lenes disinfection cases. Inaddition, our LacriCATIVIb, balloon catheter positions us as a market leader with a patented product for the
treatment of tear duct blockages.We serve the cardiac surgery market as a leading U. S. provider of vaccuum relief valves, minimally invasive
surgical tapes and chock valves. Serving the same market, our MPS ® Myocardial Protection System continuesto make headway, as hospitals and surgeons increasingly recognize the value of this proprietary technology.
The MPS delivers essential fluids and medications to the heart during open - heart surgery, and it is the onlysystem that provides integrated control over temperature, pressure, flow rate and the precise delivery of
medications to the heart during surgery, hittisto adso is the leading I '. 5. provider of clamps for IV sets, whichare used in many surgical and medical settings.
One expertise and leadership in valve design and manufacturing extend beyond the health care industry.We are the leading donestic mandfacturer of valves and inflation devices used in marine and zotation safety products.
We support this stable of solidly performing products with two essential programs. One is a highlyeffective sales and marketing effort that keeps our products moving into the marketplace. Our sales team is
comprised of professionals who possess clinical knowledge and specific product experience, and alsoconcentrate on building, strong relationships with customers and within the industry.
Our other essential program is research and development. We believe it is vital to keep a pipeline ofproducts in various stages of development so that we can take advantage of neur - and long - term opportunities
in our markets. Understandably, proposed new products for the health care industry must undergo stringenttesting and rigorous approval procedures. Often, this means that the process of bringing a new product from
the design stage to the marketplace is a long and ardisous one. A strong, proactive research and developmentprogram ensures that we are couniting the resources and time required to successfully stay the course.
", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. \n\n**E S T I M A T E S**\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United States of America requires management \nto make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosures of contingent assets and liabilities at the dates \nof the financial statements and the reported amount of revenues and expenses during the reporting periods. Actual results could differ from those estimates. \n\n**F I N A N C I A L P R E S E N T A T I O N**\nCertain prior-year amounts have been reclassified to conform with the current-year presentation. \n\n**C A S H A N D C A S H E Q U I V A L E N T S**\nCash equivalents are securities with original maturities of 90 days or less. \n\n**T R A D E R E C E I V A B L E S**\nTrade accounts receivable are recorded at the original sales price to the customer. The Company maintains an allowance for doubtful accounts to reflect \nestimated losses resulting from the inability of customers to make required payments. On an ongoing basis, the collectibility of accounts receivable is \nassessed, based upon historical collection trends, current economic factors, and the assessment of the collectibility of specific accounts. The Company \nevaluates the collectibility of specific accounts using a combination of factors, including the age of the outstanding balances, evaluation of customers’ \ncurrent and past financial condition, recent payment history, current economic environment, and discussions with appropriate Company personnel and \nwith the customers directly. Accounts are written off when it is determined the receivable will not be collected. \n\n\n \n \n \n \n [html]DEGEMBER 332015218.12\n
Raw materials$5.641$6.082
Finished goods4.0442.818
Work in process1.6291.411
Total inventories$11.314$10.311
", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. \n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. \n\nGrant Thornton LLP \nDallas, Texas \nFebruary 13, 2004 \n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "2003 2002 \n\n$ 62,803 $ 59,533 $ 57,605 $ 51,447 $ 49,917 \n\n4,892 4,065 4,262 2,663 2,128 \n\n2,589(b) 9,754(c) 5,057 2,792 2,293 \n\n60,050 60,807 65,555 63,690 64,640 \n\n4,287 10,337 17,125 7,400 10,417 \n\n2.66 2.18 1.88 1.25 .81 \n\n1.39(b) 4.30(c) 2.75 1.31 .87 \n\n.24(a) — — — — \n\n1,839 1,863 2,272 2,135 2,631 \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) \n\nRevenues \n\nIncome from continuing operations \n\nNet income \n\nTotal assets \n\nLong-term debt \n\nIncome from continuing operations, per diluted share \n\nNet income per diluted share \n\nCash dividends per common share \n\nAverage diluted shares outstanding \n\n(a) Dividends on outstanding common shares paid in the 3rd and 4th quarter at $.12 per share (see Note 6) \n(b) Includes a $1.6 million after-tax goodwill impairment charge ($ .88 per diluted share) (see Note 2) \n(c) Includes a $5.5 million after-tax gain ($ 2.42 per diluted share) from discontinued operations (see Note 3) \n\n126 354 \n\n1,879 1,403 \n\n4,746 4,384 \n\n$ 11,643 $ 10,206 $ 10,857 $ 8,359 $ 7,101 \n\n1,839 1,863 2,272 2,135 2,631 \n\n$ 6.33 $ 5.48 $ 4.78 $ 3.92 $ 2.70 \n\nEBITDA Per Diluted Share From Continuing Operations \n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) 2003 2002 \n\nIncome from continuing operations $ 4,892 $ 4,065 $ 4,262 $ 2,663 $ 2,128 \n\nAdd: \n\nInterest expense (income), net \n\nIncome tax expense \n\nDepreciation and amortization \n\nEBITDA \n\nAverage diluted shares outstanding \n\nEBITDA per Diluted Share from Continuing Operations \n\nEBITDA per diluted share from continuing operations, a non-GAAP financial measure, is computed by the Company as EBITDA divided by weighted average diluted shares outstanding. \nThe company computes EBITDA by adding income from continuing operations, net interest expense/(income), income tax expense, depreciation and amortization. \n\nReturn on Equity \n\n(IN THOUSANDS) 2003 1999 \n\nNet Income $ 5,057 $ 2,293 \n\nStockholders’ Equity $ 41,691 $ 49,369 \n\nReturn on Equity 12% 5% \n\nReturn on equity, a non-GAAP financial measure, is computed by the Company by dividing annual net income by the Company’s beginning \nof the year stockholders’ equity balance as shown on its balance sheet.", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 \nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit \nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence \nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made \nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "1,981,104 \n4,537,787 \n4,196,667 81,794 \n3,808,250 \n3,392,676 51,109 \n1,305,116 \n1,249,110 7,622 \n1,046,753 \n996,529 2,121,629 ¥(2,121,629) \n(2,121,629) \n(2,119,865) \n\n10,697,906 \n9,834,982 \n862,924 56,006 ¥ 50,224 ¥ \n\nGeographical areas \n\nThe geographical segment information for the Company and its consolidated subsidiaries for the years ended March 31, 2005, 2004 and 2003 \nis as follows: \nFiscal year 2004*(For the year ended Mar. 31, 2005)*\n\nOther foreign \ncountries \n*Millions of yen*\nJapan North America Europe \n\nSales to third parties .......................................... ¥2,556,683 ¥3,726,456 ¥1,254,007 ¥1,039,131 ¥ 8,576,277 ¥ \n— ¥8,576,277 \nInter-area sales and transfers .................... \n— \nTotal sales................................................................... \n8,576,277 \nOperating expenses ........................................... \n7,715,117 \nOperating income................................................. ¥ 341,120 ¥ 415,574 ¥ \n¥(1,764) ¥ 861,160 \nTotal assets ............................................................... ¥5,590,397 ¥4,714,272 ¥ 799,778 ¥ 637,065 ¥11,741,512 ¥(1,892,989) ¥9,848,523 \n\n*Thousands of U.S. dollars*\n\n$9,711,503 $ 80,152,121 $ \n\n18,514,991 \n42,409,225 \n39,221,187 764,430 \n35,591,122 \n31,707,252 71,234 \n9,782,737 \n9,313,355 19,828,309 \n99,980,430 \n91,915,719 (19,828,309) \n(19,828,309) \n(19,811,822) \n\n\n \n \n \n \n [html]Fiscal year 2003 ( For the year ended Mer. 31.2004 )Eliminations\n
JapanNorth AmericaEuropeOther foreign countriesTotalConsolidated
Millions of yen
Sales to third parties --------------------------------------------¥ 2.559.806¥ 3.278.966¥ 1.164.032¥ 426.415¥ 7.429.219¥¥ 7.429.219
Inter - area sales and transfers -------------------------------------1.725.49135.38431.6904.6631.797.228( 1.797.228 )Tofal sales ------------------------------------------
4.285.2973.314.3501.195.722431.0789.226.447( 1.797.228 )7.429.219Operating expenses →— ‐– ‐– ‐–––––––––––––3.932.835
2.914.5291.146.549412.9388.406.851( 1.802.487 )6.604.364Operating income --------------------------------------------------------¥ 352.462Y
399.821¥ __49.173¥_18.140¥_819.596Y5.259¥ 824.855Tofal assets -----------------------------------------------¥ 4.805.718
¥fi64.382¥ 607.926¥ 219.109¥ 9.297.135¥( 1.437.279 )¥ 7.859.856
\n\na) As described in Note 2(b), effective April 1, 2003, Nissan Motor Manufacturing (UK) Ltd., a consolidated subsidiary, implemented early \nadoption of a new accounting standard for retirement benefits in the United Kingdom. The effect of this change was to decrease operating \nincome in the “Europe” segment by ¥1,686 million for the year ended March 31, 2004 as compared with the corresponding amount which \nwould have been recorded if the previous method had been followed.", + "page_start": 102, + "page_end": 102, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Total 2004** Total 2003 \n\n**Field units** **mmboe** Field units mmboe \n\n**Condensate (‘000 bbls)**\n\nCooper **1,448.5** **1.4** 2,111.8 2.0 \n\nSurat/Denison **7.8** **–** 10.9 – \n\nOtway **30.6** **–** 73.5 0.1 \n\nEast Spar **775.5** **0.7** 858.3 0.8 \n\nUnited States **114.4** **0.1** 25.6 – \n\nBayu-Undan **1,334.9** **1.2** – – \n\n**Total production** **3,711.7** **3.4** 3,080.1 2.9 \n\nTotal sales volume **3,569.5** **3.3** 3,246.6 3.0 \n\nTotal sales revenue ($million)**228.5** 150.0 \n\n**LPG (‘000 t)**\n\nCooper **108.7**\n\nSurat/Denison **0.1**\n\nBayu-Undan **49.8**\n\n**Total production** **158.6**\n\nTotal sales volume **148.6**\n\nTotal sales revenue ($million) **90.5**\n\n**0.9** 240.7 2.0 \n\n**–** – – \n\n**0.4** – – \n\n**1.3** 240.7 2.0 \n\n**1.3** 256.7 2.2 \n\n116.5 \n\n**Total**\n\n**Production (mmboe)** **47.1** 54.2 \n\n**Sales volume (mmboe)** **49.9** 55.4 \n\n**Sales revenue ($million)** **1,500.9** 1,465.0 \n\n\n \n \n \n \n [html]Field units2004Total\n
2003mmboe. Field unitsSales gas and ethane ( P2 )Cooper
125.921.6154.026.5Surat,/ Denison
16.12.814.32.5Amadeus
11.31.911.72.0Otway
4.40.811.92.0Patricia - Baleen
3.80.7L90.3Carnarvon
17.73.017.73.1United States
9.21.611.31.9Indonesia
2.10.4-Total production
190.532.8222.838.3Total sales volume
207.135.6228.439.3Total sales menue ( Smillion ) 480
680.1720.8Crude oil (° 000 bbls )Cooper2.685.5
2.72.808.22.8Surat,/ Denison90.2
0.183.10.1
Amadeus236.50.2270.00.3
Elang - Kakatua226.70.2425.50.4
Legendre2.045.82.02.269.02.3
Thevenard561.20.6708.00.7
Barrow859.30.9945.20.9
Jabiru - Challis176.70.2257.10.3
Stag2.124.82.12.617.22.5
SE Gobe289.10.3376.50.4
United States171.70.2212.20.2
Indonesia68.00.1-
Total production9.535.59.610.972.011.0
Total sales volume9.681.09.70.958.610.9
Total sales revenue ( Smillon )501.8477.7
", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "[html]Results of operations for any previous quarter are not necessarily indicative of results for any future period.( tn thousands, except per share data )First QuarterSecond QuarterThird QuarterFourth QuarterYEAR - END 2003 :Net sales8 391.971$ 406.793$ 500.091$ 456.873Cost of products sold≥ 52.841≥ 60.367316.412≥ 86.893Gross profit139.130146.426183.679169.980Selling and administrative expenses114.426112.979137.479135.867Restructuring - related charges ( income )–a, a653.8812.364Operating income24.70431.1825a, 32641.749Interest income ( expense ) – net( a65 )( 149 )617767Income before income taxes24 - 43931.03352 - 94342.516Income taxes8.55410.86118.53014.881Net income8 15β5#20.172#34.413#≥ 7.635Net income per common share – basic8- 37$- 35#- 59#- 47Weighted - average common shares outstanding – basic58.31758.14358.04358.222Net income per common share – diluted8- 37$- 35#- 59#- 47Weighted - average common shares outstanding – diluted58.58a58.46858.44858.731As a Percentage of Net SalesNet sales100.0 %100.0 %100.0 %100.0 %Gross profit35 - 536.036.737.2Selling and administrative expenses29.2a7.825.527.5Restructuring - related charges–0.60.80.5Operating income6.37.710.59.1Income taxes2.2≥ 73 - 73 - 3Net income4.15.06.96.0YEAR - END 2002 :Net sales$399.139$399.299$446.274$447.910Cost of products sold259.398256.696285.996290.653Gross profit139.741142.603160.278157.257Selling and administrative expenses110.425111.320117.274115.170Restructuring - related charges ( income )3.900( 900 )-–Operating income25.41632.18343.00442.087Interest income ( expense ) – net( 580 )( 710 )( 577 )( 269 )Income before income taxes24.83631.47342.42741.818Income taxes8.94111.33015.27413.649Net income$895$20.143$27.153$28.169Net income per common share — basic and diluted$. 27$34$. 46$. 48Weighted -", + "page_start": 53, + "page_end": 53, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \n\n\n \n \n \n \n [html]decline reduced n by a furthern boe.to effectively control its casts in the face of significant external pressures in the form of risingthese factors, Santos ’ ojects are starting to jine and have bequn toExamining production costs in detail. reveals :edecline experienced oast three years. Two vere commissioned in Bayu - Undan liquids▪ the start - up of Bayu - Undan and acquisitions added $ 16 million to Santos ’ cost baseand the Minerva gas n addition, acquisitions▪ changes in our accounting added a further $ 16 million to Santos ’ production costsproduction is expected• higher insurance premiums ($ 8 mllion ) and one - off stock res.The impact of the ncident. Santos now roduction to be around boe in 2005. Thisoffset by $ 17 million in cost savings largely as a result of Santos ' continuous improvement initiativess largely driven by the oning of Mutineer - Exeter 2005 and the 3ohnthe Moomba incident resulted in $ 17 million of one - off costs in 2004.as field in the middle ar.Piecing this together, the key themes in our financial performance were :ION COSTS DNTROLcosts in 2004 were lon, up $ 45 million or 003. Analysis shows os was able to continue\n
▪ cost savings in established production areas more than offset increases in the price of services and materialsMean definitionε0Santos ’ cost : base rose as production from new developments and acquisitions were added to the Company ’ s expanding portfolio of producing assets.
0.465Table4030
zo32710
", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What the name of the first bridge buildt over Danube ?", + "target_page": 16, + "target_passage": "he Chain Bridge was the first bridge over the Danube", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**RIVER TYNE BRIDGES, Newcastle**\n\nSix bridges dominate the Tyne between Newcastle \n\nand Gateshead, enabling innovative railway and \n\nroadway advances over the past two centuries. At \n\nthe time of its completion in 1929, the Tyne Bridge \n\nwas the world’s longest single span bridge.", + "page_start": 27, + "page_end": 27, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**B R O O K LYN BRIDGE, New Yo r k**\n\nThe Brooklyn Bridge, proudly standing over the East River and \n\nconnecting the boroughs of Brooklyn and Manhattan, endures as \n\none of the most famous bridges in America. When completed in \n\nMay 1883, the 5989-foot-long Brooklyn Bridge was the largest \n\nsuspension bridge in the world.", + "page_start": 28, + "page_end": 28, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "**19th century and modern city**\n\nOpéra Nouvel (1831), renovated in 1993 by Jean Nouvel \nThéâtre des Célestins (1877), designed by Gaspard André \nBasilica of Notre-Dame de Fourvière, large 19th-century basilica on the top of Fourvière Hill \nTour métallique de Fourvière (1894) \nVacherie du Parc (1904-1905), designed by Tony Garnier. \n*La Mouche*Cattle Market and Abattoir (1914, 1928), also by Garnier", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia4.pdf" + }, + { + "text": "c \n1.00 \nDenmark_EVA(3) Funen_VA(12) \n\ny \nr \nt \ns \ne \nc \nn \na \nd \ne \nt \na \ne \nr \n- \nl \na \nt \nn \ne \nn \ni \nt \nn \no \nC \n\n1 1 2 2 1 \n0.75 \n1.0 \n\nn \no \ni \nt \nr \no \np \no \nr \np \ny \nr \nt \ns \ne \nc \nn \nA \n\n0.5 \n0.50 \nl \n0 \n1 \n3 2 \n3 \n. . \n1.0 \n0.25 \n0.5 \n0 \n0 \n7 \n1 7 \n5 \n1 \n. \n7 \n1 \n. \n1 \n6 \n. . \n\nScandinavian Peninsula Central Europe \n\nAnatolia EBA \nAustria_Klosterneuburg_Roman \nBaiuvarii_EMED \nBritain.lronRoman \nCentraIEurope.lronRoman(l) \nCentraIEurope.lronRoman(lI) \nCentraIEurope.IronRoman(lII) \nCordedWare_EBA \nCroatia.lronRoman_oNorthEurope \nDenmark_BA \nDenmark_EVA \nDenmark_IA \nEngland_Saxon_highCNE \nEngland_Saxon_lowCNE \nEngland_Saxon_midCNE \nEngland.Roman.Gladiator.Scandinavia \nHungary_EM(I) \nHungary_EM(II) \nHungarySlovakia.lronRoman \nAll SNPs \nIrelandOrkney_BA \nItaly.lmperial(l) \nltaly.lmperial(lI) \nltaly.lronRepublic \nTwigstats 1,000 \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_EMED(I) \nLongobard_EMED(II) \nMontenegro_EM \nNetherlands_Friesland_Saxon \nPoland_BA \nFaroes \nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \n\nIreland \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nIsle of Man \nPoland_Wielbark(III) \n\nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nOrkney_VA \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \n\nSlovakia_Zohor_Germanic_Roman \nSlovakia.MigrationPeriod \nSlovenia.lronRoman \nOxford_VA Slovenia.Roman.oNorthEurope \n\nb \n50 \n\ns \nt \nn \nu \no \nc \nm \na \nr \ng \no \nt \ns \nh \n\n40 \n\n30 \ni \n\ne \np \no \nt \no \ns \n20 \n\n10 \ni \n\ne \nb \na \nt \nS \nl \n0 \n0 \n0.74 0.71 0.72 0.73 \n87Srf/86Sr \n\nd \n\n70.5 \n67.5 \n64.5 \n61.5 \n58.5 \n55.5 \ne \nd \nu \nt \ni \nt \na \nL \n\n0.75 1.00 0.25 0.50 \n0 \n\ne \nNorway_VA \nScandinavian Peninsula EIA \n\nBritain \n\nCentral \nEurope \n\n0.75 1.00 0.75 1.00 0.25 0.50 0.25 0.50 \n0 0 \n\nProportion of ancestry \n\nSweden_VA \nScandinavian Peninsula EIA \n\nBritain \nEastern Europe Eastern Europe \nCentral \nEurope \n\n**Fig. 4 | Ancestry in the Viking world. a**, Map showing ancestry carried by \nScandinavian Viking Age individuals as inferred using the best-fitting qpAdm \nmodel. These are chosen by either choosing the one-source model with largest \n*P*value and*P*> 0.01 or the two-source model with the largest*P*value and*P*> 0.01. \nExtended Data Fig. 7 shows the same map with all accepted models.**b**, Stable \nisotope data indicating the geology of childhood origin. The histogram shows \nthe ratio of strontium isotopes 87 to 86 measured in 109 individuals in Öland69. \nFor individuals included in our ancestry modelling, we plot Iron Age central \nEuropean-related ancestry against their stable isotope values (grey circles, \n*r*= −0.39,*P*= 0.075). Shared area corresponds to the 95% confidence band around the regression line.**c**, The ancestry shift observed in Viking Age Danish \ngroups using qpAdm on all SNPs or Twigstats. We show the best one-source and \nall two-source models with*P*> 0.05. For models with*P*< 0.05, the −log10[*P*value] \nis shown under the plot. Sample sizes for each group are shown in brackets. \n**d**, The ancestry proportion across Viking Age individuals in Denmark, Sweden \nand Norway grouped by latitude.**e**, Viking Age genetic variation (grey circles) \nvisualized on the same MDS as in Fig. 2a,b.**f**, The best-fitting qpAdm ancestry \nmodel for far-flung Viking individuals. Detailed models for all individuals are \nshown in Extended Data Figs. 9 and 10. In**c**and**f**, we show one s.e. Rotating \nqpAdm sources are marked in bold in the key.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "**High-resolution genomic history of early**\n**medieval Europe**\n\n**Leo Speidel1,2,3**✉**, Marina Silva1, Thomas Booth1, Ben Raffield4, Kyriaki Anastasiadou1,**\n**Christopher Barrington5, Anders Götherström6,7, Peter Heather8 & Pontus Skoglund1**✉ \nhttps://doi.org/10.1038/s41586-024-08275-2 \n\nReceived: 14 December 2023 \n\nAccepted: 23 October 2024 \n\nPublished online: 1 January 2025 \n\nOpen access \n\n Check for updates \n\nMany known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. \n\nAncient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + }, + { + "text": "TYPlChL L&i. PER kT. OF ‘SPAN ’ \nLIFT DISTRIBUTION", + "page_start": 92, + "page_end": 92, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**B R I D G E O F D R E A M S**\n\nIf you can dream it, build it. \n\nJust as bridges shape the skylines of the world‘s New types of bridges - electronic bridges - \n\ncities, they also still deeply influence our are emerging to link consumers with these \n\ncultures, our commerce and our lives. Today, services in innovative ways that redefine the \n\nconsumers are demanding greater convenience, financial transactions process. Now as we \n\npersonalized transactions, up-to-the-minute face a world constantly on the go, our mission \n\ninformation and privacy as never before through is to create and implement flexible, secure \n\nthe Internet, wireless access and other exciting solutions to connect people with their \n\nnew technologies. personal information.", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "1,600,000 m2 (17,222,256.67 sq ft) of office space and services and more than 55,000 jobs.[48]*Cité Internationale*, created \nby the architect Renzo Piano is located in the border of the Parc de la Tête d'Or in the 6th arrondissement. The worldwide \nheadquarters of Interpol is located there. The district of*Confluence*, in the south of the historic centre, is a new pole of \neconomical and cultural development. \n\nTourism is an important part of the Lyon economy, with one billion euros in 2007 and 3.5 million hotel-nights in 2006 \nprovided by non-residents. Approximately 60% of tourists visit for business, with the rest for leisure. In January 2009, Lyon \nranked first in France for hostels business. The festivals most important for attracting tourists are the*Fête des lumières*, the \n*Nuits de Fourvière*every summer, the*Biennale d'art contemporain*and the*Nuits Sonores*. \n\n**Culture**\n\nSince the Middle Ages, the region residents have spoken several dialects of Franco- \nProvençal. The Lyonnais dialect was replaced by the French language as the \nimportance of the city grew. However some \"frenchified\" Franco-Provençal words \ncan also be heard in the French of the Lyonnais, who call their little boys and girls \n\"gones\" and \"fenottes\" for example.[49] \n\n\n\nThe Lumière brothers pioneered cinema in the town in 1895. The Institut \nLumière, built as Auguste Lumiere's house, and a fascinating piece of \narchitecture in its own right, holds many of their first inventions and other \nearly cinematic and photographic artifacts. \n8 December each year is marked by the Festival of Lights (la Fête des \nlumières), a celebration of thanks to the Virgin Mary, who purportedly \nsaved the city from a deadly plague in the Middle Ages. During the event, \nthe local population places candles (*luminions*) at their windows and the city of Lyon organizes large-scale \nlight shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean. \nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting \naudiences from around the world. \nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house \nwas re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named \nafter him. \nLyon is also the French capital of \"*trompe l'œil*\" walls, a very ancient tradition. Many are to be seen around the \ncity. This old tradition is now finding a contemporary expression, for example in the art of Guillaume \nBottazzi.[50][51] \nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North \nAmerica, was founded in Lyon in 1821. \nThe African Museum of Lyon is one of the oldest museums situated in Lyon.[52] \nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance \nmovement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the \nFrench resistance and many members were shot in Place Bellecour in the town centre. The exhibition is \nlargely a series of , mini-biographies of those involved. \nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program. \n\nGuignol, created in the early 19th \nC., associated with the silk-workers \n\n**UNESCO World Heritage Site**\n\nThe historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the \n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and \nstrategic significance.\"[37] The specific regions comprising the historic site include the Roman district and Fourvière, the \nRenaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture \nfrom the 12th century to modern times.[53]", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", + "target_page": 17, + "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "In April 2000 the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common shares of the \nC o m p a n y. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 share s \ntook place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt from registration under the \nexemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of pro c e e d s \nto the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in \nthe private placement, the purchaser was issued one warrant to purchase a share of Euronet common stock at a weighted average exercise price of \n$12.50, expiring in each case on the one year anniversary date of the subscription agreement. \n\nIn July 2000 the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. These agre e m e n t s \nw e re signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and \nRegulation D of the Act. Closing with respect to such sale took place on July 14 and August 29, 2000. The purchase price of each share was \n$6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million. \n\nThe Company leases many of its ATMs under capital lease arrangements that expire between 2001 and 2005. The leases bear interest between \n8% and 12% per annum. As of December 31, 2000 the Company owed $11.5 million under such capital lease arrangements. (See Note 15 to the \nConsolidated Financial Statements - Leases.) \n\nThe Company expects that its capital re q u i rements will continue in the future but will not be as great as they were in the past, as the Company \nintends to continue to promote its outsourcing capabilities and re-deploy under- p e rf o rming ATMs currently operating in the network. This \nstrategy should reduce the Company’s reliance on capital expenditures in the future as the business continues to gro w. Fixed asset purchases and \ncapital lease payments for 2001 are expected to be approximately $6.2 million in the Company’s existing markets, notably We s t e rn and Central \nE u rope. Acquisitions of related ATM business and investments in new markets in furtherance of the Company’s strategy may re q u i re additional \ncapital expenditures. \n\nBased on the Company’s current business plan and financial projections, the Company expects to continue to reduce operating losses and net cash \nused in operating activities in 2001. In the Network Services Segment, the Company anticipates that increased transaction levels in its AT M \nnetwork will result in additional revenues without a corresponding increase in expenses. In addition, the Company expects to further expand its \nATM outsourcing services and offer new value-added services, which will provide continued revenue growth without significantly increasing dire c t \noperating expenses or capital investments. In the Software Solutions Segment, the Company expects that the benefits of a re s t ructuring pro g r a m \ncommenced in the first quarter of 2001 will reduce the operating losses and bring operating costs more in line with anticipated revenues. The \nCompany believes that the credit facility, certain asset sales and cash and cash equivalents will provide the Company with sufficient capital until it \nachieves positive cash flow. As a result, the Company believes it has sufficient liquidity re s o u rces to meet current and future cash re q u i rements. \n\nBA L A N C E SH E E T IT E M S", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Comparison of Results of Operations for the Years Ended December 31, 2000, 1999 and 1998**\n\n**Annual Consolidated Revenues**\n27% increase for full year \n2000 over 1999 \n**5 2 . 7**\n\n**4 1 . 5**\n\n**Revenues**The Company’s total revenues increased to $52.7 million for the year ended December \n31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year \nended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two \nfactors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the \ni n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s \noperated by the Company during this period; and (2) an increase of $800,000 in Software Solutions \nSegment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a \n$15.0 million increase in Network Services Segment revenues resulting from the increase in \ntransaction volume attributable to an increase in the number of ATMs operated by the Company \nduring this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s . \nRevenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment \nResults of Operations sections below. \n\n**1 1 . 9**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**\n\n**Operating Expenses**Total operating expenses increased to $88.1 million for the year ended \nDecember 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 \nmillion for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down \nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network \noperations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in \npersonnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The \ni n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, \n(2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment \noperating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of \nOperations sections below. \n\n**1995 1996 1997 1998 1999 2000**\n\n**Operating Loss**The Company generated an operating loss of $35.4 million for the year ended December 31, 2000 compared to $26.8 million \nfor the year ended December 31, 1999 and $22.6 million for the year ended December 31, 1998. The increased operating loss from 1999 to 2000 \nis due to the net effect of three factors: (1) a $6.8 million decrease in the operating loss from the Company’s Network Services Segment; (2) a \n$14.3 million increase in the operating loss from the Company’s Software Solutions Segment; and (3) a $1.1 million increase in the operating loss \nf rom the Company’s Corporate Services Segment. The increased operating loss from 1998 to 1999 is due to the net effect of three factors: (1) a \n$1.9 million decrease in operating losses from the Company’s Network Services Segment; (2) the addition of $4.8 million in operating losses fro m \nthe Company’s Software Solutions Segment; and (3) a $1.3 million increase in operating losses from the Company’s Corporate Services Segment.", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Operating Loss**The total Network Services Segment operating loss decreased to $6.1 million for the year ended December 31, 2000 from $12.9 \nmillion for the year ended December 31, 1999, an improvement of 53%, as a result of the factors discussed above. The Central European Sub- \nsegment re c o rded an operating loss of $3.1 million for the year ended December 31, 2000 compared to a loss of $8.0 million for the year ended \nDecember 30, 1999, an improvement of 61%, as a result of the factors discussed above. The We s t e rn European Sub-segment operating loss \nd e c reased to $2.3 million for year ended December 31, 2000 compared to a loss of $3.8 million for the year ended December 31, 1999, an \ni m p rovement of 39%, as a result of the factors discussed above. The Other ATM Operations Sub-segment incurred an operating loss of $700,000 \nfor the year ended December 31, 2000 compared to a loss of $1.0 million for the year ended December 31, 1999, an improvement of 30%, as a \nresult of the factors discussed above. \n\nSoftware Solutions Segment \n\n**Software Solutions Revenue**Revenues from the Software Solutions Segment totaled $16.0 million before inter-segment eliminations for the \nyear ended December 31, 2000 as compared to revenue of $15.1 for the year ended December 31, 1999. Software revenues are grouped into four \nb road categories: software license fees, professional service fees, maintenance fees and hard w a re sales. Software license fees are the initial fees \nc h a rged by the Company for the licensing of its pro p r i e t a ry application software to customers. Professional service fees are charged for \ncustomization, installation and consulting services provided to customers. Software maintenance fees are the ongoing fees charged to customers \nfor the maintenance of the software products. Hard w a re sales revenues are derived from the sale of computer products and are re p o rted net of \ncost of sales. The components of software solutions revenue for the years ended December 31, 2000 and 1999 were: \n\n\n \n \n \n \n [html]( in thousonols )Years ending December 31,20001999\n
Software license fees$+, 11782.430
Professional service fees6.8678.298
Maintenance fees4.487+. 051
Hardware sales535370
Total direct operating expenses$16.006815.149
\n\nThe increases in software license fees from 1999 to 2000 can be attributed to an increased number of software sales contracts signed in 2000 as \nc o m p a red to 1999, primarily in the first half of the year 2000. Sales of the Company’s core software products have dropped off substantially in \nthe third and fourth quarter of 2000 and are expected to be soft again during 2001. The Company believes that revenues of the Software \nSolutions Segment will increasingly be derived from the Company’s new set of software solutions, including its wireless banking solutions. \nThe decreases in professional service fees from 1999 to 2000 can be attributed to increased efficiency in the installation of software.", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Network operating costs were $33.6 million, an increase of $1.1 million or 3.4%. The largest item in network \noperating costs is travel expense. These costs made up 31.8% and 32.9% of the total network and other costs in 2003 \nand 2002, respectively. Travel expense is the cost of minutes used by the Company’s PCS subscribers on Sprint or \nother Sprint Affiliates’ networks. Travel expense in 2003 was $10.8 million, an increase of $0.1 million due to a \nsignificant increase in travel minutes in 2003 which was offset by the impact of the rate decline. The travel rate \ndeclined from $0.10 per minute in 2002 to $0.058 per minute in 2003. Our PCS customers increased their average \nmonthly travel minutes by 22% compared to 2002. In 2002, the average customer’s travel usage was 130 minutes per \nmonth and in 2003 that average travel usage increased to 159 minutes per month. \n\nNetwork infrastructure maintenance costs were $4.9 million or 14.6% of total network operating costs, a decrease of \n$0.2 million from 2002. Rent for towers, tower sites, and buildings increased $0.9 million or 27.3% to $4.2 million. \nLease escalators plus the increase in the number of sites leased contributed to the increase. Line costs in 2003 were \n$9.8 million or 29.1% of the network operating costs, an increase of $0.1 million. \n\nDepreciation and amortization expense was $16.6 million, an increase of $2.1 million or 14.8%. The PCS operation had \ndepreciation expense of $10.2 million, an increase of $1.6 million or 18.9%. The 16 additional PCS base stations placed \nin service during 2003 resulted in higher depreciation expense for the year. In the telephone operation, depreciation", + "page_start": 48, + "page_end": 48, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "increased $0.5 million or 12.7%, due to new assets deployed in the operation. There was no amortization of goodwill in \n2003 or 2002, compared to goodwill amortization of $360 thousand expensed in 2001, due to the required accounting \nchange. \n\nSelling, general and administrative expenses were $26.0 million, down $0.1 million or 0.4%. Customer support costs \nwere $8.7 million, an increase of $0.9 million or 11.4%. The growth in Sprint wireless subscribers is primarily \nresponsible for this change. Advertising expense was $4.6 million, an increase of $0.3 million or 6.4%. The change is \nprimarily due to increased marketing efforts in support of the PCS operations in both the Quad State and Central Penn \nmarkets. PCS sales staff expenses were $2.8 million, an increase of $0.1 million or 1.5% compared to 2002. Other \nsales staff expenses increased $0.3 million to $1.3 million as the Company worked to expand its other services in areas \noutside its historically defined service area. Bad debt expense decreased $2.6 million or 58.3%. \n\nAdministrative expenses increased $1.0 million or 17.1%. This increase is a result of increased professional fees, \ninsurance and pension costs. During 2003, the Company added several positions to expand the management team to \nsupport the Company’s growing operations. \n\nBad debt expense decreased $2.6 million to $1.8 million or 58.3%. This decrease was due to more restrictive credit \nterms for new PCS subscribers (limiting the high credit risk customers who obtained service), lower churn in the PCS \noperation and improvement in the interexchange carrier segment of the business. This expense is net of normal \nrecoveries and includes a recovery of $0.2 million for an interexchange carrier settlement the Company received in \n2003 which was written off in 2002. \n\nOperating income grew to $18.6 million, an increase of $9.3 million or 100%. Revenue growth, primarily in the PCS \noperation in addition to the reduced bad debt expenses, adjustments of management estimates, and the settlement of \ndisputed items with Sprint, all contributed to the operating income improvements. The Company’s operating margin \nwas 17.6%, compared to 10.0% in 2002. \n\nOther income (expense) is comprised of non-operating income and expenses, interest expense and gain or loss on \ninvestments. Collectively, the net impact of these items to pre-tax income was an expense of $3.6 million for 2003, \ncompared to expense of $14.3 million from 2002. The 2002 results were primarily the results of the previously \ndisclosed $9.0 million loss recorded on the sale of the VeriSign stock. \n\nInterest expense was $3.5 million, a decrease of $0.7 million or 16.3%. The Company’s average debt outstanding \ndecreased approximately $4.8 million. Long-term debt (inclusive of current maturities), was $43.3 million at year-end \n2003, versus $52.0 million at year-end 2002. The Company did not borrow any money on its revolving facilities in \n2003. \n\nNet losses on investments were $0.4 million, compared to a loss of $10.1 million from 2002. Results in 2002 include \nthe sale of the VeriSign, Inc. stock for a loss of $9.0 million. See Note 3 to the consolidated financial statements. \n\nNon-operating income was a gain of $0.4 million, an increase of $0.5 million, due to an increase in patronage equity \nearned from CoBank, the Company’s primary lender, and due to interest income from the proceeds on the sale of the \nVirginia 10 RSA Limited partnership, offset by losses recorded for the Company’s portfolio of investments.", + "page_start": 49, + "page_end": 49, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "increased again on July 1, 2002 to $6.50, and comparable rate increases also impacted business subscribers. Tied to the \nSLC rate increases were declines in rates charged to interexchange carriers for interstate minutes of use. The 2002 \nresults reflect a significantly larger increase in network usage, which more than offset the decline in rates. \n\nFacility lease revenue contributed $5.7 million to wireline revenues, a decrease of $0.8 million or 12.6% from 2001. \nThe decrease was primarily the result of declining lease rates associated with competitive pricing pressure, and the \neconomic downturn in the telecommunications industry. \n\nBilling and collection services contributed $0.4 million to wireline revenues, which was the same as 2001 results. \nRevenues from this service had declined in recent years, with interexchange carriers now issuing a greater proportion \nof their bills directly to their customers. \n\nWireline revenues from cable television services were $4.3 million, an increase of $0.5 million or 14.5%. In December \n2001, the Company increased its basic service charge by $6.00 per month, which produced $0.3 million of the increase \nin cable television revenue. The remaining $0.2 million was generated by an increased penetration of digital services \nand increased pay per view sales. \n\nWithin other revenues, Internet and 511Virginia contract revenues from the Virginia Department of Transportation, \nwere $5.1 million in 2002, an increase of $1.2 million or 30.4%. The Company had 18,050 dial-up Internet subscribers \nat December 31, 2002, compared to 17,423 subscribers at the end of 2001. Total Internet service revenue was $4.2 \nmillion, an increase of $0.6 million or 15.7%. Services provided under the 511Virginia contract contributed $0.9 \nmillion to other revenues, an increase of $0.6 million. Telecommunications equipment sales, services and lease \nrevenues were $1.2 million, a nominal increase over 2001 results. \n\nTotal operating expenses were $83.6 million, an increase of $21.3 million or 34.3%. The continued growth in the PCS \noperation was principally responsible for the change. \n\nCost of goods and services was $10.5 million, an increase of $3.1 million or 41.8%. The PCS cost of goods sold was \n$8.3 million, an increase of $2.8 million or 50.2%. This change is due primarily to higher volumes of handsets sold \nthrough Company owned stores and PCS handset subsidies paid to third-party retailers. The cable television \nprogramming (cost of service) expense was $1.4 million, an increase of $0.1 million or 4.6%. The other cost of goods \nsold increased $0.3 million, compared to the same period in 2001. \n\nNetwork operating costs were $32.5 million, an increase of $5.8 million or 21.5%. Line and switching costs were $9.7 \nmillion, an increase of $2.6 million or 37.4%, due principally to the impact of the expanded PCS network. Travel \nexpense, generated by the Company’s PCS subscribers’ use of minutes on other providers’ portions of the Sprint \nwireless network, was $10.7 million, an increase of $0.9 million or 8.4%. The increase in customer travel usage more \nthan offset the travel rate explained above in travel revenue. Plant specific costs were $9.6 million, which include the \noperation, and maintenance of the networks increased $2.3 million or 30.7%. Tower, building, and land rentals, as well \nas PCS equipment maintenance, were major contributors to the increase in plant specific expenses. Other network \ncosts such as power, network administration, and engineering, were $2.7 million, the same as in 2001. \n\nDepreciation and amortization expense was $14.5 million, an increase of $3.2 million or 28.6%. The PCS operation had \ndepreciation expense of $8.6 million, an increase of $3.6 million or 72.7%. The PCS operation added 53 additional base \nstations during 2002.", + "page_start": 51, + "page_end": 51, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**\n\n\n\n\n\n**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$7.3 billion \n\n**3. 2**\nPOSTPAID VOICE**46%**\n\n$7.3 \nDATA**44%**\n**3.1**\nBILLION \n\nEQUIPMENT**7%**\nPREPAID VOICE**3%**\n**3.0**", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "*Higher Cable Telephony Revenue and Growing Subscriber Base*\nPhone revenue was 4% higher in 2013, compared to last year, the net \nresult of: \n(cid:129) higher phone subscriber base \n(cid:129) partially offset by higher promotional pricing activity. \n\n(cid:129) the cost of programming \n(cid:129) all other expenses involved in day-to-day operations, to service \nexisting subscriber relationships and attract new subscribers. \n\nOverall operating expenses increased slightly this year compared to last \nyear mainly due to: \n(cid:129) operating expenses generated by Mountain Cable which we acquired \n\nPhone subscribers grew 7% in 2013, compared to last year and represent: \n(cid:129) 54% of our television subscribers, compared to 49% last year \n(cid:129) 29% of the homes passed by our cable network, compared to 28% \nearlier this year \n\n(cid:129) higher investments in customer care and network \n(cid:129) partially offset by savings from improvements in our cost structure last year. \nand productivity and lower subscriber additions. \n\n*Lower Equipment Sales*\nEquipment sales include revenues generated from the sale of digital \ncable set-top terminals and Internet modems. \n\nLower equipment revenue this year compared to 2012 reflects the \nreduction of cable boxes sales versus rentals. \n\n**Higher Adjusted Operating Profit**\nAdjusted operating profit was 7% higher this year mainly the net result \nof higher service revenue, partially offset by higher operating expenses. \nThe increase in the adjusted operating profit margin reflects a \ncontinued shift in product mix to the higher margin Internet and phone \nproducts combined with efficiency gains. This increased our adjusted \noperating profit margin to 49.4%, compared to 47.8% in 2012. \n\n**Discontinued Operations**\nIn 2012, we closed our Video store operations, which offered DVD and \nvideo game rentals of equipment and sales in many of our corporate- \nowned retail locations. The results of the Video business were treated as \ndiscontinued operations for accounting and reporting purposes. See \n“Review of Consolidated Performance”. \nExcluding the results of Mountain Cable which we acquired in the \nsecond quarter of 2013: \n(cid:129) revenue would have been 2% higher this year compared to last year, \ninstead of 3% higher as reported \n(cid:129) adjusted operating profit would have been 5% higher this year \n\n**Higher Operating Expenses**\nWe assess Cable operating expenses in three categories: \n(cid:129) the cost of equipment sales (cable digital set-top box and Internet \n\ncompared to last year, instead of 7% higher as reported. \n\nmodem equipment) \n\n**CABLE TELEPHONY SUBSCRIBERS AND CABLE TELEPHONY**\n**PENETRATION OF HOMES PASSED %** **CABLE ADJUSTED OPERATING PROFIT**\n**AND CABLE ADJUSTED PROFIT MARGIN %** (IN THOUSANDS) (IN MILLIONS OF DOLLARS) \n\n**2013** **1,153** **2013** **$1,718** **29%** **49.4%**\n\n2012 1,074 2012 $1,605 28% 47.8% \n\n2011 1,052 2011 $1,549 28% 46.8%", + "page_start": 47, + "page_end": 47, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**(10) Asset Write Down**\n\nDuring the third quarter of 2000, the Company reduced the carrying value of certain assets in accordance with SFAS No.121. The asset \nwrite-downs totaled $12.0 million, of which $11.2 million related to goodwill and other identifiable intangible assets associated with the \nC o m p a n y ’s acquisition of Arkansas Systems, Inc. (“Euronet USA”) in December 1998. The remaining $800,000 write-down related to the \nC o m p a n y ’s ATM hard w a re inventory acquired associated with the Company's acquisition of the SBK ATM network in Germany and the \nBudapest Bank ATM network in Hungary. \n\nAs a result of the Company’s inability to achieve operating improvements, including software license and service orders for Euronet USA’s \ntraditional core product (ITM) and cost reductions, the Software Solutions Segment continued operating at a loss through the first thre e \nq u a rters of 2000. The Company calculated the expected cash flows of the Company’s Software Solutions Segment, which identified an \ni m p a i rment of its long-lived assets. Accord i n g l y, in the third quarter of 2000, the Company re c o rded an impairment charge based on the \np resent value of expected cash flows of $11.2 million for the write-down of goodwill and other identifiable intangible assets re c o rded upon \nthe acquisition of Euronet USA. The Company considers the rapidly changing business environment surrounding electronic transaction \npayment systems software to be a primary indicator of any potential impairment of goodwill and other identifiable intangible assets related to \nthe Company’s Software Solutions Segment. The Company is in the process of repositioning Euronet USA in the market thro u g h \ndevelopment and release of a new set of products that are independent of Euronet USA’s traditional core product lines, including a new, \np l a t f o rm independent Java based transaction processing software package with wireless banking and messaging modules and a set of mobile \nphone prepaid re c h a rge solutions. It has become apparent, based on market reaction to these new products, that these new products and \nsolutions rather than Euronet USA’s traditional ITM solution will be the primary source of software solutions revenues in the future. \n\nIn order to determine the extent of the asset impairment and the related asset write-down, the Company estimated the discounted cash flows \nof the Software Solutions Segment products and services in determining the fair value of the goodwill and related identifiable intangible \nassets. The Company’s estimate was based on historical results which have shown re c u rring operating losses since acquisition, curre n t \np rojections, and internal earnings targets, net of applicable taxes. The Company’s discounted cash flow analysis indicated that the carry i n g \nvalue of intangible assets related to Euronet USA should be reduced to zero as of September 30, 2000. The net book value of the intangible \nassets prior to the write down was $11.2 million. \n\nThe asset write-down is disclosed as a separate operating expense item in the Company’s Consolidated Statements of Operations and \nC o m p rehensive Loss. \n\nThe Company periodically reviews the re c o rded values of its long-lived assets to determine if future cash flows to be derived from these assets \nwill be sufficient to recover the remaining re c o rded asset values. A portion of the ATM hard w a re assets acquired with the Budapest Bank and \nS e rvice Bank ATM network purchases were deemed technologically inferior relative to the Company’s standards. Specifically, these assets \nw e re not technologically advanced to support the entire current and future set of transactions the Company typically offers to users of its \nATM network. As a result of this analysis, the Company re c o rded a non-cash charge of $800,000 related to a reduction in the carrying value \nof ATM hard w a re, adjusting to its net realizable value. \n\n**(11) Notes Payable**", + "page_start": 35, + "page_end": 35, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "on the Company’s ATM network. In addition, the Company continues to invest in the on-going development of products that were re c e n t l y \ni n t roduced to the market. The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherw i s e \nmarketed increased to $6.7 million for the year ended December 31, 2000 from $3.2 million for the year ended December 31, 1999. Of this total \nf i g u re, $1.0 million and $322,000 were capitalized, as at December 31, 2000 and 1999, re s p e c t i v e l y, in conjunction with the Company’s \naccounting policy requiring the capitalization of development costs on a product by product basis once technological feasibility is established. \nTechnological feasibility of computer software products is established when the Company has completed all planning, designing, coding, and \ntesting activities that are necessary to establish that the product can be produced to meet its design specifications including functions, feature s , \nand technical perf o rmance re q u i rements. \n\n**Operating Loss**The Software Solutions Segment incurred an operating loss of $21.5 million for the year ended December 31, 2000 and $7.1 \nmillion for the year ended December 31, 1999 as a result of the factors discussed above \n\n\n \n \n \n \n [html]( in thousonels )Years ending December 31,20001999\n
Salaries and benefits$3.81383.335
Selling, general and administrative3.8 + 13.270
Depreciation and amortization2081 + 5
Total direct operating expensesS7.862S6.750
\n\n**Non-Operating Results for the Years Ended December 31, 2000 and 1999**\n\n**Interest Income**I n t e rest income decreased to $1.1 million for the year ended December 31, 2000 from $2.0 million for the year ended December \n31, 1999 and from $2.5 million for the year ended December 31, 1998. The decrease is the result of the decrease in investment securities and cash \nas a result of negative cash flow from operations and capital expenditure s . \n\n**Interest Expense**I n t e rest expense decreased to $10.8 million for the year ended December 31, 2000 from $10.9 million for the year ended \nDecember 31, 1999 and increased from $7.8 million for the year ended December 31, 1998. The decrease from 1999 to 2000 is due to exchange \nrate diff e rences as the majority of the debt is denominated in Deutsche Mark. The increase from 1998 to 1999 is the result of accretion of the \nC o m p a n y ’s Notes Payable for a full year in 1999 in comparison to 6 months’ accretion in 1998.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", + "target_page": 24, + "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**(10) Asset Write Down**\n\nDuring the third quarter of 2000, the Company reduced the carrying value of certain assets in accordance with SFAS No.121. The asset \nwrite-downs totaled $12.0 million, of which $11.2 million related to goodwill and other identifiable intangible assets associated with the \nC o m p a n y ’s acquisition of Arkansas Systems, Inc. (“Euronet USA”) in December 1998. The remaining $800,000 write-down related to the \nC o m p a n y ’s ATM hard w a re inventory acquired associated with the Company's acquisition of the SBK ATM network in Germany and the \nBudapest Bank ATM network in Hungary. \n\nAs a result of the Company’s inability to achieve operating improvements, including software license and service orders for Euronet USA’s \ntraditional core product (ITM) and cost reductions, the Software Solutions Segment continued operating at a loss through the first thre e \nq u a rters of 2000. The Company calculated the expected cash flows of the Company’s Software Solutions Segment, which identified an \ni m p a i rment of its long-lived assets. Accord i n g l y, in the third quarter of 2000, the Company re c o rded an impairment charge based on the \np resent value of expected cash flows of $11.2 million for the write-down of goodwill and other identifiable intangible assets re c o rded upon \nthe acquisition of Euronet USA. The Company considers the rapidly changing business environment surrounding electronic transaction \npayment systems software to be a primary indicator of any potential impairment of goodwill and other identifiable intangible assets related to \nthe Company’s Software Solutions Segment. The Company is in the process of repositioning Euronet USA in the market thro u g h \ndevelopment and release of a new set of products that are independent of Euronet USA’s traditional core product lines, including a new, \np l a t f o rm independent Java based transaction processing software package with wireless banking and messaging modules and a set of mobile \nphone prepaid re c h a rge solutions. It has become apparent, based on market reaction to these new products, that these new products and \nsolutions rather than Euronet USA’s traditional ITM solution will be the primary source of software solutions revenues in the future. \n\nIn order to determine the extent of the asset impairment and the related asset write-down, the Company estimated the discounted cash flows \nof the Software Solutions Segment products and services in determining the fair value of the goodwill and related identifiable intangible \nassets. The Company’s estimate was based on historical results which have shown re c u rring operating losses since acquisition, curre n t \np rojections, and internal earnings targets, net of applicable taxes. The Company’s discounted cash flow analysis indicated that the carry i n g \nvalue of intangible assets related to Euronet USA should be reduced to zero as of September 30, 2000. The net book value of the intangible \nassets prior to the write down was $11.2 million. \n\nThe asset write-down is disclosed as a separate operating expense item in the Company’s Consolidated Statements of Operations and \nC o m p rehensive Loss. \n\nThe Company periodically reviews the re c o rded values of its long-lived assets to determine if future cash flows to be derived from these assets \nwill be sufficient to recover the remaining re c o rded asset values. A portion of the ATM hard w a re assets acquired with the Budapest Bank and \nS e rvice Bank ATM network purchases were deemed technologically inferior relative to the Company’s standards. Specifically, these assets \nw e re not technologically advanced to support the entire current and future set of transactions the Company typically offers to users of its \nATM network. As a result of this analysis, the Company re c o rded a non-cash charge of $800,000 related to a reduction in the carrying value \nof ATM hard w a re, adjusting to its net realizable value. \n\n**(11) Notes Payable**", + "page_start": 35, + "page_end": 35, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "The subsidiaries of Euronet Services Inc., all of which are, directly or indire c t l y, wholly owned are: \n\n- EFT Services Holding B.V., incorporated in the Netherlands \n- Euronet Banktechnikai Szolgaltato Kft. (“Bank Tech”), incorporated in Hungary \n- Euronet Adminisztracios Szolgaltato Kft. (“Administrative Services”) (formerly SatComNet), incorporated in Hungary \n- Bankomat 24/Euronet Sp. z o.o. (“Bankomat”), incorporated in Poland \n- EFT-Usluge d o.o., incorporated in Croatia \n- Euronet Services GmbH, incorporated in Germany \n- EFT Services France SAS, incorporated in France \n- Euronet Services spol. s.r.o., incorporated in the Czech Republic \n- Euronet Services SRL, incorporated in Romania \n- Euronet Services (UK) Limited, incorporated in the United Kingdom \n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) (“Euronet USA”) incorporated in Arkansas, United States of America \n- EFT Network Services LLC (“Dash”), incorporated in Arkansas, United States of America \n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation) \n- Euronet Eft Services Hellas, incorporated in Greece \n\n**( 2 ) Financial Position and Basis of Preparation**\n\nThe Company generated an operating loss of $35.4 million and negative cash flows from operations of $16.4 million for the year ended \nDecember 31, 2000, primarily due to the significant costs associated with its investment in delivery, support, re s e a rch and development in its \ns o f t w a re subsidiary which was acquired in December 1998. Based on the Company’s current business plan and financial projections, the \nCompany expects to reduce operating losses and net cash used in operating activities in 2001. In the Network Services Segment, the \nCompany anticipates that increased transaction levels in its ATM network will result in additional revenues without a corresponding incre a s e \nin expenses. In addition, the Company expects to further expand its ATM outsourcing services and offer new value-added services, which will \np rovide continued revenue growth without significantly increasing direct operating expenses or capital investments. In the Software Solutions \nSegment, the Company expects reduced operating expenses and improved operating perf o rmance due to a cost re s t ructuring pro g r a m \ni n t roduced in the first quarter of 2001. The Company believes that the credit facility (see note 13), certain asset sales and cash and cash \nequivalents at December 31, 2000 will provide the Company with sufficient cash re s o u rces until it achieves positive cash flow. \n\nBased on the above, management is confident that the Company will be able to continue as a going concern. Accord i n g l y, these consolidated \nfinancial statements have been pre p a red on a going concern basis which contemplates the continuation and expansion of trading activities as \nwell as the realization of assets and liquidation of liabilities in the ord i n a ry course of business. \n\n**( 3 ) S u m m a ry of Significant Accounting Policies and Practices**\n\n(a) Basis of presentation \n\nThe accompanying consolidated financial statements have been pre p a red in accordance with generally accepted accounting principles in \nthe United States of America. \n\nAll significant intercompany balances and transactions have been eliminated. \n\n(b) Foreign currencies \n\nF o reign currency transactions are re c o rded at the exchange rate prevailing on the date of the transactions. Assets and \nliabilitiesdenominated in foreign currencies are re m e a s u red at rates of exchange on the balance sheet date. Resulting gains and losses on \nf o reign currency transactions are included in the consolidated statement of operations and comprehensive loss.", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "In April 2000 the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common shares of the \nC o m p a n y. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 share s \ntook place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt from registration under the \nexemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of pro c e e d s \nto the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in \nthe private placement, the purchaser was issued one warrant to purchase a share of Euronet common stock at a weighted average exercise price of \n$12.50, expiring in each case on the one year anniversary date of the subscription agreement. \n\nIn July 2000 the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. These agre e m e n t s \nw e re signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and \nRegulation D of the Act. Closing with respect to such sale took place on July 14 and August 29, 2000. The purchase price of each share was \n$6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million. \n\nThe Company leases many of its ATMs under capital lease arrangements that expire between 2001 and 2005. The leases bear interest between \n8% and 12% per annum. As of December 31, 2000 the Company owed $11.5 million under such capital lease arrangements. (See Note 15 to the \nConsolidated Financial Statements - Leases.) \n\nThe Company expects that its capital re q u i rements will continue in the future but will not be as great as they were in the past, as the Company \nintends to continue to promote its outsourcing capabilities and re-deploy under- p e rf o rming ATMs currently operating in the network. This \nstrategy should reduce the Company’s reliance on capital expenditures in the future as the business continues to gro w. Fixed asset purchases and \ncapital lease payments for 2001 are expected to be approximately $6.2 million in the Company’s existing markets, notably We s t e rn and Central \nE u rope. Acquisitions of related ATM business and investments in new markets in furtherance of the Company’s strategy may re q u i re additional \ncapital expenditures. \n\nBased on the Company’s current business plan and financial projections, the Company expects to continue to reduce operating losses and net cash \nused in operating activities in 2001. In the Network Services Segment, the Company anticipates that increased transaction levels in its AT M \nnetwork will result in additional revenues without a corresponding increase in expenses. In addition, the Company expects to further expand its \nATM outsourcing services and offer new value-added services, which will provide continued revenue growth without significantly increasing dire c t \noperating expenses or capital investments. In the Software Solutions Segment, the Company expects that the benefits of a re s t ructuring pro g r a m \ncommenced in the first quarter of 2001 will reduce the operating losses and bring operating costs more in line with anticipated revenues. The \nCompany believes that the credit facility, certain asset sales and cash and cash equivalents will provide the Company with sufficient capital until it \nachieves positive cash flow. As a result, the Company believes it has sufficient liquidity re s o u rces to meet current and future cash re q u i rements. \n\nBA L A N C E SH E E T IT E M S", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "The Company re c o rded an $800,000 write-down of certain ATM hard w a re assets associated with the \np u rchase of the Budapest Bank ATM network in May 2000 and the Service Bank ATM network in \nM a rch 1999 (see Note 10 to the Consolidated Financial Statements – Asset Write Down). In addition, \nthe Company re c o rded a one-time gain in its Central European Sub-segment of $1.2 million. The \ngain is related to a change in Hungarian law that eliminates a major portion of the Company’s \nliability for import taxes on ATM hard w a re to the Hungarian government. The gain is included as an \nelement of direct operating costs. \n\n**Network Services: EBITDA**\n**1 . 3**\n\n**0 . 7**\n**0 . 4**\n\n**- 0 . 7**\n\nThe operating expenses for the Central European Sub-segment totaled $21.7 million for the year \nended December 31, 2000 as compared to $20.7 million for the year ended December 31, 1999, an \ni n c rease of 5%. The increase in operating expenses is largely the result of an increase in the number \nof ATMs operated by the Company from 1,203 at December 31, 1999 to 1,391 at December 31, \n2000, and increased transaction volumes. \n\n**Q1 Q2 Q3 Q4**\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year \nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating \nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at \nDecember 31, 2000, and increased transaction volumes. \n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to \n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition \nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities. \n\nD i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with \nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to \n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating \ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, \ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the \noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 \nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a \nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 \nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were:", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**2 0 0 0**\n\n*“In 2000 we took great pride in Euronet’s Fast 500*\n*ranking by Deloitte & Touche as the second fastest*\n*growing technology company in North America.”*\n\nDuring 2000, we failed to meet our revenue target Touche as the second fastest growing technology \n\nfor our software division. In the Fourth Quarter, we company in North America based on our five-year \n\ninitiated the steps necessary to rightsize our revenue growth of 66,790%. \n\nsoftware business and to bring costs in line with \n\nWe’re continuing to build on our recurring revenue \nongoing revenue expectations. However, owning \n\nstream through transaction channels that reinforce \nthis software division gives us control of software \n\nour strengths as an electronic payments processor. \ndevelopment. It also provides the expertise and \n\nToday, we’re expanding the \nflexibility to adapt to emerging \n\n**Annual Consolidated Revenues**\n27% increase for full year \n2000 over 1999 \nreach of our ATM networks, \n**52.7**\ntransaction needs and to bring \n\ndelivering innovative new \n**41.5**\nnew payment solutions quickly \n**n**\n**o**\n**i**\n**l**\n**l**\n**i**\nmobile operator services and \n\n**M**\n**D**\n**S**\n**U**\nto market, which enhances our \n\ntapping the promise of mobile \noutsourcing opportunities. The \n**11.9**\n\ncommerce with an expanding \nsoftware business is very valuable \n\n**5.3**\n\n**1.3**\nsuite of wireless solutions. \n**0.1**\nto Euronet and completes our \n**1995 1996 1997 1998 1999 2000**\nBased on this strong foundation, \nservice offering. We expect it to be a \n\nour future has more potential than ever before. \npositive contributor to our bottom line going forward. \n\nWe’re excited about the possibilities ahead as we \nSince founding Euronet in 1994, we’ve worked \n\ncontinue to form the digital bridges that will \nhard to establish the company as a leader in the \n\nposition Euronet Worldwide as a global leader in \nfield of secure electronic financial transactions and \n\nsecure electronic financial transactions. \nto grow our presence worldwide. So in 2000 we took \n\ngreat pride in Euronet being ranked by Deloitte &", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "In Febru a ry 2000, the Company entered into two subscription agreements for the sale of an aggregate of 650,000 new common shares of the \nC o m p a n y. Closing under these agreements took place on March 13, 2000. These agreements were signed with certain accredited investors in \ntransactions exempt from registration pursuant to the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price \nof each share was $6.615, which re p resents 90% of the average closing price for the ten trading days prior to and including Febru a ry 15, \n2000. The aggregate amount of proceeds to the Company from the private placement was $4.3 million. Under each of the agreements, for \neach two shares of common stock purchased in the private placement, the purchasers were issued one warrant to purchase a share of Euro n e t \ncommon stock at an exercise price of $11.615, expiring in each case on the one year anniversary date of the subscription agreement. \n\n**(13) Credit Facility**\n\nOn June 28, 2000 the Company entered into an unsecured revolving credit agreement (the “Credit Agreement”) providing a facility of up to \n$4.0 million from three shareholders as follows: DST Systems in the amount of $2.4 million; Hungarian-American Enterprise Fund in the \namount of $1.0 million; and Michael J. Brown in the amount of $600,000. The facility was available to be drawn upon until December 28, \n2000, and repayment of any draws was due June 28, 2001. On December 28, 2000 the facility was amended and renewed for a further six \nmonths and is available to be drawn until June 28, 2001 with repayment of any draws being due December 28, 2001. Draws on the facility \nwill accrue interest at 10 percent per annum, payable quart e r l y. A “commitment” fee was paid for the initial facility of 100,000 warr a n t s \nissued pro-rata to the lenders with a warrant strike price set at the average share price, as quoted on NASDAQ for 10 trading days prior to \nthe warrant issue date, less 10 percent. An additional fee of 100,000 warrants, on the same terms, was paid for the subsequent extension of \nthe facility. Wa rrants are to be issued on similar terms and conditions for each draw on the facility at the rate of 80,000 warrants for each \n$1.0 million of funds drawn. As of March 1, 2001, the Company had not made any draws under the Credit Agreement. \n\n**(14) Forward Foreign Exchange Contracts**\n\nOn May 26, 1999, the Company entered into foreign currency call options with Merrill Lynch to purchase Euro 79.3 million for $85.9 \nmillion and foreign currency put options to sell $83.6 million for Euro 79.3 million on May 26, 2000 (the “Settlement Date”). Under such \ncontracts, the Company would be re q u i red to make a cash payment to Merrill Lynch on May 31, 2000, should the Euro weaken against the \nUS Dollar and fall below $1.055 (the “Floor Rate”) on the Settlement Date. At the same time, should the Euro strengthen against the U.S. \ndollar and rise above $1.0835 to the Euro (the “Ceiling Rate”) the Company would receive a cash payment from Merrill Lynch depending \nupon the Euro/Dollar exchange rate on such Settlement Date.", + "page_start": 36, + "page_end": 36, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "1,981,104 \n4,537,787 \n4,196,667 81,794 \n3,808,250 \n3,392,676 51,109 \n1,305,116 \n1,249,110 7,622 \n1,046,753 \n996,529 2,121,629 ¥(2,121,629) \n(2,121,629) \n(2,119,865) \n\n10,697,906 \n9,834,982 \n862,924 56,006 ¥ 50,224 ¥ \n\nGeographical areas \n\nThe geographical segment information for the Company and its consolidated subsidiaries for the years ended March 31, 2005, 2004 and 2003 \nis as follows: \nFiscal year 2004*(For the year ended Mar. 31, 2005)*\n\nOther foreign \ncountries \n*Millions of yen*\nJapan North America Europe \n\nSales to third parties .......................................... ¥2,556,683 ¥3,726,456 ¥1,254,007 ¥1,039,131 ¥ 8,576,277 ¥ \n— ¥8,576,277 \nInter-area sales and transfers .................... \n— \nTotal sales................................................................... \n8,576,277 \nOperating expenses ........................................... \n7,715,117 \nOperating income................................................. ¥ 341,120 ¥ 415,574 ¥ \n¥(1,764) ¥ 861,160 \nTotal assets ............................................................... ¥5,590,397 ¥4,714,272 ¥ 799,778 ¥ 637,065 ¥11,741,512 ¥(1,892,989) ¥9,848,523 \n\n*Thousands of U.S. dollars*\n\n$9,711,503 $ 80,152,121 $ \n\n18,514,991 \n42,409,225 \n39,221,187 764,430 \n35,591,122 \n31,707,252 71,234 \n9,782,737 \n9,313,355 19,828,309 \n99,980,430 \n91,915,719 (19,828,309) \n(19,828,309) \n(19,811,822) \n\n\n \n \n \n \n [html]Fiscal year 2003 ( For the year ended Mer. 31.2004 )Eliminations\n
JapanNorth AmericaEuropeOther foreign countriesTotalConsolidated
Millions of yen
Sales to third parties --------------------------------------------¥ 2.559.806¥ 3.278.966¥ 1.164.032¥ 426.415¥ 7.429.219¥¥ 7.429.219
Inter - area sales and transfers -------------------------------------1.725.49135.38431.6904.6631.797.228( 1.797.228 )Tofal sales ------------------------------------------
4.285.2973.314.3501.195.722431.0789.226.447( 1.797.228 )7.429.219Operating expenses →— ‐– ‐– ‐–––––––––––––3.932.835
2.914.5291.146.549412.9388.406.851( 1.802.487 )6.604.364Operating income --------------------------------------------------------¥ 352.462Y
399.821¥ __49.173¥_18.140¥_819.596Y5.259¥ 824.855Tofal assets -----------------------------------------------¥ 4.805.718
¥fi64.382¥ 607.926¥ 219.109¥ 9.297.135¥( 1.437.279 )¥ 7.859.856
\n\na) As described in Note 2(b), effective April 1, 2003, Nissan Motor Manufacturing (UK) Ltd., a consolidated subsidiary, implemented early \nadoption of a new accounting standard for retirement benefits in the United Kingdom. The effect of this change was to decrease operating \nincome in the “Europe” segment by ¥1,686 million for the year ended March 31, 2004 as compared with the corresponding amount which \nwould have been recorded if the previous method had been followed.", + "page_start": 102, + "page_end": 102, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "guarantees for financial instruments and as deposits with customs officials. The decrease resulted primarily from the settlement of the forw a rd \nf o reign exchange contracts using restricted cash and a release of restricted cash resulting from the posting of a surety bond with the Hungarian \nbanking institution that supplies cash to the Company’s ATM network in Hungary. \n\n**Trade Accounts**Trade accounts receivable increased to $9.5 million at December 31, 2000 from $7.9 million at December 31, 1999 due \nprimarily to sales from the Software Solutions Segment and increased Network Services Segment revenues. \n\n**P r o p e r t y, Plant and Equipment**Net pro p e rt y, plant and equipment decreased to $31.7 million at December 31, 2000 from $36.7 million at \nDecember 31, 1999. This decrease is due primarily to a reduction in the rate of installation of ATMs and fixed asset additions. Fixed asset \nd e p reciation was in excess of fixed asset additions, and the write-off of $800,000 in ATM hard w a re further reduced the net fixed asset position. \n\n**Intangible Assets**The decrease in net intangible assets to $2.6 million at December 31, 2000 from $16.3 million at December 31, 1999 is due \nprimarily to the $11.2 million write-down of goodwill and other identifiable intangible assets associated with the Software Solutions Segment (see \nNote 9 to the Consolidated Financial Statements – Intangibles). In addition, the decrease is the result of amortization of purchased intangibles \na c q u i red in the Euronet USA acquisition in 1998, and the SBK and Dash acquisitions in 1999. \n\n**Current Liabilities**C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e \nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of \nthe forw a rd foreign exchange contracts. \n\n**Capital Lease**Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million \nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M \nnetwork, consisting of 147 ATMs on May 1, 2000. \n\n**Notes Payable**Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of \nseveral transactions as follows: \n\n*(in millions)*\n7 2 . 8. \n(4.4) \n8 . 8. Balance at December 31, 1999 \nU n realized foreign exchange gain (DEM vs. US$) \nA c c retion of bond intere s t \n\n$ \n\nBalance at December 31, 2000 $ 7 7 . 2. \n\n**S t o c k h o l d e r’s Deficit**Stockholders’ deficit increased to $44.8 million at December 31, 2000 from $9.5 million at December 31, 1999. This is \ndue to the net loss for the year ended December 31, 2000 of $49.6 million which was offset by an increase in additional paid in capital of $14.4 \nmillion due to the sale of 1,882,723 shares of common stock for proceeds of $13.0 million, the issue of $400,000 of warrants and the exercise of \n390,231 stock options for proceeds of $900,000. \n\n**Year 2000 Compliance**\n\nThe Company’s European and U.S. Year 2000 compliance teams re p o rted no material Year 2000 problems during the advent of the year 2000, \neither with Euro n e t ’s own systems or the systems of its customers. The Company is unaware of any material Year 2000 complications to date. \n\n**Impact of New Accounting Pronouncements Not Yet Adopted**\n\n**S FAS 133**The Company is re q u i red to adopt Statement of Financial Accounting Standard (SFAS) No. 133 “Accounting for Derivative \nI n s t ruments and Hedging Activities” as amended by SFAS No. 138 for US GAAP re p o rting as of 1 January 2001. SFAS 133 and 138 establish \naccounting and re p o rting standards for derivative instruments, including certain derivative instruments embedded in other contracts (collectively \nre f e rred to as derivatives).", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "In the week of March 13, 2000, the Company entered into put options with Merrill Lynch to sell Euro 79.0 million for $75.1 million on May \n26, 2000. The contracts were purchased to limit the Company's exposure on the call option described above against a fall of the Euro below \n$0.95. \n\nThe Company was re q u i red to cash collateralize the net fair value of such options contracts measured on a mark-to-market basis, and on \nMay 26, 2000, the Company had on deposit $8.3 million with Merrill Lynch. \n\nOn May 26, 2000, the rate of the Euro was $0.9118 and the Company settled the above option contracts in the amount of $8.3 million \nresulting in a total net loss on such contracts of $10.3 million inclusive of the cost of the contracts. At December 31, 2000, the Company had \nnot entered into any further option contracts. \n\n**(15) Leases**\n\n(a) Capital leases \n\nThe Company leases many of its ATMs under capital lease agreements that expire between 2001 and 2005 and bear interest at rates \nbetween 8% and 12%. Lease installments are paid on a monthly, quarterly or semi-annual basis. Euronet has the right to extend the \nt e rm of certain leases at the conclusion of the basic lease period. \n\nThe gross amount of the ATMs and computer equipment and related accumulated amortization re c o rded under capital leases were as \nfollows: December 31, \n2 0 0 0 1 9 9 9 \n*(in thousands)*\n\n1 3 , 9 2 4. \n3 6 6. 1 8 , 0 2 7. \n7 6 8. \n$ $ \n\n1 4 , 2 9 0. \n(3,429) 1 8 , 7 9 5. \n( 4 , 8 1 3 ) \n$ $ \nLess accumulated amort i z a t i o n \n\n1 0 , 8 6 1. 1 3 , 9 8 2. Net book value $ $ \n\nD e p reciation of assets held under capital leases amounted to $2.0 million, $2.1 million, and $2.9 million for the years ended December 31, \n2000, 1999, and 1998, re s p e c t i v e l y, and is included in depreciation and amortization expense. \n\n(b) Operating leases \n\nThe Company also has noncancelable operating rental leases for office space which expire over the next 3 to 9 years. Rent expense under \nthese leases amounted to $1.4 million, $2.1 million, and $1.1 million for the years ended December 31, 2000, 1999, and 1998, \nre s p e c t i v e l y. \n\n(c) Future minimum lease payments \n\nF u t u re minimum lease payments under the capital leases and the noncancelable operating lease (with initial or remaining lease terms in \nexcess of one year) as of December 31, 2000 are: \n\nC a p i t a l \nL e a s e s O p e r a t i n g \nL e a s e s \n*(in thousands)*\n\n5 , 1 3 7. \n4 , 4 7 0. \n2 , 9 5 1. \n1 , 5 1 2. \n3 6 3. \n— . 1 , 3 1 5 \n1 , 0 4 9 \n7 7 9 \n5 1 5 \n5 1 5 \n8 2 \n\n1 4 , 4 3 3. \n( 2 , 9 3 3 ) \n\nYear ending December 31, \n\n2 0 0 1 \n2 0 0 2 \n2 0 0 3 \n2 0 0 4 \n2 0 0 5 \n2006 and there a f t e r \n\nTotal minimum lease payments \nLess amounts re p resenting intere s t \nP resent value of net minimum capital \nlease payments 1 1 , 5 0 0. \nLess current installments of obligations \nunder capital leases ( 3 , 4 6 6 ) \n\nLong term capital lease obligations $ 8 , 0 3 4. .", + "page_start": 37, + "page_end": 37, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "At December 31, 2000 the Company had cash and cash equivalents of $7.2 million and working capital of $3.6 million. The Company had $2.1 \nmillion of restricted cash held as security with respect to cash provided by banks participating in Euro n e t ’s ATM network, to cover guarantees on \nfinancial instruments and as deposits with customs officials (See Note 7 to the Consolidated Financial Statements – Restricted cash). In addition to \nthe assets held on the balance sheet at December 31, 1999 the Company held re p u rchased notes payable with a face value of 48.4 million \nDeutsche Marks ($23.3 million as at December 31, 2000 based on a USD to DM rate of 1:2.08) and a fair market value at December 31, 2000 of \n$9.3 million (See Note 20 to the Consolidated Financial Statements – Financial instruments). \n\nOn June 28, 2000 the Company entered into an unsecured revolving credit agreement (the “Credit Agreement”) providing a facility of up to $4.0 \nmillion from three shareholders as follows: DST Systems in the amount of $2.4 million; Hungarian-American Enterprise Fund in the amount of \n$1.0 million; and Michael J. Brown in the amount of $600,000. The facility was available to be drawn upon until December 28, 2000, with \nrepayment of any draws being due June 28, 2001. On December 28, 2000 the facility was amended and renewed for a further six months and is \navailable to be drawn until June 28, 2001 with repayments of any draws being due December 28, 2001. Draws on the facility will accrue intere s t \nat 10 percent per annum, payable quart e r l y. A “commitment” fee was paid for the initial facility of 100,000 warrants issued pro- rata to the \nlenders with a warrant strike price set at the average share price, as quoted on NASDAQ for 10 trading days prior to the warrant issue date, less \n10 percent. An additional fee of 100,000 warrants, on the same terms, was paid for the subsequent extension of the facility. Wa rrants are to be \nissued on similar terms and conditions for each draw on the facility at the rate of 80,000 warrants for each $1.0 million of funds drawn. As of \nM a rch 1, 2001, the Company had not made any draws under the Credit Agreement. \n\nOn Febru a ry 25, 2000 the Company entered into two subscription agreements for the sale of an aggregate of 650,000 new common shares of the \nC o m p a n y. Closing under those agreements took place on March 13, 2000. These agreements were signed with certain accredited investors in \ntransactions exempt from registration under the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price of each \ns h a re was $6.615, which re p resents ninety percent of the average closing price for the ten trading days prior to and including Febru a ry 15, 2000. \nThe aggregate amount of proceeds to the Company from the private placement was $4.3 million. Under each of the agreements, for each two \ns h a res of common stock purchased in the private placement, the purchasers were issued one warrant to purchase a share of Euronet common \nstock at an exercise price of $11.615, expiring in each case on the one year anniversary date of the subscription agreement.", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "Under which name was the Applied company initially fouded ?", + "target_page": 6, + "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**SHAREHOLDER INFORMATION**\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most \nfinancial listings as “AppliedIndlTch.” \n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**BB&T CAPITAL MARKETS** **KEYBANC CAPITAL MARKETS** **STEPHENS INC.**\nHolden Lewis, 703/471-3894 Jeffrey D. Hammond, 216/689-0236 Matt Duncan, 501/377-3723 \n\n**CJS SECURITIES** **SIDOTI & CO.** **WELLS FARGO SECURITIES, LLC**\nJonathan Tanwanteng, 914/287-7600 Joseph Mondillo, 212/894-3339 Allison Poliniak-Cusic, 212/214-5062 \n\n**CLEVELAND RESEARCH COMPANY** **GREAT LAKES REVIEW – Division of** **WUNDERLICH SECURITIES**\nAdam Uhlman, 216/649-7241 **Wellington Shields & Co.** Brent D. Rakers, 901/251-2236 \nElliott Schlang, 216/767-1340 \n\n**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial \nTechnologies, Inc. shares and all \ncorrespondence regarding address change \ninformation, duplicate mailings, missing \ncertificates, failure to receive dividend \nchecks in a timely manner or to participate \nin the Company’s direct stock purchase \nprogram should be directed to the \nCompany’s transfer agent and registrar: \n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n250 Royall Street \nCanton, MA 02021 \n800/988-5291 \n\n**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. \n\n**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group \n\n(Performance Results from 7/1/2007 through 6/30/2012) \n\nAssumes $100 invested at the close of trading 6/30/07 in \nApplied Industrial Technologies, Inc. common stock, Standard \n& Poor’s 500, and Peer Group. \n\nCumulative total return assumes reinvestment of dividends. \n\nThe returns of the companies in the Peer Group are weighted \nbased on the companies’ relative stock market capitalization. \n\nPeer Group companies selected on a line-of-business basis \ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine \nParts Company; W. W. Grainger, Inc.; Kaman Corporation; \nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and \nWESCO International, Inc.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTE 1: BUSINESS AND ACCOUNTING POLICIES \n\nBusiness \n\nApplied Industrial Technologies, Inc. and subsidiaries (the “Company” or “Applied”) is a leading industrial distributor serving \nMaintenance Repair Operations (MRO) and Original Equipment Manufacturing (OEM) customers in virtually every industry. In \naddition, Applied provides engineering, design and systems integration for industrial and fluid power applications, as well as \ncustomized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory \nmanagement solutions that provide added value to its customers. Although the Company does not generally manufacture the \nproducts it sells, it does assemble and repair certain products and systems. \n\nConsolidation \n\nThe consolidated financial statements include the accounts of Applied Industrial Technologies, Inc. and its subsidiaries. \nIntercompany transactions and balances have been eliminated in consolidation. The financial results of the Company’s Canadian \nand Mexican subsidiaries are included in the consolidated financial statements for the twelve months ended May 31. \n\nStatements of Consolidated Comprehensive Income \n\nAccounting Standards Codification (ASC) Topic 220 \"Comprehensive Income\" requires the reporting of comprehensive income in \naddition to net income. Effective for fiscal 2012 and retrospective for fiscal 2011 and 2010, the Company has elected to include a \n\nstatement of consolidated comprehensive income as part of its basic consolidated financial statements. Prior to inclusion of the \nstatement of consolidated comprehensive income, comprehensive income, other comprehensive income and the components of \nother comprehensive income were reported as part of the statement of consolidated shareholders' equity. \n\nForeign Currency \n\nThe financial statements of the Company’s Canadian and Mexican subsidiaries are measured using local currencies as their \nfunctional currencies. Assets and liabilities are translated into U.S. dollars at current exchange rates, while income and expenses are \ntranslated at average exchange rates. Translation gains and losses are reported in other comprehensive income (loss) in the \nstatements of consolidated comprehensive income. Gains and losses resulting from transactions denominated in foreign currencies \nare included in the statements of consolidated income as a component of other expense (income), net. \n\nEstimates \n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United States of America \nrequires management to make estimates and assumptions that affect the reported amount of assets and liabilities and disclosure of \ncontingent assets and liabilities at the date of the financial statements and the reported amount of revenues and expenses during \nthe period. Actual results may differ from the estimates and assumptions used in preparing the consolidated financial statements. \n\nCash and Cash Equivalents \n\nThe Company considers all short-term, highly liquid investments with maturities of three months or less at the date of purchase to \n\nbe cash equivalents. Cash and cash equivalents are carried at cost, which approximates fair value. \n\nMarketable Securities \n\nThe primary marketable security investments of the Company include money market and mutual funds held in a rabbi trust for a \nnon-qualified compensation plan. These are included in other assets in the consolidated balance sheets, are classified as trading \nsecurities, and reported at fair value based on quoted market prices. Unrealized gains and losses are recorded in other expense \n(income), net in the statements of consolidated income and reflect changes in the fair value of the investments during the period. \n\nConcentration of Credit Risk", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**22. SUBSEQUENT EVENTS**\n\nOn 25 August 2000 the Company announced that it had reached two agreements for the \nplacement of a total of 16,666,666 ordinary fully paid shares in the Company at an issue price of \n30 cents each (Shares). \n\nThe first agreement was with Mr Mark Bradley, who agreed to take a placement of 3,225,000 Shares \nby 29 September 2000, followed by, if approved of by shareholders at the Company’s annual general \nmeeting, a further 3,441,666 within 7 days of that meeting. \n\nOn Mr Bradley being appointed a Director of the Company, in order to comply with the \nrequirements of the Corporations Law and the ASX Listing Rules, the Company and Mr Bradley \nagreed to defer the first issue of Shares, making both issues conditional on shareholder approval. \n\nThe second agreement was with Clough Engineering Limited, pursuant to which it agreed to take a \nplacement of 3,225,000 Shares by 29 September 2000, followed by, if approved of by shareholders \nat the Company’s annual general meeting, 6,775,000 shares, within 7 days of that meeting. \n\nOn 15 June 2000 the Company announced that with effect from 1 July 2000 it acquired a 50% \ninterest in OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Shares in the \nCompany. OIS MOC Joint Venture Pty Ltd owns the goodwill of a successful labour hire company. \nThat company is to be renamed Mermaid Labour and Management Limited (MLML). \n\n**23. EARNINGS PER SHARE**\n\n\n \n \n \n \n [html]\n
2000 Cents per Share1999 Cents per Share
( 0.62 )8.09
( 0.21 )8.05
20001999
No.No.
43.000.00030.356.164
\n\nBasic earnings per share \n\nDiluted earnings per share \n\nWeighted average number of ordinary \nshares on issue used in the calculation \nof basic earnings per share", + "page_start": 56, + "page_end": 56, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "SUBSEQUENT EVENT \nof such inventory by product type while considering factors such \nOn August 1, 2012, the Company acquired SKF's company- \nas its age, historic and current demand trends, the physical \nowned distribution businesses in Australia and New Zealand for \ncondition of the inventory, as well as assumptions regarding \ncash consideration. These businesses will expand Applied's global \nfuture demand. Our ability to recover our cost for slow moving \ncapabilities and are part of the Service Center Based Distribution \nor obsolete inventory can be affected by such factors as general \nsegment. The Company funded the acquisition from its available \nmarket conditions, future customer demand and relationships \ncash and existing revolving credit facilities. Results of operations \nwith suppliers. Most of the products we hold in inventory have \nacquired will be included in the Company's results of operations \nlong shelf lives, are not highly susceptible to obsolescence and \nfrom the date of closing. \nare eligible for return under various supplier return programs. \n\nCRITICAL ACCOUNTING POLICIES \nAllowances for Doubtful Accounts \nThe preparation of financial statements and related disclosures in \nWe evaluate the collectibility of trade accounts receivable based \nconformity with accounting principles generally accepted in the \non a combination of factors. Initially, we estimate an allowance \nUnited States of America requires management to make \nfor doubtful accounts as a percentage of net sales based on \njudgments, assumptions and estimates at a specific point in time \n\nrecognized $34.4 million of net deferred tax assets. This includes a \n\nSelf-Insurance Liabilities $0.2 million valuation allowance recorded related to estimated \n\nlimitations in the deductibility of certain expenses. Management We maintain business insurance programs with significant self- \n\nbelieves that sufficient income will be earned in the future to insured retention covering workers’ compensation, business, \n\nrealize its deferred income tax assets. The realization of these automobile, general product liability and other claims. We accrue \n\ndeferred tax assets can be impacted by changes to tax laws, estimated losses using actuarial calculations, models and \n\nstatutory tax rates and future taxable income levels. assumptions based on historical loss experience. We maintain a \n\nself-insured health benefits plan, which provides medical benefits \n\nto U.S. based employees electing coverage. We maintain a reserve \n\nfor all unpaid medical claims including those incurred but not \n\nreported based on historical experience and other assumptions. \n\n7 \n\nApplied Industrial Technologies, Inc. and Subsidiaries 11", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "OVERVIEW Industrial production increased 0.4% in June after having declined \n\n0.2% in May. In the manufacturing sector, outputs advanced \nWith more than 4,600 associates across North America, Applied \n0.7% in June, reversing a decline of 0.7% in May and increased at \nIndustrial Technologies (“Applied,” the “Company,” “We,” “Us” \nan annual rate of 1.4% in the second quarter. In June, capacity \nor “Our”) is a leading industrial distributor serving MRO and OEM \n\n**Celebrating**\n**90 Years**\n**of Strength in**\n**Distribution**\n\nutilization for manufacturing moved up 0.4% to 77.7%, a rate \ncustomers in virtually every industry. In addition, Applied \n13.9 percentage points above its trough in June of 2009 and was \nprovides engineering, design and systems integration for \nstill 1.1 percentage points below its long-run average. The ISM PMI \nindustrial and fluid power applications, as well as customized \nregistered 49.7 in June, the first time this indicator dropped below \nmechanical, fabricated rubber and fluid power shop services. \n50 (its expansionary threshold) since July 2009. We remain \nApplied also offers maintenance training and inventory \noptimistic about the U.S. industrial economy for our fiscal 2013. \n\nmanagement solutions that provide added value to its customers. \n\nWe have a long tradition of growth dating back to 1923, the year \nYEAR ENDED JUNE 30, 2012 vs. 2011 \nour business was founded in Cleveland, Ohio. At June 30, 2012, \nThe following table is included to aid in review of Applied’s \nbusiness was conducted in the United States, Canada, Mexico \nstatements of consolidated income. \nand Puerto Rico from 476 facilities. \n\nWhen reviewing the discussion and analysis set forth below, \nChange in \nplease note that the majority of SKUs we sell in any given year Year Ended June 30, $'s Versus \nAs a % of Net Sales Prior Period \nwere not sold in the prior year, resulting in the inability to \n\n**2012** 2011 % Increase quantify certain commonly used comparative metrics analyzing \n\nsales, such as changes in product mix and volume. Net Sales **100.0 %**100.0 % 7.3 % \n\nGross Profit **27.6 %** 27.7 % 6.7 % Our fiscal 2012 sales were $2.4 billion, an increase of $162.6 \n\nLong-Range Strategy:*Translating Potential Into Results (continued)*\n\nAs a leadership team, we have developed a long-range strategic plan \n\nto accelerate profitable growth. Our plan includes numerous growth \n\nopportunities across our business, and implementation is underway, including: \n\n• Leveraging sales capabilities and existing CRM (Customer Relationship \n\nManagement) processes to expand our value-add and reach new customers \n\n• Strengthening our position in attractive vertical markets while growing in \n\nour core segments \n\n• Expanding our products and solutions; growing our core bearings and \npower transmission business at a rate greater than the market, along \nwith focused product expansion via logical extensions and enhanced local \ncapabilities \n\n• Building on our fluid power market leadership via strengthened product \n\nofferings and value-added services for OEM and MRO customers \n\n• Enhancing our operational excellence by capturing the full benefits of our \n\nERP system and driving continuous improvement with customers, suppliers \nand throughout our operations \n\n• Accelerating strategic acquisitions by leveraging our cash generation and \n\nstrong financial position to extend into new markets \n\nToday, nearly 90 years since our founding, we are well-positioned and \n\ncommitted to realizing our potential – a potential that builds upon a proud \n\npast and the dedication of our associates around the globe. \n\nmillion or 7.3% compared to the prior year. Net sales from \nSelling, Distribution & Administrative **20.5 %** 20.9 %", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "on the Company’s ATM network. In addition, the Company continues to invest in the on-going development of products that were re c e n t l y \ni n t roduced to the market. The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherw i s e \nmarketed increased to $6.7 million for the year ended December 31, 2000 from $3.2 million for the year ended December 31, 1999. Of this total \nf i g u re, $1.0 million and $322,000 were capitalized, as at December 31, 2000 and 1999, re s p e c t i v e l y, in conjunction with the Company’s \naccounting policy requiring the capitalization of development costs on a product by product basis once technological feasibility is established. \nTechnological feasibility of computer software products is established when the Company has completed all planning, designing, coding, and \ntesting activities that are necessary to establish that the product can be produced to meet its design specifications including functions, feature s , \nand technical perf o rmance re q u i rements. \n\n**Operating Loss**The Software Solutions Segment incurred an operating loss of $21.5 million for the year ended December 31, 2000 and $7.1 \nmillion for the year ended December 31, 1999 as a result of the factors discussed above \n\n\n \n \n \n \n [html]( in thousonels )Years ending December 31,20001999\n
Salaries and benefits$3.81383.335
Selling, general and administrative3.8 + 13.270
Depreciation and amortization2081 + 5
Total direct operating expensesS7.862S6.750
\n\n**Non-Operating Results for the Years Ended December 31, 2000 and 1999**\n\n**Interest Income**I n t e rest income decreased to $1.1 million for the year ended December 31, 2000 from $2.0 million for the year ended December \n31, 1999 and from $2.5 million for the year ended December 31, 1998. The decrease is the result of the decrease in investment securities and cash \nas a result of negative cash flow from operations and capital expenditure s . \n\n**Interest Expense**I n t e rest expense decreased to $10.8 million for the year ended December 31, 2000 from $10.9 million for the year ended \nDecember 31, 1999 and increased from $7.8 million for the year ended December 31, 1998. The decrease from 1999 to 2000 is due to exchange \nrate diff e rences as the majority of the debt is denominated in Deutsche Mark. The increase from 1998 to 1999 is the result of accretion of the \nC o m p a n y ’s Notes Payable for a full year in 1999 in comparison to 6 months’ accretion in 1998.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities \nclosely related or incidental to banking. Bank holding companies were generally prohibited from acquiring control \nof any company which was not a bank and from engaging in any business other than the business of banking or \nmanaging and controlling banks. The Gramm-Leach-Bliley Act, which took effect on March 12, 2000, dismantled \nmany Depression-era restrictions against affiliation between banking, securities and insurance firms by permitting \nbank holding companies to engage in a broader range of financial activities, so long as certain safeguards are \nobserved. Specifically, bank holding companies may elect to become “financial holding companies” that may \naffiliate with securities firms and insurance companies and engage in other activities that are financial in nature or", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "A d d i t i o n s \nc h a rged to \ne x p e n s e A m o u n t s \nwritten off \n*(in thousands)*\n\n$ 2 9 1 $ — \n\n$ 9 0 $ — \n\n$ 4 0 8 $ 4 9 \n\n**(17) Valuation and Qualifying Accounts**\n\nB a l a n c e \nat January 1 Balance at \nDecember 31 \n\n1 9 9 8 \nAllowance for doubtful accounts \n1 9 9 9 \nAllowance for doubtful accounts \n2 0 0 0 \nAllowance for doubtful accounts $ 3 8 1 \n\n**(18) Stock Plans**\n\nThe Company has established a share compensation plan that provides certain employees options to purchase shares of its common stock. \nThe options vest over a period of five years from the date of grant. Options are exercisable during the term of employment or consulting \na rrangements with the Company and its subsidiaries. At December 31, 2000, the Company has authorized options for the purchase of \n6,463,991 shares of common shares, of which 4,584,508 have been awarded to employees and 2,441,928 remain unexercised. \n\nIn accordance with a shareholders’ agreement dated Febru a ry 15, 1996 and amended on October 14, 1996, Euronet re s e rved 2,850,925 \ncommon shares for the purpose of awarding common shares (“milestone awards”) to certain investors and options to acquire common share s \n(“milestone options”) to the founders, management and key employees. The Company granted 800,520 milestone awards at an exerc i s e \nprice of $0.02 per share and 2,050,405 milestone options at an exercise price of $2.14 per share. \n\nUpon the initial public offering of the Company on March 6, 1997, all milestone awards and milestone options granted under the milestone \na rrangement (with the exception of 49,819 options to certain key employees which vested equally over the two years following the initial \npublic offering) vested and all shares became immediately issuable to beneficiaries of milestone awards and options. At that time, 800,520 \nmilestone awards and 232,078 milestone options were exercised. As of December 31, 2000 1,428,303 milestone options remain unexercised. \n\n\n \n \n \n \n [html]Number of Shares( 1.90 +, 365 shares exercisable )GrantedGrantedGranted\n
Balance at December 31.1997
Weighted - Average Exercise Price
2.798.206
82.67941.396
5.87Granted in Arksys acquisition63.410
4.44Exercised( 80.132 )
2.13Forfeited( 100.289 )
6.23Balance at December 31.1996( 2.174,+ 12 shares exercisable )
3.622.591
83.461.140.830
5.02Exercised( 228.503 )
1.46Forfeited( 233.194 )
5.09Balance at December 31.1999( 2.379.729 shares exercisable )
+, 301.724
83.871.237.000
7.24Exercised( 390.231 )
2.43Forfeited( 563.985 )
6.00Balance at December 31.2000( 2,++ 1.923 shares exercisable )
+, 584.508
84.65
", + "page_start": 40, + "page_end": 40, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**MANAGEMENT**’**S REPORT ON INTERNAL CONTROL OVER FINANCIAL REPORTING**\n\nThe Management of Applied Industrial Technologies, Inc. is responsible for establishing and maintaining adequate internal control over \n\n**To the Board of Directors a nd Share holders of A pplied I ndus tria l Tec hnol ogies , Inc.**\n**Clevela nd, Ohio**\nfinancial reporting. Internal control over financial reporting is a process designed by, or under the supervision of, the Chief Executive \nOfficer and the Vice President — Chief Financial Officer & Treasurer, and effected by the Company’s Board of Directors, management \n\nand other personnel, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of consolidated \nfinancial statements for external purposes in accordance with accounting principles generally accepted in the United States of America. \n\nThe Company’s internal control over financial reporting includes those policies and procedures that: (1) pertain to the maintenance of \nrecords that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of the assets of the Company; \n(2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of consolidated financial statements \nin accordance with accounting principles generally accepted in the United States of America and that receipts and expenditures of the \nCompany are being made only in accordance with authorizations of the Company’s Management and Board of Directors; and \n\n(3) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, or disposition of the \n\nWe have audited the accompanying consolidated balance sheets of Applied Industrial Technologies, Inc. and subsidiaries (the \n“Company”) as of June 30, 2012 and 2011, and the related statements of consolidated income, comprehensive income, shareholders’ \nequity, and cash flows for each of the three years in the period ended June 30, 2012. These financial statements are the responsibility \nof the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of \nmaterial misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial \nstatements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as \nevaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opini on. \n\nIn our opinion, such consolidated financial statements present fairly, in all material respects, the financial position of the Company at \nJune 30, 2012 and 2011, and the results of its operations and its cash flows for each of the three years in the period ended June 30, \n2012, in conformity with accounting principles generally accepted in the United States of America. \n\nWe have also audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the \nCompany’s internal control over financial reporting as of June 30, 2012, based on the criteria established in Internal Control — \nIntegrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission, and our report dated \nAugust 15, 2012 expressed an unqualified opinion on the Company’s internal control over financial reporting. \n\nCompany’s assets that could have a material effect on the consolidated financial statements.", + "page_start": 39, + "page_end": 39, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**LETTER TO THE SHAREHOLDERS**\n\n\n\n\n\nMarch 22, 2004 \n\nDear Shareholder: \n\nI am pleased to report on an excellent year for your Company, one in \nwhich we achieved strong financial results and reached several significant \naccomplishments. \n\nOur financial performance was very positive in 2003. For the first time in \n\nour history, revenues exceeded $100 million, reaching a total of $105.9 \nmillion for the year. While revenues increased by $12.9 million, our \noperating expenses only increased by $3.6 million, resulting in a $9.3 million \nimprovement in operating income which reached $18.6 million. Helped by \nthe one-time gain from the sale of our cellular partnership interest, our net \nincome was a record $32.1 million. Our net income from continuing \noperations, which excludes the cellular impact, reached $9.8 million. \n\nWhile the last few years have not been kind to many companies in the \n*Christopher E. French*\n\ntelecommunications industry, your Company has not just survived, it has \nthrived. In addition to the operating results, our balance sheet became even \nstronger. Total debt was again reduced, decreasing by $12.2 million to $43.3 million as of the end of the year. At the \nsame time, our cash and equivalents at the end of the year was $28.7 million, while total assets were $185.4 million. With \nour total long-term debt equaling only 23.4 percent of total assets, your Company's balance sheet is envied in an industry \nwhere many companies have encountered problems just meeting their debt obligations, much less being able to invest in \ntheir future. \n\nAs previously announced, the Company completed the sale of our cellular partnership interest on February 28, 2003. \nWhile our participation in cellular, a subset of the wireless industry, had been very profitable, competitive pressures in the \nwireless industry were having an increasing impact. We had already lost half of our customers, and growth in revenues \nand profits had begun to slow. Exiting the cellular segment through the sale allows the Company to focus on our \nsignificantly larger digital PCS operation. It also made available a large source of cash to finance our other operating \nneeds and future growth opportunities. \n\nOur wireless priorities are now focused on improving results within our PCS operation. After many years of multiple- \nmillion dollar losses, our PCS business produced a slight profit in 2003. While many non-recurring factors contributed to \nthis small profit, the basic operating results within this subsidiary showed significant improvement during 2003. PCS \nrevenues grew 20.8 percent to a total of $67.0 million. Operating income in this subsidiary was $2.9 million, an $8.2 \nmillion change from the previous year's loss. Despite these improvements, we still have a long way to go before we are \nearning a satisfactory return on our investment. \n\nThe Company continued its efforts to successfully grow revenues and profits from other lines of business and by \nfurnishing more and newer services in our enlarged footprint extending beyond Shenandoah County. Revenues from our \ninformation access services, which includes contract work on the 511Virginia Travel Project and Internet access services, \nincreased $0.6 million, to $7.0 million during 2003. The Virginia Department of Transportation has requested proposals \nto continue the 511 project for future years, as well as to expand it to cover all the interstate highways throughout the \nCommonwealth. The success of the project to date has attracted many other bidders competing against our Company to \nwin the contracts. Our recently launched regional phone book, Shentel Pages, exceeded our initial revenue expectations. \nIt is hoped that a single source of phone listings and Yellow Page advertising, in both printed and online versions, will \nincreasingly be demanded by residents and businesses in the northern Shenandoah Valley region.", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", + "target_page": 36, + "target_passage": "2018 through 2022 15,200", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Cash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \n\n\n \n \n \n \n [html]Year Ended June 30.201224.3392.082\n
Service Center Based DistributionFluid Power BusinessesTotal
Net sales$1.904.564$
470.881$2.375.445Operating income for reportable segments
135.24043.236178.476Assets used in the business
731.915230.268962.183Depreciation and amortization of property
9.4031.83311.236Capital expenditures
1.68226.021Year Ended June 30.2011Net sales
$1.770.798$442.051
$2.212.849Operating income for reportable segments115.798
41.793157.591Assets used in the business700.486
214.445914.931Depreciation and amortization of property9.152
11.234Capital expenditures19.3921.039
20.431Year Ended June 30.2010Net sales$
1.536.543$356.665$
1.893.208Operating income for reportable segments77.02926.794
103.823Assets used in the business690.970200.550
", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**$** **53,490**\n $ 51,114**$**\n\n**289**\n460 \n\n**2,047**\n2,232 \n\n— \n— \n\n**(4,144 )** (1,856 ) \n\n**150**\n151 \n\n**4,179**\n1,389 \n\n— \n**(8,860 )**\n\n**$** **47,151**\n $ 53,490**$**\n\nThe estimated net actuarial loss and prior service cost for the pension plans that will be amortized from accumulated other \ncomprehensive income (loss) into net periodic benefit cost over the next fiscal year are $735 and $83, respectively. The estimated \nnet actuarial gain and prior service cost for the retiree health care benefits that will be amortized from accumulated other \ncomprehensive income (loss) into net periodic benefit cost over the next fiscal year are $(53) and $107, respectively. \n\nAssumptions \n\nThe discount rate is used to determine the present value of future payments. In general, the Company’s liability increases as the \ndiscount rate decreases and decreases as the discount rate increases. The Company computes a weighted-average discount rate \ntaking into account anticipated plan payments and the associated interest rates from the Citigroup Pension Discount Yield Curve. \n\nThe weighted-average actuarial assumptions used to determine benefit obligations and net periodic benefit cost for the plans were \nas follows: \n\n**Change in benefit obligation:**\n\nBenefit obligation at beginning of the year \n\nService cost \n\nInterest cost \n\nPlan participants’ contributions \n\nBenefits paid \n\nAmendments \n\nActuarial loss (gain) during year \n\nCurtailment \n\nBenefit obligation at end of year \n\n**Change in plan assets:**\n\nFair value of plan assets at beginning of year \n\nActual (loss) gain on plan assets \n\nEmployer contributions \n\nPlan participants’ contributions \n\nBenefits paid \n\nFair value of plan assets at end of year \n\n**Funded status at end of year**\n\n**4,667**$ 4,593 \n\n**30** 39 \n\n**237** 235 \n\n**47** 37 \n\n**(256 )** (227 ) \n\n— — \n\n**423**\n(10 ) \n\n— — \n\n**5,148**$ 4,667 \n\n— $ — \n**$** **6,056**\n $ 5,229**$**\n\n— — \n**(30 )**\n984 \n\n**4,557**\n1,699 **209** 190 \n\n— \n— **47** 37 \n\n**(4,144 )** (1,856 ) **(256 )** (227 ) \n\n— $ — \n**$** **6,439**\n $ 6,056**$**\n\n**$** **(40,712 )** $ (47,434 ) **$** **(5,148 )** $ (4,667 ) \n\n\n \n \n \n \n [html]Table201120124.5 %4.3 %\n
2011Assumptions used to determine benefit obligations at year end :Discount rate2.8 %
4.0 %5.5 %Rate of compensation increaseN / A5.5 %
N / AN / AAssumptions used to determine net periodic benefit cost :Discount rate3.5 %
5.5 %5.5 %Expected return on plan assets7.5 %7.5 %
N / AN / ARate of compensation increase5.5 %5.5 %
N / AN / A
\n\nThe amounts recognized in the consolidated balance sheets and in accumulated other comprehensive income (loss) for the \npostemployment plans were as follows: \n\nPension Benefits Retiree Health Care Benefits \n\nJune 30, **2012** 2011 **2012** 2011. \n\n**Amounts recognized in the consolidated balance sheets:**\n\nOther current liabilities **$** **6,018**\n $ 4,151**$** **220**$ 220 \n\nPostemployment benefits **34,694**\n43,283 **4,928** 4,447 \n\nNet amount recognized **40,712**\n $ 47,434**$** **5,148**$ 4,667 \n\n**Amounts recognized in accumulated other comprehensive income (loss):**", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**\n\n*statement of financial position*\n*consist of:*\nThe Company has defined contribution profit-sharing plans cover- \n Accrued benefit liability **$** **(493)** $ (9,784) $ (8,882) \ning substantially all employees who are not participants in certain \n Net amount recognized at \nyear-end, included in \ndefined benefit plans. The Company’s annual contribution to the de- \n Other Liabilities **$** **(493)** $ (9,784) $ (8,882) \nfined contribution plans is based on employee eligible earnings and \nEstimated Future Benefit Payments (In thousands) \nresults of operations and amounted to $26,489,000, $23,524,000, \n$ \nand $24,826,000 in 2003, 2002, and 2001, respectively. \n\nThe Company sponsors defined benefit plans which include \n\na limited number of salaried and hourly employees at certain subsidiar- \n\n Fiscal 2004 \n Fiscal 2005 \n Fiscal 2006 \n Fiscal 2007 \n Fiscal 2008 \n Fiscal 2009 – 2013 1,133 \n1,189 \n1,195 \n1,217 \n 1,265 \n 6,874 \nies. The Company’s funding policy is generally to contribute annually \n\n*Expected Contributions During Fiscal 2004*\n Total $ 12,873 \nthe minimum actuarially computed amount. Net pension costs relating \n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, \nPlan Assets – Percentage of Fair Value by Category \n**2003**\nrespectively. The actuarial present value of obligations, less related plan \n\n Equity \n Debit \n Other **0%**\n**0%**\n**100%**\n\nassets at fair value, is not significant. \n\nThe Company also participates in a multiemployer plan, \n Total **100%**\nwhich provides defined benefits to certain of the Company’s union", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "employees. Pension expense for this plan amounted to $309,000, \n\n$309,000, and $310,000 in 2003, 2002, and 2001, respectively. \n\n**Postretirement Health Care**\n\nIn accordance with the guidelines of revised SFAS No. 132, “Employers’ \n\nDisclosures about Pensions and other Postretirement Benefits,” the fol- \n\nlowing table sets forth the funded status of the plan, reconciled to the \n\naccrued postretirement benefits cost recognized in the Company’s bal- \n\nance sheet at: \n\n**2003** 2002 2001 \n\n\n \n \n \n \n [html]\n
Number of SharesWeighted - Average Exercise Price
Outstanding at December 30.2000 Granted Exercised Forfeited918.250266.500 ( 17.500 ) ( 37.000 )$ 21.8923.3918.3121.57
Outstanding at December 29.2001 Granted Exercised Forfeited1.130.250290.000C ( 17.000 )$ 22.3225.77 *** 21.69
Outstanding at December 28.2002 Granted Exercised Forfeited1.403.250446.500 ( 362.000 ) ( 18.500 )$ 23.0326.7823.1023.57
Outstanding of Jumuory 3.2ooid Options exercisable at : dansary 3, zoo4December at 8, zooa December 20.20011.469.250202.250156.250105.0008 34 - 158 = 5.47 ± 5.02 ± 4.86
\n\n*(In thousands)*\n\n*Change in benefit obligation*\n Benefit obligation at beginning \n\n of year \n Service cost \nInterest cost \n Benefits paid \n Actuarial (gain) or loss \n Current year prior service cost **$ 17,617**\n**249**\n**1,105**\n**(1,206)**\n**566**\n**–** $ 17,351 \n398 \n1,091 \n (1,356) \n133 \n– $ 12,229 \n278 \n941 \n(952) \n 3,042 \n1,813 \n Benefit obligation at end of year**$ 18,331** $ 17,617 $ 17,351 \n\n*Change in plan assets*\n Fair value at beginning of year**$**\n Employer contributions \n Benefits paid **–**\n**11,456**\n**(1,206)**\n\n$ \n\n– \n1,356 \n (1,356) – \n952 \n(952) \n\nNumber \nAverage Exercisable \nExercise at January 3, \n2004 \n\n Fair value at end of year **$ 10,250** $ – $ – \n\n*Reconciliation of funded status*\n Funded status \n Unrecognized actuarial (gain) \n\nPrice \n**$ (8,081)** $ (17,617) $ (17,351) \n\nThe following table summarizes information about fixed stock options \n\noutstanding at January 3, 2004: \n\nOptions \nExercisable Options Outstanding \n\nWeighted- \nAverage \nRange of \nRemaining \nExercise Prices Outstanding Contractual Life \n\nWeighted- \n\nNumber \n\n$24.50–$28.25 \n $32.22 \n $23.47 \n$18.31–$26.69 \n$23.32–$25.27 \n$25.75–$25.77 \n$25.50–$42.98 31,000 \n20,000 \n101,250 \n411,000 \n223,500 \n261,000 \n421,500 2.9 years \n4.1 years \n5.1 years \n6.6 years \n7.1 years \n8.1 years \n9.2 years $ 25.71 \n$ 32.22 \n$ 23.47 \n$ 20.42 \n$ 23.41 \n$ 25.77 \n$ 26.83 31,000 \n 20,000 \n 101,250 \n 50,000 \n– \n– \n– \n\n or loss **1,105**\n\n Unrecognized transition \n obligation or (asset) \n**5,361**\n**1,122** Unrecognized prior service cost \n\n Net amount recognized at \nyear-end **$** **(493)** $ (9,784) $ (8,882) \n\n*Amounts recognized in the*\n**Retirement Benefits**", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "The accumulated benefit obligation for the pension plan was $4,801,000 and $4,170,000 at December 31, 2003 and 2002, respectively. The components \nof net periodic pension cost for 2003, 2002 and 2001 were as follows (in thousands): \n\nYEAR ENDED DECEMBER 31, \n2003 2002 2001 \n\n**C O M P O N E N T S O F N E T P E R I O D I C P E N S I O N C O S T :**\n\nService cost $ 214 $ 320 $ 369 \n\nInterest cost 298 307 296 \n\nExpected return on assets (349) (405) (477) \n\nPrior service cost amortization (37) 7 6 \n\nActuarial loss 128 28 — \n\nTransition amount amortization (44) (44) (44) \n\nNet periodic pension cost $ 210 $ 213 $ 150 \n\nThe Company’s expected long-term rate of return assumption is based upon the plan’s actual long-term investment results as well as the long-term outlook \nfor investment returns in the marketplace at the time the assumption is made. The reduction in the Company’s assumption for this expected return rate in \nthe beginning of 2003 to 8 percent from 9 percent reflected the major downturn in returns on debt and equity investments that occurred in the investment \nmarkets in 2001 and 2002. \n\nThe Company’s pension plan assets at December 31, 2003 and 2002 were invested in the following asset categories: \n\n2003 2002 \n\n**A S S E T C A T E G O R Y :**\n\nEquity securities 73% 64% \n\nDebt securities 25% 28% \n\nOther 2% 8% \n\nTotal 100% 100%", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "The following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in \nexcess of plan assets: \n\n\n \n \n \n \n [html]\n
Pension Benefits
June 30,20122011Projected benefit obligations
$47.151$53.490
Accumulated benefit obligations47.15143.528
Fair value of plan assets6.4396.056
\n\n\n \n \n \n \n [html]Year Ended June 30,I11\n
2010201220112010Service cost$289
$460$574$30$39$52Interest cost2.0472.232
2.911237235259Expected return on plan assets( 396 )( 385 )
( 351 )Recognized net actuarial loss ( gain )6441.449
924( 72 )( 83 )( 87 )Amortization of prior service cost412710
797139139148Recognition of prior service cost upon plan curtailment3.117
Net periodic cost$6.113
$4.466$4.855$334$330$372
\n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nPension Benefits Retiree Health Care Benefits \n\n**2012** 2011 **2012** 2011. \n\n**$** **53,490**\n $ 51,114**$**\n\n**289**\n460 \n\n**2,047**\n2,232 \n\n— \n— \n\n**(4,144 )** (1,856 ) \n\n**150**\n151 \n\n**4,179**\n1,389 \n\n— \n**(8,860 )**\n\n**$** **47,151**\n $ 53,490**$**", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued) \n(In thousands, except per share amounts) \n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nThe following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in \nexcess of plan assets: \n\nPension Benefits \n\n**2012** 2011 \n\n**$**\n**47,151**$ 53,490 \n\n**47,151** 43,528 \n\n**6,439** 6,056 \n\nThe net periodic costs are as follows: \n\nPension Benefits Retiree Health Care Benefits \n\nYear Ended June 30, **2012--** 2011-- 2010-- **2012--** 2011-- 2010-- \n\nService cost **$**\n**289**$ 460 $ 574**$** **30**$ 39 $ 52 \n\nInterest cost \n**2,047** 2,232 2,911 **237** 235 259 \n\n— — — \nExpected return on plan assets **(396 )** (385 ) (351 ) \n\nRecognized net actuarial loss (gain) \n**644** 1,449 924 \n**(72 )** (83 ) (87 ) \n\nAmortization of prior service cost \n**412** 710 797 **139** 139 148 \n\n— — —— — — \nRecognition of prior service cost upon plan curtailment \n**3,117**\n\nNet periodic cost **$**\n**6,113**$ 4,466 $ 4,855**$** **334**$ 330 $ 372", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "The Company also maintains the Republic Services 401(k) Plan (the \"\"Plan''), which is a deÑned \ncontribution plan covering all eligible employees. Under the provisions of the Plan, participants may direct the \nCompany to defer a portion of their compensation to the Plan, subject to a maximum of 15% of eligible \ncompensation, as deÑned. In general, the Company provides matching contributions of 50% of the amount \ncontributed by each participant up to 4% of the employee's salary. The employer match is generally made in \nshares of the Company's common stock. Both employee and Company contributions vest immediately. During \n2004, the Company contributed shares of its common stock valued at $3.5 million to the Plan.", + "page_start": 86, + "page_end": 86, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 31 – SHARE BASED PAYMENTS**\n\n**Options**\nDuring the years ended 31 December 2014 and 2013, a total of nil and 2,000,000 options were granted to employees \npursuant to employment agreements and a total of 431,666 and 2,725,000 previously issued options were \nexercised, respectively. There were 700,000 awarded options that the Company issued in early 2013 for which \nCompany employees rendered services during the six month period ended 31 December 2012. \n\n\n \n \n \n \n [html]20142013\n
Year ended sil December
Number of OptionsWeighted Average Exercise. Price. A $Number of OptionsWeighted Average Exercise Price ASOutstanding at start of period
5.051.6661.025.776.6660.59Formally issued
--2.000.0001.29Forfeited
( 1.890.000 )1.29--Exercised
( 431.666 )0.62( 2.725.000 )0.31Expired
-:..Outstanding at end of period
2.730.0000.905.051.6661.02Exercisable at end of period
1.930.0000.872.241.6660.87
\n\nThe following tables summarise the options issued and awarded and their related grant date, fair value and vesting \nconditions for the year ended 31 December 2013. No options were issued during the year ended 31 December 2014. \n\nFor options outstanding as at 31 December 2014, the exercise price ranged from A$0.65 to A$0.95 and the weighted \naverage remaining contractual life was 3.5 years. \n\nOptions issued during the year ended 31 December 2013: \n\nGrant Date \n1 April 2013 \n24 September 2013 \nTotal Number of Options \n350,000 \n950,000 \n1,300,000 Estimated Fair Value (US$’000) \n$ 217 \n$ 475 \n$ 692 \n\nVesting Conditions \n\n20% issuance date, 20% first four anniversaries \n20% issuance date, 20% first four anniversaries \n\nShare based payments expense related to options is determined pursuant to AASB 2 - Share Based Payments (“AASB \n2”) / IFRS 2 – Share Based Payments (“IFRS 2”), and is recognised pursuant to the attached vesting conditions. The \nfair value of the options awarded ranged from A$0.53 to A$0.59 for the year ended 31 December 2013, which were \ncalculated using a Black-Sholes options pricing model. Expected volatilities are based upon the historical volatility \nof the ordinary shares. Historical data is also used to estimate the probability of option exercise and potential \nforfeitures.", + "page_start": 96, + "page_end": 96, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Note 9. Retirement Plans (Continued)**\n\nThe Company's matching contributions to the defined contribution plan were approximately $228 thousand, $210 \nthousand and $182 thousand for the years ended December 31, 2003, 2002 and 2001, respectively. \n\nIn May 2003, the Company adopted an unfunded nonqualified supplemental executive retirement plan for named \nexecutives. The plan was established to provide retirement benefits in addition to those provided under the Retirement \nPlan that covers all employees. The following table presents the actuarial information for the plan. \n\n\n \n \n \n \n [html]\n
2003
Change in benefit obligation :( in thousand.
Benefit obligation, beginning$
-Service cost
22Interest cost
23Actuarial loss
278Plan adoption
546Benefit obligation, ending
$ 869Funded status
$( 869 )Unrecognized net loss
278Additional minimum liability
( 380 )n
380Unrecognized prior service cost
521Accrued benefit cost
$ ( 70 )
Components of net periodic benefit costs :Service cost
22Interest cost
23Amortization of prior service costs
25
\n\n**Note 10. Stock Incentive Plan**\n\nThe Company has a shareholder approved Company Stock Incentive Plan (the “Plan”), providing for the grant of \nincentive compensation to essentially all employees in the form of stock options. The Plan authorizes grants of options \nto purchase up to 480,000 shares of common stock over a ten-year period beginning in 1996. The option price for all \ngrants has been at the current market price at the time of the grant. The grants have generally provided that one-half of \nthe options exercisable on each of the first and second anniversaries of the date of grant, with the options expiring five \nyears after they are granted. In 2003, the Company issued grants where the options are vested over a five-year period \nbeginning on the third anniversary date of the grant of the options. The participant may exercise 20% of the total grant \nafter each anniversary date through the eighth year, with the options expiring after ten years. \n\nThe fair value of each grant is estimated at the grant date using the Black-Scholes option-pricing model with the \nfollowing weighted average assumptions:", + "page_start": 33, + "page_end": 33, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", + "target_page": 21, + "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "• \n\n• \n\n•**Compliance**with and impact of legislation. Currently, there are data on the percentage of \nenterprises with a risk assessment but very limited information about the**quality of these risk**\n**assessments and of implemented risk management and reduction measures**. Previous \nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to \ncomply with legal obligations (paper compliance). A possible approach could be an**anonymous**\n**evaluation of the quality of a representative share**of risk assessments. \n\n\n \n \n \n \n [html]\n
TableEurope
ComplementalTable
", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "RISKS AND UNCERTAINTIES AFFECTING OUR BUSINESS \n\nThis section describes the principal risks and uncertainties that could \nhave a material adverse effect on our business and financial results. \nTECHNOLOGY RISKS \n\n**Competing Technologies**\nSeveral technologies may affect the way our services are delivered, \nincluding: \n(cid:129) broadband \n(cid:129) IP-based voice, data and video delivery services \n(cid:129) increased use of optical fibre technologies to businesses and, or \n\nGENERAL RISKS \n\n**Economic Conditions**\nOur businesses are affected by general economic conditions and \nconsumer confidence and spending. Recessions, declines in economic \nactivity and economic uncertainty can erode consumer and business \nconfidence and reduce discretionary spending. Any of these factors can \nnegatively affect us through reduced advertising, lower demand for our \nproducts and services, decreased revenue and profitability, higher churn \nand bad debt expense. A significant portion of our broadcasting, \npublishing and digital revenues come from the sale of advertising. \n\nresidences \n(cid:129) broadband wireless access and wireless services using a radio \nfrequency spectrum that we may have limited access to. \n\nThese technologies may also lead to significantly different cost \nstructures for users and therefore affect the long-term viability of some \nof our current technologies. Some of the new technologies may allow \ncompetitors to enter our markets with similar products or services at \nlower costs, and they may be larger and have greater access to financial \nresources than we have. \n\nPoor economic conditions can also have an impact on our pension plans \nbecause there is no assurance that the plans will be able to earn the \nassumed rate of return. Capital market volatility may result in changes \nrequiring us to make \nin the discount \ncontributions \nsignificantly from current \ncontributions and assumptions being used in the actuarial valuation \nprocess. \n\nrates and other variables, \n\nImprovements in the quality of streaming video over the Internet, \ncoupled with the increasing availability of television shows and movies \nonline are anticipated to increase competition for Canadian cable \ntelevision systems. If changes in technology are made to any alternative \nCanadian multi-channel broadcasting distribution system, our cable \nservices may face increased competition. In addition, wireless Internet is, \nin some instances, \nthe \ntechnology for wireless Internet continues to develop. \n\nin the future that differ \n\n**Substantial Competition**\nThere is no assurance that our current or future competitors will not \nprovide services that are superior to ours or at lower prices, adapt more \nquickly to evolving industry trends or changing market requirements, \nenter markets we operate in, or introduce competing services. Any of \nthese factors could reduce our business market share or revenues, or \nincrease churn. \n\nreplacing traditional wireline Internet as \n\nThe growing use of PVRs could affect our ability to generate television \nadvertising revenues because viewers can skip advertising aired on the \ntelevision networks. The emergence of subscriber-based satellite and \ndigital radio products could change radio audience listening habits and \nhave a negative effect on the results of our radio stations. Certain \naudiences are also migrating to the Internet as more video and audio \ncontent becomes available. \n\nWireless could face increased competition due to recent changes to \nforeign ownership and control of wireless licences. \n(cid:129) Foreign telecommunication companies could enter the Canadian \nmarket by acquiring wireless licences or a holder of wireless licences. \nIf companies with significantly greater capital resources enter the \nCanadian market, it could reduce our wireless market share. See \n“Foreign ownership and control” in “Regulation in Our Industry” for \ndetails.", + "page_start": 77, + "page_end": 77, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "These factors can also affect our objectives, strategies and intentions. \nthese factors are beyond our control or our current \nMany of \nexpectations. Should one or more of these risks, uncertainties or other \nfactors materialize, our objectives, strategies or intentions change, or \nany other \nfactors or assumptions underlying the forward-looking \ninformation prove incorrect, our actual results and our plans could vary \nsignificantly from what we currently foresee. \n\nAccordingly, we warn investors to exercise caution when considering \nstatements containing forward-looking information and that it would \nbe unreasonable to rely on such statements as creating legal rights \nregarding our future results or plans. We are under no obligation (and \nwe expressly disclaim any such obligation) to update or alter any \nstatements containing forward-looking information or the factors or \nassumptions underlying them, whether as a result of new information, \nfuture events or otherwise, except as required by law. All of the \nforward-looking information in this MD&A is qualified by the cautionary \nstatements herein. \n\n\n \n \n \n \n [html]\n
AAF 1DataNumberSpeciesTeverParametersParametersPercentageSpeciesPatientscan fTableParameterParameterSpecificationTableNursestedAge ( years )
", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "impairment; changes in accounting policies and practices; \nReaders are cautioned not to place undue reliance on any \norganizational changes within the Company; the volatility of our \n\nforward-looking statements. All forward-looking statements are \nstock price and the resulting impact on our consolidated financial \nbased on current expectations regarding important risk factors, \nstatements; risks related to legal proceedings to which we are a \nmany of which are outside the Company’s control. Accordingly, \nparty; adverse regulation and legislation, including potential \nactual results may differ materially from those expressed in the \nchanges in tax regulations (e.g., those affecting the use of the \nforward-looking statements, and the making of those statements \nLIFO inventory accounting method and the taxation of foreign- \nshould not be regarded as a representation by the Company or \nsourced income); and the occurrence of extraordinary events \nany other person that the results expressed in the statements will \n(including prolonged labor disputes, natural events and acts of \nbe achieved. In addition, the Company assumes no obligation \nGod, terrorist acts, fires, floods, and accidents). Other factors \npublicly to update or revise any forward-looking statements, \nand unanticipated events could also adversely affect our business, \nwhether because of new information or events, or otherwise, \nfinancial condition or results of operations. We discuss certain of \nexcept as may be required by law. \nthese matters more fully throughout our “Management’s \n\n\n \n \n \n \n [html]\n
QUANTITATIVE AND QUALITATIVEInterest Rate Risk
DISCLOSURES ABOUT MARKET RISKWe repaid the debt that was outstanding at June 30.2010 during
", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Particularly difficult is the assessment of the**quality of risk assessments**. A complete quality \nassessment would require specific knowledge of several aspects: of the specific topic, of the — real — \nsituation at the workplaces in an enterprise, and of the expected reduction of these risks by the proposed \nor recommended risk mitigation measures. This has rarely been done. Moreover, even inside one \nenterprise the**quality of a risk assessment might differ depending on the topic**, for example, \nbetween ‘easier’ topics as ‘correct provision of warning signals’ or ‘adequate temperatures’, and more \ncomplex topics like psychosocial, musculoskeletal, or chemical and biological risks.414", + "page_start": 126, + "page_end": 126, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "on occupation and sector, between 15% and 30% of workers are exposed to such risks. No or very \nminor decreases of these risks could be seen during the past 15 years. \n\nIn both the ESENER and the EWCS surveys52 there is a similar share of ‘Yes responses’ when asked \nfor the presence of such risks.53 In ESENER a set of questions is related to the risks present in the \nenterprise. The figure below shows the responses from ESENER 2014 and ESENER 2019 regarding \nphysical health risks.54", + "page_start": 38, + "page_end": 38, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "and services on a timely basis, it could have a material adverse effect on \nfinancial condition and results of operations. Any \nour business, \ninterruption in the supply of equipment for our networks could also \naffect the quality of our service or impede network development and \nexpansion. \nindustry associations and agencies. If our radio and television ratings or \nmagazine readership levels decrease substantially, our advertising sales \nvolumes and the rates that we charge advertisers could be adversely \naffected. \n\nFINANCIAL RISKS \n\n**Organizational Structure and Talent**\nThe industry is competitive in attracting and retaining a skilled \nworkforce. Losing certain employees or changes in morale due to a \nrestructuring or other event could affect our revenue and profitability in \ncertain circumstances. \n\n**Capital Commitments Liquidity, Debt and Interest Payments**\nOur capital commitments and financing obligations could have \nimportant consequences including: \n(cid:129) requiring us to dedicate a substantial portion of cash flow from \noperations to pay dividends, interest and principal, which reduce \nfunds available for other business purposes including other financial \noperations \n(cid:129) making us more vulnerable to adverse economic and industry \nconditions \n(cid:129) limiting our flexibility in planning for, and/or reacting to, changes in \n\n**Holding Company Structure**\nAs a holding company, our ability to meet our financial obligations \ndepends primarily on receiving interest and principal payments on \nintercompany advances, rental payments, cash dividends and other \npayments from our subsidiaries, together with proceeds raised by us \nthrough issuing debt and equity and selling assets. \n\nour business and/or industry \n\n(cid:129) putting us at a competitive disadvantage compared to competitors \nless financial \n\nSubstantially all of our business activities are operated by our \nsubsidiaries. All of our subsidiaries are distinct legal entities that have no \nobligation, contingent or otherwise, to make funds available to us \nwhether by dividends, \nloans, advances or other \npayments, \nto payment arrangements on intercompany \nadvances. Any of these payments must meet statutory or contractual \nrestrictions, are contingent on the earnings of those subsidiaries, and \nare subject to various businesses and other considerations. \n\nwho may have more financial \nleverage, or \nresources and, or \n\n(cid:129) restricting our ability to obtain additional financing to fund working \ncapital and capital expenditures and for other general corporate \npurposes. \n\ninterest payments, \nsubject \n\nOur ability to satisfy our financial obligations depends on our future \noperating performance and economic, financial, competitive and other \nfactors, many of which are beyond our control. Our business may not \ngenerate sufficient cash flow and future financings may not be available \nto provide sufficient net proceeds to meet these obligations or to \nsuccessfully execute our business strategy. \n\n**Increasing Programming Costs**\nAcquiring programming is the single most significant purchasing \ncommitment in our cable business. Programming costs have increased \nsignificantly over the past few years, particularly with the recent growth \nin subscriptions to digital specialty channels. Programming is also a \nmaterial cost for Media television properties. Higher programming costs \ncould adversely affect the operating results of our business if we are \nunable to pass on these costs to subscribers. \n\nWe have recorded significant amounts of deferred income tax liabilities \nand current income tax expense, and calculated these amounts based \non substantively enacted income tax rates in effect at the relevant time. \nA legislative change in these rates could have a material impact on the \namounts recorded and payable in the future.", + "page_start": 80, + "page_end": 80, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The figure below displays the relation between**major risks**and the**health outcome in DALYs**. The \nestimates of DALYS that are attributable to work vary between 6.8 million years (ICOH) and 4.4 million \nyears (WHO/ILO), both for the EU27. \n\n**Figure 26: Work-related DALYs – estimates by WHO/ILO and ICOH for the EU27**\n\nPutting the absolute numbers of WHO/ILO in relation to the EU27 population above 16 years this results \nin approximately**1,172 lost life years per 100,000 working-age population**(WHO/ILO). ICOH \ncalculates in absolute numbers 6.8 million lost life years for the labour force population, resulting**in**\n**3,364 DALYs per 100,000 labour force**. \n\nIt can be concluded that despite methodological differences the estimates**do not vary that much if the**\n**same reference population**is used in the calculation. Future research will contribute to a better \nattribution of the impact of work on these diseases.**In the future, relevant disease groups will be**\n**incorporated in these estimates**, that is, the impact of work on the prevalence of**mental diseases**\nand of communicable diseases caused by biological agents needs to be incorporated. \n\nThe next table shows the**difference between major occupational risk factors and deaths**at the \nEU27 level and the global level. At EU27 level asbestos-related cancers are clearly the most frequent \nreason for work-related deaths with nearly 60% of all cases; the two next main causes are COPD (15.9%) \nand CVD (12.3%). The global situation is quite different. CVD account for nearly 40%, COPD for 24% \nand injuries for 19%. \n\n\n \n \n \n \n [html]\n
TableEuropean Agency for Safety and Health at Work – EU - OSHA
Table
", + "page_start": 83, + "page_end": 83, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "exposure of workers to the risks arising from physical agents ( vibration )( Wbration Directive )2003Directive 2003 / 10 / EC on the minimum health and safety requirements regarding the exposure of workers to the risks arraing from physical agents ( noise )( Nuise Directive )2004 / 2019Describes ( 20ths ) 10 %; on the protection of workers from the risks milerin to exposure to carcinogens or mutuators at work Carcinogens or mutuagens : Onective ( Connecul new or amenoted Smit values for scroppitonal exposure ) In 20.22 ; ex2004Directive 2004 / 46 / EC on the minimum health and safety requirements regarding the exposure of workers to the risks arising from physical agents ( electromagnetic fields ) ( BMF Directive )2004Directive 2000 / 34 / EC on the protection of workers from risks related to exposure to biological agents at work ( Biological Agents Directive )2006Directive 2006 / 25 / EC on the minimum health and safety requirements regarding the exposure of workers to the risks anking from physical agents ( Rettificial optical radiation, AOR Directive )", + "page_start": 119, + "page_end": 119, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**RISKS DUE TO LEGAL AND REGULATORY FACTORS**\n\n**We are subject to certain laws, litigation, regulatory matters and ethical standards, and our failure to comply with or adequately**\n**address developments as they arise could adversely affect our reputation and operations.**\nOur policies, procedures and practices and the technology we implement are designed to comply with federal, state, local and foreign laws, \nrules and regulations, including those imposed by the SEC and other regulatory agencies, the marketplace, the banking industry and foreign \ncountries, as well as responsible business, social and environmental practices, all of which may change from time to time. Significant \nlegislative changes, including those that relate to employment matters and health care reform, could impact our relationship with our \nworkforce, which could increase our expenses and adversely affect our operations. In addition, if we fail to comply with applicable laws and \nregulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our \nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements \nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result \nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of \noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may \nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in \nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our \nbusiness and financial condition. \n\n**We continue to face uncertainties due to financial services industry regulation and supervision that could have an adverse affect**\n**on our operations.**\nFederal and state regulation and supervision of the financial industry has increased in recent years due to implementation of consumer \nprotection and financial reform legislation such as the Credit Card Accountability Responsibility and Disclosure Act of 2009 (“CARD Act”) and \nthe Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (“Financial Reform Act”). The Financial Reform Act significantly \nrestructured regulatory oversight and other aspects of the financial industry, created the Consumer Financial Protection Bureau (“CFPB”) to \nsupervise and enforce consumer lending laws and regulations, and expanded state authority over consumer lending. The CARD Act included \nnew and revised rules and restrictions on credit card pricing, finance charges and fees, customer billing practices and payment application. \nWe anticipate more regulation and interpretations of the new rules to continue, and, depending on the nature and extent of these new \nregulations and interpretations, we may be required to make changes to our credit card practices and systems, which could adversely impact \nthe revenues and profitability of our Credit segment. In addition, we operate in a regulated environment where financial supervisory agencies \nprovide oversight over our activities. Compliance with applicable laws and regulations could limit or restrict our activities and the conduct of \nour business and enforcement actions by those agencies for failure to comply could have an adverse impact on us.", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "To what system of logic do OWL ontologies belong to ?", + "target_page": 7, + "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 \n\n**1 author:**", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. \n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode \n\n1.2 Conventions \nClass, property, rule, and individual names are written in Consolas font like this. The term used for \nany such construct in Protégé and in this document is an*Entity*. Individuals and classes can also be \nreferred to as objects. \n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this. \n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something \nthat you should or optionally could view or enter into the user interface. If you ever aren’t sure what to \ndo to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you \nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the \n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableTableTable
TableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation \n\nWe designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". \n\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 \nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: \nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 \nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665–707. DOI: \n10.1162/COLI_a_00146 \nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, \nDatabase, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Chapter 9 Queries: Description Logic and SPARQL \nNow that we have some individuals in our ontology, we can do some interesting queries. There are \nseveral tools for doing queries in Protégé. \n\n9.1 Description Logic Queries \nTo start with the most straight forward one based on what you have already learned are Description Logic \n(DL) queries. These are essentially the same kind of statements you have been using to define classes. \nHowever, in addition to using such statements to define a class you can use it as a query. \n\n**Exercise 33: Try Some Description Logic Queries**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. To begin with navigate to the DL Query tab. If it doesn’t exist create it using: Window>Tabs>DL \nQuery. \n\n2. At the top right of this tab you should see a view that says DL query: and below it Query (class \nexpression). \n\n3 You can enter any DL statement you want in this box and then see all the entities that are subclasses, \nsuperclasses, and instances of it. As an example, enter: Customer and purchasedPizza some (hasTopping \nsome (hasSpiciness value Hot)). I.e., all Customers who have purchased a Pizza that hasSpiciness \nHot. At first you may not see anything but don’t worry there is one more step. \n\n4. Look at the check boxes on the right under Query for. Check Superclasses, Subclasses (although it \nshould already be checked by default) and Instances. Now your UI should look like figure 9.1. You may \nnotice that owl:Nothing shows up as a subclass. Don’t worry that is actually expected. Remember that \nowl:Nothing is the empty set and the empty set is a subset of every set (including itself) so just as \nowl:Thing is a superclass of every class owl:Nothing is a subclass of every class. If you don’t want to \nsee owl:Nothing you can uncheck the box toward the bottom right that says Display owl:Nothing. \n\n5. Try some additional DL queries such as: hasTopping some (hasSpiciness value Hot) and \nVegetarianPizza and (hasTopping some (hasSpiciness some (isMilderThan value Hot))). Note that with \nthis last query you are taking advantage of the transitive order you defined for the instances of the \nSpiciness class in chapter 6. \n\n6. You can also do queries for strings in the names of your entities. For example, first do a query simply \nwith Pizza in the query window. Then type in Hot in the Name contains field. This should give you all the \nclasses and individuals with*Hot*in their name.", + "page_start": 66, + "page_end": 66, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "5. One last thing we want to do is to configure the reasoner. By default, the reasoner does not perform all \npossible inferences because some inferences can take a long time for large and complex ontologies. In \nthis tutorial we will always be dealing with small and simple ontologies so we want to see everything the \nreasoner can do. Go to: Reasoner>Configure. This will bring up a dialog with several check boxes of \ninferences that the reasoner can perform. If they aren’t all checked then check them all. You may receive \na warning that some inferences can take a lot of time, but you can ignore those since your ontology will \nbe small. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n4.3 Disjoint Classes \n\nHaving added the classes Pizza, PizzaTopping, and PizzaBase to the ontology, we now want to say \nthat these classes are*disjoint*. I.e., no individual can be an instance of more than one of those classes. In \nset theory terminology the intersection of these three classes is the empty set: owl:Nothing. \n\n**Exercise 6: Make Pizza, PizzaTopping, and PizzaBase disjoint from each other**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 15, + "page_end": 15, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Chapter 1 Introduction4
1.1 Licensing4
1.2 Conventions4
Chapter 2 Requirements and the Protege User Interface6
Chapter 3 What are OWL Ontologies?6
3.1 Components of OWL Ontologies6
3.1. 1 Individuals.7
3.1. 2 Properties8
3.1. 3 Classes8
Chapter 4 Building an OWL Ontology10
4.1 Named Classes13
4.2 Using a Reasoner15
4.4 Using Create Class Hierarchy17
4.5 Create a PizzaTopping Hierarchy19
4.6 OWL Properties22
4.7 Inverse Properties23
4.8 OWL Object Property Characteristics24
4.8. 1 Functional Properties24
4.8. 2 Inverse Functional Properties.25
4.8. 3 Transitive Properties25
4.8. 4 Symmetric and Asymmetric Properties...25
4.8. 5 Reflexive and Irreflexive Properties26
4.8. 6 Reasoners Automatically Enforce Property Characteristics26
4.9 OWL Property Domains and Ranges26
4.10 Describing and Defining Classes29
4.10.1 Property restrictions29
4.10.2 Existential Restrictions31
4.10.3 Creating Subclasses of Pizza33
4.10.4 Detecting a Class that can ’ t Have Members37
4.11 Primitive and Defined Classes ( Necessary and Sufficient Axioms )38
4.12 Universal Restrictions41
4.13 Automated Classification and Open World Reasoning42
", + "page_start": 2, + "page_end": 2, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. \n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all \nthe current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, \nXML and XSD that are required for every ontology, so those namespaces are by default mapped in every \nnew Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your \nontology. This allows you to display and refer to entities in your ontology without entering a namespace \nprefix. If you look at that tab now you should see a row where the first column is blank, and the second \ncolumn has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the \nActive ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this \ntutorial has an IRI of: http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial and the \nrow that has a blank first column in Ontology Prefixes has the IRI: \nhttp://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#.", + "page_start": 61, + "page_end": 61, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "Concerning ontologies, what is an anonymous class ?", + "target_page": 30, + "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", + "page_start": 21, + "page_end": 21, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 \n\n**1 author:**", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. \n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode \n\n1.2 Conventions \nClass, property, rule, and individual names are written in Consolas font like this. The term used for \nany such construct in Protégé and in this document is an*Entity*. Individuals and classes can also be \nreferred to as objects. \n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this. \n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something \nthat you should or optionally could view or enter into the user interface. If you ever aren’t sure what to \ndo to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you \nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the \n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableTableTable
TableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "We have described the class Pizza to be to be a subclass of Thing and a subclass of the things that have \na base which is some kind of PizzaBase. Notice that these are necessary conditions — if something is a \nPizza it is*necessary*for it to be a member of the class Thing (in OWL, everything is a member of the \nclass Thing) and*necessary*for it to have a kind of PizzaBase. More formally, for something to be a \nPizza it is necessary for it to be in a relationship with an individual that is a member of the class \nPizzaBase via the property hasBase. \n\n4.10.3 Creating Subclasses of Pizza \nIt’s now time to add some different kinds of pizzas to our ontology. We will start off by adding a \nMargheritaPizza, which is a pizza that has toppings of mozzarella and tomato. In order to keep our \nontology tidy, we will group our different pizzas under the class NamedPizza. \n\n**Exercise 14: Create Subclasses of Pizza: NamedPizza and MargheritaPizza**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select Pizza from the class hierarchy on the Classes tab. \n\n2. Click on the Add subclass icon at the top left of the Classes tab (look back at figure 4.4 if you aren’t \ncertain). You can also move your mouse over the icons and you will see a little pop-up hint for each icon. \n\n3. Protégé will prompt you for the name of the new subclass. Call it NamedPizza. \n\n4. Repeat steps 1-3 this time starting with NamedPizza to create a subclass of NamedPizza. Call it \nMargheritaPizza. \n\n5. Add a comment to the class MargheritaPizza using the Annotations view. This is above the \nDescription view. Add the comment: A pizza that only has Mozzarella and Tomato toppings. Remember \nthat annotation properties are meta-data that can be asserted about any entity whereas object and data \nproperties can only be asserted about individuals. There are a few predefined annotation properties that \nare included in all Protégé ontologies such as the comment property. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\nHaving created the class MargheritaPizza we now need to specify the toppings that it has. To do this we \nwill add two restrictions to say that a MargheritaPizza has the toppings MozzarellaTopping and \nTomatoTopping. \n\n**Exercise 15: Create Restrictions that define a MargheritaPizza**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select MargheritaPizza from the class hierarchy on the Classes tab. \n\n2. Click on the Add icon (+) next to the SubClass Of field in the Description view for Pizza. \n\n3. This again brings up the restriction dialogue. This time rather than use the Object restriction creator we \nwill use the Class expression editor tab. Select that tab. \n\n4. Type hasTopping some Mo into the field. Rather than type the rest of the name of the topping now hit \n (hold down the control key and hit the space bar). Protégé should auto-complete the \nname for you and the field should now contain: hasTopping some MozzarellaTopping. This is a useful \ntechnique for any part of the Protégé UI. Whenever you enter the name of some entity you can do", + "page_start": 33, + "page_end": 33, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new", + "page_start": 44, + "page_end": 44, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10.4 Detecting a Class that can’t Have Members \nNext, we are going to use the reasoner to detect a class with a definition that means it can never have any \nmembers. In the current version of Protégé when the reasoner detects an inconsistency or problem on \nsome operating systems the UI can occasionally lock up and be hard to use. So to make sure you don’t \nlose any of your work save your ontology using File>Save. \n\nSometimes it can be useful to create a class that we think should be impossible to instantiate to make sure \nthe ontology is modeled as we think it is. Such a class is called a Probe Class. \n\n**Exercise 19: Add a Probe Class called ProbeInconsistentTopping**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select the class CheeseTopping from the class hierarchy. \n\n2. Create a subclass of CheeseTopping called ProbeInconsistentTopping. \n\n3. Click on the Add icon (+) next to the SubClass Of field in the Description view for \nProbeInconsistentTopping. \n\n4. Select the Class hierarchy tab from the dialogue that pops up. This will bring up a small view that \nlooks like the class hierarchy tab you have been using to add new classes. Use this to navigate to and \nselect the class VegetableTopping. Click on OK. \n\n5. Make sure to save your current ontology file. Now run the reasoner. You should see that \nProbeInconsistentTopping is now highlighted in red indicating it is inconsistent. \n\n6. Click on ProbeInconsistentTopping to see why it is highlighted in red. Notice that at the top of the \nDescription view you should now see owl:Nothing under the Equivalent To field. This means that the \nprobe class is equivalent to owl:Nothing. The owl:Nothing class is the opposite of owl:Thing. \nWhereas all individuals are instances of owl:Thing, no individual can ever be an instance of \nowl:Nothing. The owl:Nothing class is equivalent to the empty set in set theory. \n\n7. There should be a ? icon just to the right of owl:Nothing. As with any inference of the reasoner it is \npossible to click on the new information and generate an explanation for it. Do that now, click on the ? \nicon. This should generate a new window that looks like figure 4.20. The explanation is that \nProbeInconsistentTopping is a subclass of CheeseTopping and VegetableTopping but those \ntwo classes are disjoint. \n\n8. Click OK to dismiss the window. Delete the class ProbeInconsistentTopping by selecting it and then \nclicking on the delete class icon at the top of the classes view (see figure 4.4). \n\n9. Synchronize the reasoner.", + "page_start": 37, + "page_end": 37, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "5. One last thing we want to do is to configure the reasoner. By default, the reasoner does not perform all \npossible inferences because some inferences can take a long time for large and complex ontologies. In \nthis tutorial we will always be dealing with small and simple ontologies so we want to see everything the \nreasoner can do. Go to: Reasoner>Configure. This will bring up a dialog with several check boxes of \ninferences that the reasoner can perform. If they aren’t all checked then check them all. You may receive \na warning that some inferences can take a lot of time, but you can ignore those since your ontology will \nbe small. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n4.3 Disjoint Classes \n\nHaving added the classes Pizza, PizzaTopping, and PizzaBase to the ontology, we now want to say \nthat these classes are*disjoint*. I.e., no individual can be an instance of more than one of those classes. In \nset theory terminology the intersection of these three classes is the empty set: owl:Nothing. \n\n**Exercise 6: Make Pizza, PizzaTopping, and PizzaBase disjoint from each other**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 15, + "page_end": 15, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "The rest of the tutorial requires some data loaded into your ontology. So far, we have mostly been dealing \nwith defining classes and properties. This type of information is known in the semantic web community \nas T-Box information. The T stands for Terminological. Individuals or instances are known as A-Box. \nThe A stands for Assertional as in specific facts that are asserted about the domain. Typically, there will \nbe a much larger amount of A-Box information than T-Box. The A-Box information is often uploaded \nfrom spreadsheets, relational databases or other sources. One tool that is not covered in this tutorial that is \nuseful is called Cellfie. Cellfie is a tool that can take data from spreadsheets and upload it into an \nontology mapping the table-based data into objects and property values. For a tutorial on Cellfie see: \nhttps://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nIn addition to using Cellfie, you can use the Individuals by class tab introduced in chapter 5 to create new \ninstances and to create object and data property values for those instances as you did with the Hot and \nMedium individuals in chapter 6. However, that can be tedious so to spare you that uninteresting work \nI’ve developed a version of the Pizza ontology that has many individuals already created. That ontology \nshould be identical to the ontology you have developed so far except with many additional individuals. \nYou can find this populated Pizza ontology at: https://tinyurl.com/PizzaWDataV2 Go to this URL and \ndownload the file to your local machine and then use File>Open. Before you do that, it is probably a good \nidea to close the current file so that there is no possible confusion between the Pizza ontology you \ndeveloped and the new one with extra data.", + "page_start": 62, + "page_end": 62, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "When to use an enumerated class in OWL ontologies ?", + "target_page": 46, + "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new", + "page_start": 44, + "page_end": 44, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 \n\n**1 author:**", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 9 Queries: Description Logic and SPARQL \nNow that we have some individuals in our ontology, we can do some interesting queries. There are \nseveral tools for doing queries in Protégé. \n\n9.1 Description Logic Queries \nTo start with the most straight forward one based on what you have already learned are Description Logic \n(DL) queries. These are essentially the same kind of statements you have been using to define classes. \nHowever, in addition to using such statements to define a class you can use it as a query. \n\n**Exercise 33: Try Some Description Logic Queries**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. To begin with navigate to the DL Query tab. If it doesn’t exist create it using: Window>Tabs>DL \nQuery. \n\n2. At the top right of this tab you should see a view that says DL query: and below it Query (class \nexpression). \n\n3 You can enter any DL statement you want in this box and then see all the entities that are subclasses, \nsuperclasses, and instances of it. As an example, enter: Customer and purchasedPizza some (hasTopping \nsome (hasSpiciness value Hot)). I.e., all Customers who have purchased a Pizza that hasSpiciness \nHot. At first you may not see anything but don’t worry there is one more step. \n\n4. Look at the check boxes on the right under Query for. Check Superclasses, Subclasses (although it \nshould already be checked by default) and Instances. Now your UI should look like figure 9.1. You may \nnotice that owl:Nothing shows up as a subclass. Don’t worry that is actually expected. Remember that \nowl:Nothing is the empty set and the empty set is a subset of every set (including itself) so just as \nowl:Thing is a superclass of every class owl:Nothing is a subclass of every class. If you don’t want to \nsee owl:Nothing you can uncheck the box toward the bottom right that says Display owl:Nothing. \n\n5. Try some additional DL queries such as: hasTopping some (hasSpiciness value Hot) and \nVegetarianPizza and (hasTopping some (hasSpiciness some (isMilderThan value Hot))). Note that with \nthis last query you are taking advantage of the transitive order you defined for the instances of the \nSpiciness class in chapter 6. \n\n6. You can also do queries for strings in the names of your entities. For example, first do a query simply \nwith Pizza in the query window. Then type in Hot in the Name contains field. This should give you all the \nclasses and individuals with*Hot*in their name.", + "page_start": 66, + "page_end": 66, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs.", + "page_start": 21, + "page_end": 21, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. \n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode \n\n1.2 Conventions \nClass, property, rule, and individual names are written in Consolas font like this. The term used for \nany such construct in Protégé and in this document is an*Entity*. Individuals and classes can also be \nreferred to as objects. \n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this. \n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something \nthat you should or optionally could view or enter into the user interface. If you ever aren’t sure what to \ndo to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you \nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the \n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableTableTable
TableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "There are no mandatory naming conventions for OWL entities. In chapter 7, we will discuss \nnames and labels in more detail. A best practice is to select one set of naming conventions and \nthen abide by that convention across your organization. For this tutorial we will follow the \nstandard where class and individual names start with a capital letter for each word and do not \ncontain spaces. This is known as CamelBack notation. For example: Pizza, PizzaTopping, \netc. Also, we will follow the standard that class names are always singular rather than plural. \nE.g., Pizza rather than Pizzas, PizzaTopping rather than PizzaToppings. \n\n\n\n4.2 Using a Reasoner \nYou may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we \nhaven’t run the reasoner yet so Protégé has not been able to verify that our new classes have no \ninconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an \ninconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the \nsooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of \ndevelopment and then run the reasoner only to find that there are multiple inconsistencies which can make \ndebugging significantly more difficult. So let’s get into the good habit of running the reasoner often. \nProtégé comes with some reasoners bundled in and others available as plugins. Since we are going to \nwrite some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for \nSWRL at the time this tutorial is being written. \n\n**Exercise 5: Install and Run the Pellet Reasoner**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Check to see if the Pellet reasoner is installed. Click on the Reasoner menu. At the bottom of the menu \nthere will be a list of the installed reasoners such as Hermit and possibly Pellet. If Pellet is visible in that \nmenu then select it and skip to step 3. \n\n2. If Pellet is not visible then do File>Check for plugins and select Pellet from the list of available plugins \nand then select Install. This will install Pellet and you should get a message that says it will take effect the \nnext time you start Protégé. Do a File>Save to save your work then quit Protégé and restart it. Then go to \nFile>Open recent. You should see your saved Pizza tutorial in the list of recent ontologies. Select it to \nload it. Now you should see Pellet under the Reasoner menu and be able to select it so do so. \n\n3. With Pellet selected in the Reasoner menu execute the command Reasoner>Start reasoner. The \nreasoner should run very quickly since the ontology is so simple. You will notice that the little text \nmessage in the lower right corner of the Protégé window has changed to now say Reasoner active. The \nnext time you make a change to the ontology that text will change to say: Reasoner state out of sync with \nactive ontology. With small ontologies the reasoner runs very quickly, and it is a good idea to get into the \nhabit of running it often, as much as after every change. \n\n4. It is possible that one or more of your classes will still be highlighted in red after you run the reasoner. \nIf that happens do: Window>Refresh user interface and any red highlights should go away. Whenever \nyour user interface seems to show something you don’t expect the first thing to do is to try this command.", + "page_start": 15, + "page_end": 15, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10.4 Detecting a Class that can’t Have Members \nNext, we are going to use the reasoner to detect a class with a definition that means it can never have any \nmembers. In the current version of Protégé when the reasoner detects an inconsistency or problem on \nsome operating systems the UI can occasionally lock up and be hard to use. So to make sure you don’t \nlose any of your work save your ontology using File>Save. \n\nSometimes it can be useful to create a class that we think should be impossible to instantiate to make sure \nthe ontology is modeled as we think it is. Such a class is called a Probe Class. \n\n**Exercise 19: Add a Probe Class called ProbeInconsistentTopping**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select the class CheeseTopping from the class hierarchy. \n\n2. Create a subclass of CheeseTopping called ProbeInconsistentTopping. \n\n3. Click on the Add icon (+) next to the SubClass Of field in the Description view for \nProbeInconsistentTopping. \n\n4. Select the Class hierarchy tab from the dialogue that pops up. This will bring up a small view that \nlooks like the class hierarchy tab you have been using to add new classes. Use this to navigate to and \nselect the class VegetableTopping. Click on OK. \n\n5. Make sure to save your current ontology file. Now run the reasoner. You should see that \nProbeInconsistentTopping is now highlighted in red indicating it is inconsistent. \n\n6. Click on ProbeInconsistentTopping to see why it is highlighted in red. Notice that at the top of the \nDescription view you should now see owl:Nothing under the Equivalent To field. This means that the \nprobe class is equivalent to owl:Nothing. The owl:Nothing class is the opposite of owl:Thing. \nWhereas all individuals are instances of owl:Thing, no individual can ever be an instance of \nowl:Nothing. The owl:Nothing class is equivalent to the empty set in set theory. \n\n7. There should be a ? icon just to the right of owl:Nothing. As with any inference of the reasoner it is \npossible to click on the new information and generate an explanation for it. Do that now, click on the ? \nicon. This should generate a new window that looks like figure 4.20. The explanation is that \nProbeInconsistentTopping is a subclass of CheeseTopping and VegetableTopping but those \ntwo classes are disjoint. \n\n8. Click OK to dismiss the window. Delete the class ProbeInconsistentTopping by selecting it and then \nclicking on the delete class icon at the top of the classes view (see figure 4.4). \n\n9. Synchronize the reasoner.", + "page_start": 37, + "page_end": 37, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "OWL classes are assumed to overlap, i.e., by default they are not disjoint. This is often useful \nbecause in OWL, unlike in most object-oriented models, multiple inheritance is not discouraged \nand can be a powerful tool to model data. If we want classes to be disjoint, we must explicitly \ndeclare them to be so. It is often a good development strategy to start with classes that are not \ndisjoint and then make them disjoint once the model is more fully fleshed out as it is not always \nobvious which classes are disjoint from the beginning.", + "page_start": 17, + "page_end": 17, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "So far we have been describing object properties. These are properties that have a range that is some \nclass. As with most other object-oriented languages OWL also has the capability to define properties with \nthe range of a simple datatype such as a string or integer. Object purists will argue that everything should \nbe an object. However, to borrow a quote from The Amazing Spiderman: “with great power comes great \noverhead”. I.e., the extra capabilities that one has with a class and an instance also means that instances \ntake up more space and can be slower to process than simple datatypes. For that reason, OWL comes with \na large library of pre-existing datatypes that are mostly imported from XML. That is why many of the \npredefined datatypes in Protégé have a prefix of*xsd*for example xsd:string and xsd:integer. It is \nalso possible to create new basic datatypes. However, for the majority of use cases, if one needs a \ndatatype that doesn’t map to one of the predefined types the best solution is to usually just define a class. \n\nA property with a range that is a simple datatype is known as a datatype property. This is analogous to the \ndistinction between an association and an attribute in the Unified Modeling Language (UML) OOP \nmodeling language. A UML association is similar to an OWL object property and a UML attribute is \nsimilar to an OWL datatype property. It is also analogous to the distinction between relations and \nattributes in entity-relation modeling. A relation in an E/R model is similar to an object property in OWL \nand an attribute is similar to a datatype property. Because datatypes don’t have all the power of OWL \nobjects, many of the capabilities for object properties described in section 4.8 such as having an inverse or \nbeing transitive aren’t available for datatype properties. \n\n5.1 Defining a Data Property \nAs with other OWL entities, datatype properties can be defined either via the Data properties tab in the \nEntities tab or in the Data properties tab available via the Window>Tabs>Data properties option. \n\nWe will use datatype properties to describe the calorie content of pizzas. We will then use some numeric \nranges to broadly classify particular pizzas as high or low calorie. In order to do this we need to complete \nthe following steps: \n\n1. Create a datatype property hasCaloricContent, which will be used to state the calorie content \n\nof particular pizzas. \n\n2. Create several example Pizza individuals with specific calorie contents. \n3. Create two classes broadly categorizing pizzas as low or high calorie. \n\n**Exercise 27: Create a Datatype Property called hasCaloricContent**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Open a Data properties tab. Select owl:topDataProperty. \n\n2. Click on the Add sub property icon in the upper left corner. This works just the same as the UI for \nadding object properties. \n\n3. Name the new data property hasCaloricContent and select OK. \n\n4. Click on the (+) icon next to Domains in the Description view for hasCaloricContent. Use the Class \nhierarchy tab to select the Pizza class as the domain. \n\n5. Click on the (+) icon next to Ranges in the Description view for hasCaloricContent. Select the Built in \ndatatypes tab from the pop-up menu. Select xsd:integer7 from the rather long menu of possible built-in \ndatatypes. This is the default datatype to use for integer data properties. \n\n6. Click the Functional check box next to the Description view. A Pizza can only have one caloric content \nand hence is functional. Data properties are often functional. \n\n5. Select OK and run the reasoner. Your UI should look similar to figure 5.1. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 48, + "page_end": 48, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", + "target_page": 121, + "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Content Manager OnDemand servers manage control information and index data, store and \nretrieve documents and resource group files, and process query requests from Content \nManager OnDemand Client programs. The documents can be on disk and tape storage \nvolumes. New reports can be loaded into Content Manager OnDemand every day. This way, \nContent Manager OnDemand can retrieve the latest information that is generated by \napplication programs. \n\nWhen a user submits a query, the client program sends a search request to the Content \nManager OnDemand library server. The library server returns a list of the documents that \nmatch the query to the user. When the user selects a document for viewing, the client \nprogram retrieves a copy of the document from the object server where the document is \nstored, opens a viewing window, and displays the document. \n\nFull text search allows users to search the full content of stored documents. For example, \nusers can perform wildcard searches, fuzzy (or similar) searches, proximity searches, and \nboolean searches. \n\nDocuments or reports can also be automatically distributed to users through email or network \nprinters. The distributions can be scheduled to occur at the time that the data is loaded or at \nspecific times during the day. \n\n**1.2 Content Manager OnDemand concepts**\n\nIn this section, we examine basic concepts of Content Manager OnDemand: \n\n(cid:2) Report and document \n(cid:2) Application, application group, folder, and cabinet \n\n**1.2.1 Background information of an example company**\n\nAs we examine these concepts, we use an example company. Our fictitious company is called \nAFinancial Co. AFinancial Co is one of the largest custodians of financial transactions in the \nworld. It is one of the leaders in managing customer assets, providing financial services and \nforeign exchange services. It is also one of the leading credit card providers in the world. \n\nThe timely delivery of information and reports is fundamental to maintaining this leadership \nstatus. Products and services that provide real-time, online access to a customer’s account \nand fund information are key to competitive differentiation and are key to customer retention. \nAFinancial Co’s customers want personalized fund information, in various standard formats, \nwhich are delivered through both web and desktop interfaces. \n\n**1.2.2 Reports and documents**\n\n\n \n \n \n \n [html]\n
or searcher / interletion, e. colorinities / each as transaction / categories / represent at projust portion of a large report. For example, if a large report does not contain logical groups of paper, such as transaction lops, Content MantSensors
", + "page_start": 29, + "page_end": 29, + "source_file": "sg246915.pdf" + }, + { + "text": "**10.1 Introduction**\n\nFor this chapter, unless explicitly stated otherwise, the term “data” is used to refer to the \nreport data, the extracted documents or segments, and their related indexes and the \nextracted resources. \n\nA Content Manager OnDemand system logically stores data in*application groups*. An \napplication group is defined by the Content Manager OnDemand administrator. It consists of \ndata that has the same indexing, data storage, and expiration requirements. The application \ngroup definition also specifies where the report and document data are stored, how long the \ndata is stored, and how the data expires. The method or methods that can be used to expire \nthe data are a function of the application group parameters that are defined before the data is \nloaded into Content Manager OnDemand. In a Content Manager OnDemand system, data \ntypically goes through a lifecycle of loading, storing, migration, and an expiration process. \n\n**10.2 Loading and storing the data**\n\nThe Content Manager OnDemand architecture allows the control and management of the \ndata throughout its lifecycle. The data lifecycle begins with running an efficient load process. \nEach load process invocation ingests report data for a specified application group. \n\nDuring a load process, Content Manager OnDemand stores report (document) data, its \nresources, and index data, as shown in Figure 10-1. \n\n\n\n**Load**\n**Process**\n\n**Indexes**\nSeg ment-1 \ntabl e \n\nAg Data \nTab le \nD ataba se \nMa nag er \n\nSeg ment-n \ntabl e \n\n*Figure 10-1 Data and index storage locations*\n\nThe Content Manager OnDemand load process identifies, segments, and compresses \ngroups of documents into storage objects that are then stored in the Content Manager \nOnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage \nprocess, Content Manager OnDemand aggregates the stored documents (typically a few \nkilobytes in size) into storage objects. This aggregation provides efficient, high-volume \nstorage, retrieval, and expiration performance.", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "OnDemand \nObject Server \n\n\n\n\n\n\n\nOnDemand \nLibrary Server Full Text Search \nServer \n\n*Figure 1-1 Content Manager OnDemand system overview*\n\nContent Manager OnDemand Client programs provide authorized users with high-speed \naccess to the archived data that runs on the user devices (workstations) that are attached to \nthe network and communicate with the Content Manager OnDemand servers. \n\nA Content Manager OnDemand server consists of multiple components that can be installed \non a single system or multiple systems. In all cases, the installation appears to the users as a \nsingle server. The installation and is administered by the Content Manager OnDemand \nadministrator as a single system. \n\nThe Content Manager OnDemand server includes the following components: \n\n(cid:2) A single library server: The library server manages a database that contains the \n\ninformation about the users of the system, and the reports and data that are stored on the \nsystem. \n\n(cid:2) One or more object servers: The object servers manage the data on disk or tape storage \ndevices. \n\n(cid:2) One or more archive servers: The archive server stores the archived data objects. \n\nDepending on the operating system, the archive servers might be IBM Tivoli® Storage \nManager, object access method (OAM), or Archive Storage Manager (ASM). \n\nThe library server and the object server can be packaged separately or as a single executable \nfile. \n\n**Content Manager OnDemand Client programs**\nContent Manager OnDemand Client programs operate on various environments, including \npersonal computers that are running on Windows, web browsers, and mobile devices. By \nusing the client program, users can search for and retrieve reports that are stored on the \nsystem. Specifically, users can construct queries and search for reports, retrieve documents \nfrom Content Manager OnDemand, view, print, and fax copies or pages of documents, and \nattach electronic notes to the pages of a document.", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" + }, + { + "text": "Log on to the Content Manager OnDemand Administrator Client and configure tracing by \ncompleting the following steps: \n\n1. Right-click the server name and select**Trace Parameters**, as shown in Figure 18-16. \n\n*Figure 18-16 Configure trace parameters*\n\n2. In the System Trace Setting window (Figure 18-17), complete the following steps: \n\na. Select the**Activate System Trace**check box to turn on tracing for the whole system. \n\nb. Enter information in the Trace Parameters entry field. The trace parameters can be \nname=value pairs that are separated by commas to define the trace level. These \nname=value pairs are provided by IBM Support. For an example, see Figure 18-17. \n\n*Figure 18-17 System trace settings*\n\nc. Click**Update**. You do not need to restart Content Manager OnDemand. \n\nAfter the trace is collected, you can send the trace file to IBM Support. \n\n**Note:**You can stop or start the runtime trace from the Content Manager OnDemand \nAdministrator Client anytime without restarting**arssockd**. \n\n**Important:**Use trace only with the help of IBM Support because activating trace might \nseverely affect the performance of the Content Manager OnDemand system.", + "page_start": 424, + "page_end": 424, + "source_file": "sg246915.pdf" + }, + { + "text": "**2.3 Implementing a Content Manager OnDemand instance on a**\n**multiplatform UNIX environment**\n\nIn this section, we describe how to set up a single instance in a Content Manager OnDemand \nfor a multiplatform UNIX environment. Always refer to the product documentation of your \nrelease for the specific steps to follow. \n\n**2.3.1 Defining a single instance**\n\nBy default, the initial instance on any library server is named archive. Creating a single \ninstance can be summarized by the following steps: \n\n1. Creating a user \n2. Creating a DB2 instance \n3. \n4. Setting up Secure Sockets Layer (SSL) \n5. Storing user IDs and passwords in a stash file \n6. \n7. Configuring the instance \n8. Creating a Content Manager OnDemand database \nInitializing the system log and system load facility \n9. \n\nInstalling IBM Global Security Kit \n\nInstalling and configuring Tivoli Storage Manager \n\n**Creating a user**\nNew installations (instances) of Content Manager OnDemand can be configured to run under \na user other than the root user. If you plan to run an instance under a user other than root, \ncomplete the following steps: \n\n1. Create the user for the Content Manager OnDemand instance owner that is a member of \nthe database owners group. \n\n2. Give the user administrator authority to the database. \n\n3. Set permissions for the cache storage file systems. \n\n4. Set permissions for the Content Manager OnDemand configuration and script files. \n\n5. Give the instance owner permission to write to the system console. \n\n6. Specify the instance owner in the ARS.INI file. \n\nIf you plan to run a distributed library and object server system, with one or more object \nservers on different workstations or nodes than the library server, you must also configure \nContent Manager OnDemand on the object servers. \n\nTo configure Content Manager OnDemand on the object servers, complete the following \nsteps: \n\n1. Create a group and user for the Content Manager OnDemand instance owner. \n\n2. Give ownership of the cache storage file systems that are listed in the ARS.CACHE file to the \ngroup and user for the Content Manager OnDemand instance owner. \n\n3. Give permission to read the following files to the Content Manager OnDemand instance \nowner: \n\n– ARS.CACHE \n– ARS.CFG \n– ARS.INI \n– ARS.DBFS \n\n4. Give permission to write to the console to the Content Manager OnDemand instance \nowner. \n\n**Creating a DB2 instance**\nWhen you create a DB2 instance, you must install DB2 on the server. Complete the following \nsteps: \n\n1. Install IBM DB2 Universal Database™ Enterprise Edition. \n\n2. Select**Typical**as the installation type to install all of the DB2 components that are \nrequired to support Content Manager OnDemand. \n\n3. Create the DB2 instance for Content Manager OnDemand when you install DB2. Use the \nfollowing values: \n\n– Instance Owner: archive*.*\n– Group Name: gname*.*The group must have SYSADM authority. \n– Home Directory: /home/archive. \n– Auto start DB2 instance at boot time: no. \n– Create a sample database for DB2 instance: no. \n\n**Installing IBM Global Security Kit**\nWhen you install the IBM Global Security Kit (GSKit), you can complete the task by using one \nof the following methods: \n\n(cid:2) SMIT GUI \n(cid:2)**installp**command", + "page_start": 42, + "page_end": 42, + "source_file": "sg246915.pdf" + }, + { + "text": "**17.1 Content Federation Services for Content Manager**\n**OnDemand and IBM Enterprise Records overview**\n\nIBM FileNet Content Federation Services enables organizations to access content from \nnumerous heterogeneous repositories anywhere in the enterprise and federate this \ninformation to provide a single enterprise source for critical business content. Content \nFederation Services for Content Manager OnDemand enables enterprises to perform \nfederation, search, retrieve, and records management functions across Content Manager \nOnDemand repositories. \n\nIBM Enterprise Records positions your business to provide legally compliant records that \nmeet government regulations at the time of inquiry that follow your corporate record policy file \nplan. \n\nContent Manager OnDemand handles a high volume of document ingestion to the system, \ntypically of a static nature, such as credit card or bank statements. Each document ingestion \nmight contain thousands of individual documents or pages. Content Manager OnDemand \noffers a retention feature so that you can set the document retention for a fixed period at the \ndocument ingestion time, for example, an investment company that applies a simple retention \npolicy of eight years to all of their customer statements. \n\nContent Manager OnDemand does not apply an event-based retention policy that is based \non, for example, the date that the customer closed an account. In this scenario, the clock \ndoes not begin the eight-year period until the customer closes the account. By enabling \nrecords federation services by using Content Federation Services for Content Manager \nOnDemand, you can manage Content Manager OnDemand content in a manner that is \nconsistent with your organization’s records retention policies. \n\nWhen Content Manager OnDemand content is federated and declared as a record in \nEnterprise Records, Content Manager OnDemand content can be tied to dynamic retention \npolicies, such as account closure, policy termination, contract execution, or any other event. \nIn these circumstances, records federation services can allow your organization to retain \ncontent for a certain amount of time, starting on the date of the event. Companies must \ndesign their policies carefully to manage a large collection of data correctly when the \ncompany deals with various regulatory policies and litigation. \n\nWhen it is time to expire data, with federated and declared content by using Content \nFederation Services for Content Manager OnDemand, Content Manager OnDemand can \ndelete the original load (which contained multiple documents) and at the same time reingest \nthose documents that must be retained. \n\nWhen you use Enhanced Retention Management, you enable the holding documents \nimmediately and prevent expiration. Although this feature is powerful, it does not position your \nbusiness to make a Content Manager OnDemand captured report or document a compliant \nrecord to meet government regulations. You must enable the feature that meets your business \nrequirements: \n\n(cid:2) Use Enhanced Retention Management in Content Manager OnDemand to hold \ndocuments and prevent expiration. \n\n(cid:2) Use Enterprise Records to make documents into compliant records and to enable them for \nevent-based expiration.", + "page_start": 389, + "page_end": 389, + "source_file": "sg246915.pdf" + }, + { + "text": "*Figure 5-24 Content Manager OnDemand for i Add an Application Group Storage Management tab*\n\n**Cache Data**\nThe Cache Data setting determines whether the report data is stored in disk cache, and if so, \nhow long it is kept in cache before it expires. If the Cache Data for n Days option is selected, \nthe search cache is always selected. \n\n*Search cache*determines whether Content Manager OnDemand searches cache storage \nwhen users retrieve documents from the application group. When you set Cache Data to No, \nyou can configure Content Manager OnDemand to retrieve existing documents from cache \nstorage while preventing new documents from being copied to cache storage. If you choose \nnot to store reports in cache, you must select a storage set that supports archive storage. \n\n**Life of Data and Indexes**\nThe Life of Data and Indexes settings determine the length of time that report data, indexes, \nand resources are maintained in the Content Manager OnDemand system before they are \ndeleted from the application group. The report data, indexes, and resources can be \nmaintained indefinitely, if set to never expire, or they can be kept for up to 273 years. If your \nretention requirements change, the Life of Data and Indexes value can be changed. The \nchange affects data that is already archived and new data that is stored to the application \ngroup. \n\nDisk Storage Manager maintains documents on disk. It is initiated by the Start Disk Storage \nManagement (**STRDSMOND**) command. Disk Storage Manager can delete documents after they \nexceed the cache data or Life of Data periods. For more information about running the \n**STRDSMOND**command, see the*IBM Content Manager OnDemand for i - Common Server*\n*Administration Guid*e, SC19-2792.", + "page_start": 150, + "page_end": 150, + "source_file": "sg246915.pdf" + }, + { + "text": "*Figure 1-2 Reports and documents*\n\n**1.2.3 Application, application group, folder, and cabinet**\n\nThe terms*application*,*application group*,*folder*, and*cabinet*represent how Content \nManager OnDemand stores, manages, distributes, retrieves, displays, and prints reports and \nindex data. When you define a report or type of data to Content Manager OnDemand, an \nadministrator must perform the following tasks: \n\n(cid:2) Create an application and assign the application to an application group. \n\n(cid:2) Create or update a folder to use the application group and application so that users can \nsearch for and retrieve documents. \n\n(cid:2) Optionally, create or update a cabinet.*Cabinets*are containers for collections of folders. \nThey allow users to manage and navigate folders more easily. \n\n**Application**\nAn*application*describes the physical characteristics of a report to Content Manager \nOnDemand. Typically, you define an application for each program that produces output to be \nstored in Content Manager OnDemand. The application includes information about the format \nof the data, the orientation of data on the page, the paper size, the record length, and the \ncode page of the data. The application also includes parameters that the indexing program \nuses to locate and extract index data and processing instructions that Content Manager \nOnDemand uses to load index data in the database and documents on storage volumes. \n\n**Application group**\nAn*application group*contains the storage management attributes of and index fields for the \ndata that you load into Content Manager OnDemand. When you load a report into Content \nManager OnDemand, you must identify the application group where Content Manager \nOnDemand loads the index data and stores the documents. \n\nAn application group is a collection of one or more Content Manager OnDemand applications \nwith common indexing and storage management attributes. You typically group several \nrelated reports in an application group so that users can access the information that is \ncontained in the reports with a single query. All of the applications in the application group \nmust be indexed on one or more common fields, for example, customer name, account \nnumber, or date.", + "page_start": 31, + "page_end": 31, + "source_file": "sg246915.pdf" + }, + { + "text": "**Chapter 17. Content Federation Services for**\n**Content Manager OnDemand and**\n**IBM Enterprise Records**\n\nIn this chapter, we describe how to enable records management for an IBM Content Manager \nOnDemand (Content Manager OnDemand) solution. By default, report and document \nexpiration are controlled by the storage managers that are integrated with Content Manager \nOnDemand. By using the storage managers, you can assign a retention period at data \ncapture time. IBM Enterprise Records enhances retention capabilities with the flexibility to \nassign event-based retention and make a report or document an official compliant record to \nmeet numerous government regulations. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Content Federation Services for Content Manager OnDemand and IBM Enterprise \nRecords overview \n\n(cid:2) Administration of Content Federation Services for Content Manager OnDemand for \nEnterprise Records \n\n(cid:2) Content Federation Services for Content Manager OnDemand architecture \n\n(cid:2) Deployment considerations", + "page_start": 388, + "page_end": 388, + "source_file": "sg246915.pdf" + }, + { + "text": "(cid:2)*MustGather: IBM Content Manager OnDemand server hang or performance degradation*\n*on AIX*, reference # 1222374 \n\n(cid:2)*MustGather: IBM Content Manager OnDemand server crash on AIX*, reference # 1223109 \n\nFollow the instructions from the technotes to gather information when the server hangs or \ncrashes. \n\n**18.2.8 Exporting information to a local server**\n\nIBM Support might require information about the Content Manager OnDemand application \ngroup, application, and folder for problem determination. \n\nTo create a local server to export object information, complete the following steps: \n\n1. Create a local server on your workstation: \n\na. From your Content Manager OnDemand Administrator Client, select**OnDemand**\n**Servers**and then click**File**→**New Server**. See Figure 18-11. \n\n*Figure 18-11 Setting up a local server*\n\nb. From the Add a Server window that opens, for the Protocol field, select**Local**, and \n\nenter the information that is shown in Figure 18-12. Click**OK**. A local server with the \nname ODlocal is created. \n\n*Figure 18-12 Add a Server window*\n\n2. The local server cannot be used until it is set up. Right-click the ODlocal server and select \n**Setup,**as shown in Figure 18-13 on page 398. \n\n*Figure 18-13 Setting up the local server*\n\nWhen you see the prompt “Are you sure?”, click**OK**. \n\nWhen the setup is complete, the local server is ready to use. By default, the local server \nhas a user that is named admin without any password. \n\n3. Export the requested information from your server to the local server. Right-click the object \nand select**Export**. For example, if you want to export the application group with the name \nRedbk, right-click the object**Redbk**and select**Export**, as shown in Figure 18-14. \n\n*Figure 18-14 Export Application Groups*\n\n4. \nIn the Export Application Groups window (Figure 18-15) that opens, export your \napplication groups by completing the following steps: \n\na. From the Server list, select the server to be exported. \n\nb. Click**Export**. The information of the application group that you chose starts \ntransferring to ODlocal. \n\nc. Check the message at the end of the export to ensure that the export is successful. \n\nd. You can select either of the following options: \n\n(cid:129) Select**Ignore Warnings**if you want Content Manager OnDemand to add an item \n\nregardless of any warnings. Otherwise, Content Manager OnDemand stops \ntransferring the item when the first warning is encountered. For example, if the \napplication group has users and groups permissions that are defined in the source \nserver, but the users and groups are not present in the local server, the export fails. \nIf the item to be exported exists on the destination server, the export also fails. \n\n(cid:129) Select**No Storage Set**if you do not want Content Manager OnDemand to assign a \nstorage set to the application group.", + "page_start": 420, + "page_end": 420, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", + "target_page": 188, + "target_passage": "No", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "You must consider several factors when you use large object support: \n\n(cid:2) The report must be indexed with an indexing program that generates a large object by \n\ndividing large documents into smaller parts and defining the indexing information that is \nused to retrieve the documents. \n\n(cid:2) The amount of data per page and the number of pages that you divide documents into \naffects retrieval and viewing response time. The number of bytes per page typically \ndictates the number of pages that you can divide documents into. In general, the larger the \npage size in bytes, the smaller the number of pages that you can divide your documents \ninto. For example, if the average page in the document contains 2.5 KB of data, choose \n100 - 1000 pages per Large Object (LO) segment; if the average page in the document \ncontains 50 KB of data, choose 1 - 100 pages per LO segment. \n\n(cid:2) The capacity of your network and the traffic in the network might determine the number of \npages that you need to divide your documents into. Larger document sizes (large byte size \neven when compressed) require more network bandwidth (or more time if the bandwidth is \nnot available) to transfer from a Content Manager OnDemand server to a client. The \nnumber of users that are concurrently accessing Content Manager OnDemand and the \nsizes of the documents that are being retrieved determine the overall load in the network. \n\n(cid:2) Response time requirements. The goal of Content Manager OnDemand large objects is to \nprovide better performance and usability. Large object support clearly provides enhanced \nusability. However, you must implement large object support so that dividing your \ndocuments into parts provides better overall performance than other methods of \nsegmenting the input data. \n\nWhen you choose a large object, Content Manager OnDemand displays the Number of \nPages field. Specify the number of pages that you want Content Manager OnDemand to \ndivide documents into in the Number of Pages field. \n\nTo generate large objects, the indexer that is specified on the Indexing Information page must \nbe AFP Conversion and Indexing Facility (ACIF), OS/390, or OS/400. When you select the \nLarge Object check box, Content Manager OnDemand automatically adds the INDEXOBJ=ALL \nparameter to the indexing parameters (which causes the indexing program to generate the \nlarge object indexing information). \n\n**Exporting an application**\nIt is not possible to export an application to application groups with different database fields or \nattributes. However, you can export applications to a different server if the application group \non the target server is identical to the application group on the source server (the server on \nwhich the applications are defined). \n\nEnsure that no existing application has the same application ID in the target application \ngroup. For more information, see the section “Adding items to a server” in the*IBM Content*\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide*, SC19-3352. \n\n**Selecting font by line data graphical indexer**\nThe font that is used by the line data graphical indexer to display a document can be changed \nfrom within the line data graphical indexer at the Content Manager OnDemand Administrator \nClient.", + "page_start": 76, + "page_end": 76, + "source_file": "sg246915.pdf" + }, + { + "text": "– The*XML Indexer*allows the rapid increase in XML archiving mandates that are based \non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is \noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and \ncheck images. \n\n– The*Full Text Indexer*provides the capability to index the full text of a document (or \nreport). You can search through an indexed document. \n\n(cid:2)*Data loading programs*can be set up to automatically store report data into application \ngroups and update the database. The data loading programs can run on any Content \nManager OnDemand server. \n\n(cid:2)*Report Distribution Facility*provides an easy way to automatically group reports and \nportions of reports and distribute the reports to multiple users. Distributions can be \nprinted, created as an output file, or emailed as an attachment. \n\n(cid:2) Both the archived reports and their resources are stored in the Content Manager \n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data \nthroughout its lifetime. It provides authorized users rapid access to the data and allows the \ndata to be converted into different formats for display or print. \n\n(cid:2) A*server print*facility allows users to reprint a large volume of documents at high speed. \nPrint servers, such as Infoprint (on AIX), can be started to manage the server print \ndevices. These print servers are not part of Content Manager OnDemand and must be \npurchased separately. \n\n(cid:2) Content Manager OnDemand*management programs*maintain the Content Manager \nOnDemand database and documents in cache storage. \n\n(cid:2) A*system logging*facility provides administrators with tools to monitor server activity and \nrespond to specific events as they occur. The interface to the system logging facility is \nthrough the system log folder and the system log user exit.", + "page_start": 35, + "page_end": 35, + "source_file": "sg246915.pdf" + }, + { + "text": "XML data is loaded into Content Manager OnDemand by using the**arsload**command. For \nexample, the following statement loads the bamboo.in file and its .res file (if found): \n\narsload -I localhost -u userName -p load.stach -g ci_stmts bamboo,in \n\nThe XML indexer uses the “Generic XML Index File Format” (GXIFF). The GXIFF format is \nfunctionally similar to the Generic Index File Format in that it allows the loading of any type of \ndata into Content Manager OnDemand. \n\nFor more information about using the XML indexer, see*IBM Content Manager OnDemand -*\n*Indexing Reference*, SC19-3354. \n\n**7.8 User exits**\n\nA*user exit*is a point during processing where control is handed from the indexer program to a \nuser-written program. After the user-written program finishes, the control is handed back to \nthe indexer program. \n\nThe ACIF indexer and the OS/390 indexer support multiple user exits. The OS/400, PDF, \nXML, and Generic indexers do not support any user exits. \n\nFor a description of the ACIF user exits in detail, see 11.2, “ACIF exits” on page 242. \n\nFor a description of the OS/390 indexer user exits, see 11.3, “OS/390 indexer exits” on \npage 248. \n\n**7.9 Additional references**\n\nFor more information, see the following IBM developerWorks® articles: \n\n(cid:2)*Creating PDF Indexing Parameters Using Floating Triggers*: \n\nhttp://ibm.co/1FHsXDq \n\n(cid:2)*Understanding the ACIF Input Exit for DB2 Content Manager OnDemand*: \n\nhttp://ibm.co/1UUcCT0", + "page_start": 206, + "page_end": 206, + "source_file": "sg246915.pdf" + }, + { + "text": "(cid:2)**Problem**: Content Manager OnDemand indexing fails when only one field is defined for an \napplication group. \n\n**Reason or resolution**: The Content Manager OnDemand file name indexing feature \nneeds at minimum one index and a field value that are defined in the application indexer \nparameters. \n\nVerify that you are using a file name index with one field that is defined in the application \ngroup and no field or indexing parameter defined for the application. If these conditions are \ntrue, you must use a field. You can define a dummy literal index and field value in the \napplication indexing parameter as a placeholder. This dummy value is not processed, but \nit allows the file name to be indexed successfully. \n\n(cid:2)**Problem**: Content Manager OnDemand does not break up the PDF file into separate \nreports when TRIGGERs are defined correctly and indexing is successful. For certain \nreports, the trigger is not honored and the reports are grouped. \n\n**Reason or resolution**: The field value*must change*for Content Manager OnDemand to \nindicate a report break. In Figure 18-2, there are several pages of a document. Page 1 is \nthe TRIGGER, and the name is the field that is placed into the index. \n\n\n \n \n \n \n [html]\n
Page 1
| John Doe
Page 2
John Doe
- --
---
Page 1
John Doe
- - -
Page 1
< underline > Uohn_Smi th
\n\nIn this example, because the string Page 2 does not match the TRIGGER, it is ignored, \nand that page is included in report 1. Moreover, the report does not break until the name \nJohn Smith is read because it is different from the name John Doe. \n\n(cid:2)**Problem**: When the user views a document that is loaded with large object (LOB), the \nclient receives the message: \n\nViewer Page count does not match Load Page Count. Viewing may be adversely \naffected. Contact your system administrator. \n\nIf the user clicks OK, the document can be viewed in its entirety, except that the page \nnumber is incorrect. \n\n**Reason or resolution**: When a document is loaded as LOB, the Loader must count the \npages, because a certain number of pages go into a LOB segment. When the client \nretrieves a LOB segment, the client also counts the pages that it receives from the server. \nThe user will receive the message “Viewer Page count does not match Load Page Count” \nwhen the two page counts do not match. \n\nThis problem is usually caused by the user running ACIF to load a document that contains \nthe form feed character x'0C'. ACIF does not support the form feed character as the start \nof a new page, but the line data viewer does support the form feed character as the start of \na new page. Therefore, the viewer ends up with a different count of pages than the loader.", + "page_start": 403, + "page_end": 403, + "source_file": "sg246915.pdf" + }, + { + "text": "**Document indexing**\n*Document indexing*is used for reports that contain logical items, such as customer name or \nnumber. Each of the items in a report can be individually indexed on values, such as account \nnumber, customer name, and balance. Content Manager OnDemand supports up to 128 \nindex values per item. With document indexing, the user is not necessarily required to know \nabout reports or report cycles to retrieve a document from Content Manager OnDemand. \n\n**Report indexing**\n*Report indexing*is used for reports that contain many pages of the same type of data, such as \na transaction log. Each line in the report usually identifies a specific transaction, and it is not \ncost-effective to index each line. Content Manager OnDemand stores the report as groups of \npages and indexes each group. \n\nWhen reports include a sorted transaction value (for example, transaction date and number), \nContent Manager OnDemand can index the data on the transaction value. This indexing is \ndone by extracting the beginning and ending transaction values for each group of pages and \nstoring the values in the database. This type of indexing lets users retrieve a specific \ntransaction value directly. \n\n**1.3 Content Manager OnDemand server and its components**\n\nOn IBM z/OS® and Multiplatforms (MP) systems, the Content Manager OnDemand server \ncan be implemented as a library server and one or more object servers that are on one or \nmore nodes that are connected to a Internet Protocol network. For the Content Manager \nOnDemand system overview, see Figure 1-1 on page 5. \n\n**1.3.1 Library server and object server**\n\nA Content Manager OnDemand*library server*maintains two sets of database tables: \n\n(cid:2) The first set of database tables contains indexes about the reports that are stored in the \nContent Manager OnDemand Archive. \n\n(cid:2) The second set of database tables contains information about the objects that are defined \nto the system, such as users, groups, printers, application groups, applications, folders, \ncabinets, and storage sets. \n\nThe database manager provides the database engine and utilities to administer the database. \nThe library server processes client logons, queries, and print requests and updates to the \ndatabase. The major functions that run on the library server are the request manager, the \ndatabase manager, and the server print manager. \n\nA Content Manager OnDemand*object server*maintains documents on cache storage \nvolumes and an ASM. ASMs, such as Tivoli Storage Manager on Multiplatform systems, OAM \non z/OS systems, or ASM on IBM i systems, allow hierarchical storage management \ntechniques to be applied to the stored documents. An object server loads data, retrieves \ndocuments, and expires documents. The major functions that run on an object server are the \ncache storage manager, data loading and maintenance programs, and optionally, the ASM. \n\nThe basic Content Manager OnDemand configuration is a library server and an object server \non the same physical system or node. This single library or object server configuration \nsupports the database functions and cache storage on one system. You can add an ASM to \nthe single library or object server configuration to maintain documents on archive media.", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "Because this architecture enables a system to create tables when the maximum table size is \nreached, no logical limitation exists to the system; rather, the limitation is on the physical \nresources, such as processing power, disk space, object servers, and storage hardware. \n\n**4.4 Search sequence**\n\nTo better understand the relationship between the various Content Manager OnDemand \ntables, we describe a search sequence within a Content Manager OnDemand system in this \nsection. A search sequence scans through multiple Content Manager OnDemand tables. We \ndescribe the logical flow that the system goes through during a Content Manager OnDemand \nsearch. \n\nBy using the Content Manager OnDemand standard Windows client, you can open a search \ncriteria window (see Figure 4-3). In our example, four index fields exist: Name, Account, \nStatement Date, and Balance. The example shows a search for a specific date and balance \namount. \n\n*Figure 4-3 Content Manager OnDemand Client search criteria window*\n\nAfter you enter these values, Content Manager OnDemand uses the date information and \nsearches the segment table ARSEG to find the application group data table that contains that \ndate. Content Manager OnDemand then searches the identified table_name (in our example \nHAA1) for the index values (1994-03-07 and 104.18) and finds the matching*Statement_date*\nand the*Balance*and returns these values to the client in a search result list. \n\nAny individual document from within this result list can then be retrieved for display on the \nclient. Content Manager OnDemand locates the document in the archive by using the object \nname, document offset, and length. In the background, the document data is automatically \ndecompressed before it is displayed. \n\nFigure 4-4 on page 85 shows the details of this search sequence from a folder.", + "page_start": 107, + "page_end": 107, + "source_file": "sg246915.pdf" + }, + { + "text": "**13.3 Data retrieval performance**\n\nAll Content Manager OnDemand clients (such as the Windows client, CICS client, IBM \nContent Navigator, ODWEK application programming interfaces (APIs), and structured APIs) \nretrieve data from the Content Manager OnDemand server by using a standard proprietary \nContent Manager OnDemand protocol. From a Content Manager OnDemand server \nperspective, no difference exists between one client and another client. \n\n**13.3.1 Data retrieval parameters**\n\nVarious parameters affect data retrieval performance. \n\n**Folder parameters: General tab**\nIn the Content Manager OnDemand Administrator Client, under the Folder parameter and on \nthe General tab, the following option is available: \n\n(cid:2) Note Search: If the Annotation flags in a document database are set to No in the Advanced \ntab of the General window of the Application Group, this option determines when Content \nManager OnDemand searches the database for annotations and notifies users that \nannotations exist for the documents that match a query. Content Manager OnDemand \nprovides three search and notification methods: \n\n– Hit List: Content Manager OnDemand searches for annotations when the user runs a \nquery. When annotations exist for a document, the client programs display a note icon \nnext to it in the document list. This method has a direct performance impact on the \ngeneration of the document list. \n\n– Retrieve: Content Manager OnDemand searches for annotations when the user \nselects a document for viewing. This method is the default and recommended value. \n\n– Note: Content Manager OnDemand searches for annotations when the user chooses \nthe Note option while the user views a document. \n\n**Folder parameters: Permissions tab**\nIn the Content Manager OnDemand Administrator Client, under Folder parameters and on \nthe Permission tab, the following option is available: \n\n(cid:2) Max Hits: Determines the maximum number of hits that are retrieved and transmitted to \n\nthe client. By reducing the maximum number of hits, users are forced to enter queries that \nbetter match the documents that they are searching for. By reducing the maximum number \nof hits, the system resources are used optimally both in performing the queries and in \ndownloading the resulting document list. \n\n**TCP/IP considerations**\nA known Windows configuration setting might affect performance when you connect to a \nContent Manager OnDemand server. During repeated searches and retrievals on a Content \nManager OnDemand server, many Windows sockets are opened and closed. Two default \nWindows settings might affect heavy traffic between the client and the Content Manager \nOnDemand server: \n\n(cid:2) When an application closes a Windows socket, Windows places the socket’s port into \nTIME_WAIT status for 240 seconds; during this time, the port cannot be reused. \n\n(cid:2) Windows limits the number of ports that an application can use to 5000.", + "page_start": 327, + "page_end": 327, + "source_file": "sg246915.pdf" + }, + { + "text": "**Indexing and loading**\n\nIn this chapter, we describe the various indexers that are available for IBM Content Manager \nOnDemand (Content Manager OnDemand). \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Introduction \n(cid:2) Getting started with PDF indexing \n(cid:2) Getting started with ACIF indexing \n(cid:2) OS/390 indexer on z/OS and AIX \n(cid:2) OS/400 indexer on Content Manager OnDemand on IBM i \n(cid:2) User exits \n(cid:2) Additional references", + "page_start": 184, + "page_end": 184, + "source_file": "sg246915.pdf" + }, + { + "text": "**Chapter 12. Scalability, reliability, and**\n\n**availability architectures**\n\nIBM Content Manager OnDemand (Content Manager OnDemand) is a lightweight process, \nthat is, the Content Manager OnDemand code itself does not require extensive system \nresources to perform the functions that are required of it. Content Manager OnDemand \ninstallations scale to handle both large quantities of data and many users. The total quantity \nof data that is stored or retrieved at any time is the main contributor to the resource \nconsumption on the server. This chapter focuses on the scalability, reliability, and availability \nof Content Manager OnDemand systems. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Scalability, reliability, and availability defined \n(cid:2) Scaling a Content Manager OnDemand system \n(cid:2) High availability", + "page_start": 306, + "page_end": 306, + "source_file": "sg246915.pdf" + }, + { + "text": "The OS/390 indexer is enhanced to allow the storage of documents (or large object \nsegments) that exceed 2 GB. A report might contain multiple documents (or large object \nsegments), each of which exceeds 2 GB. This enhancement does not affect the limitations \nthat are imposed by other indexers. The limitations on the document size are based on the \navailable hardware and any other limitations that are placed on the operating environment. \n\nFor more information about the use of the OS/390 indexer, see*IBM Content Manager*\n*OnDemand - Indexing Reference*, SC19-3354. \n\n**7.6 OS/400 indexer on Content Manager OnDemand on IBM i**\n\nThe OS/400 indexer is a powerful tool to index the print data streams of IBM i application \nprograms. Supported data streams include SCS, AFP, and the less common SCS-Extended \nand Line Data. \n\nThe OS/400 indexer provides three major functions: \n\n(cid:2) Print data stream processing: The OS/400 indexer processes the output print data \n\nstreams of application programs, for example, SCS, AFP, and Line Data reports. The \noutput can be viewed, printed, and archived by Content Manager OnDemand. \n\n(cid:2) Sophisticated indexing functions: The OS/400 indexer can logically divide reports into \nindividual items, such as statements, policies, and bills. You can define up to 32 index \nfields for each item in a report if you are running a Content Manager OnDemand server \nversion that is earlier than version 9.0.0.1. Beginning at version 9.0.0.1 of the server, \n128 index fields can be defined. \n\n(cid:2) AFP resource collection: For AFP spooled files, the OS/400 indexer determines the \n\nresources that are necessary to view, print, and archive the print data stream and collect \nthe resources (except fonts, which are not stored but are mapped by the client during \ndisplay). Resources allow users to view the report as it displayed in the original printed \nversion, regardless of when or where the report was created. \n\nThe OS/400 indexer supports many advanced features: \n\n(cid:2) Multi-key indexes \n(cid:2) Spool File Archive compatibility \n(cid:2) Start Indexing on Page \n(cid:2) Translate Print Control \n(cid:2) AFP support with or without TLEs \n(cid:2) Large object support \n\nThe OS/400 indexer processes three input sources: \n\n(cid:2) Indexing parameters that specify how the data needs to be indexed. The indexing \nparameters are created when you define a Content Manager OnDemand application. \n\n(cid:2) AFP resources that are required to view and print the data if the application created an \nAFP print data stream. \n\n(cid:2) The print data stream, which can be in a spooled file (all data types) or in a physical file \n(Line Data or SCS data that was converted to Line Data with First Character Forms \nControl (FCFC) characters in column one of the data).", + "page_start": 203, + "page_end": 203, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", + "target_page": 232, + "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "(cid:2) For IBM i, depending on your retrieval patterns and system hardware configuration, it \n\nmight be advantageous to*not*store a duplicate set of documents in the Content Manager \nOnDemand cache when you use ASM because ASM might already be using disk space. If \nthe application group uses ASM, caches the data, and specifies the migration of data at \nload time, two copies of the data are stored during the load. One copy is stored in cache, \nand one copy is stored in the ASMREQUEST directory. \n\nTo avoid storing a duplicate set of documents in cache for non-AFP data, change Cache \nData to No on the Storage Management tab of your application group definition. To avoid \nstoring a duplicate set of documents in cache for AFP data, you might change Document \nData to No Cache but leave Resource Data in cache for faster retrieval. \n\n(cid:2) For IBM i, every user that loads data must have a home directory. If users do not have a \nhome directory, the temporary files are stored in the root directory of the integrated file \nsystem (IFS). \n\n(cid:2) If the data source is on a remote system, you can load the data into Content Manager \nOnDemand on the remote system and directly store the export data to the specified \nContent Manager OnDemand library and object server. \n\nOr, if the data source is on a remote system, you also can upload the data to the specified \nContent Manager OnDemand server through FTP and then load the data on the selected \nContent Manager OnDemand system. \n\n(cid:2) For Multiplatforms and z/OS, all file systems must be dedicated file systems that are \nmounted on their own mount points. \n\n(cid:2) For z/OS, when you load PDF reports (by using the PDF Indexer), placing the input report \nin the HFS or zFS causes the load to run nearly 50 times faster that compared to the input \nreport that is placed in a VSAM file. \n\n**13.2.3 Load testing**\n\nThe goal of load testing is to verify that, under stressful system conditions, the required \namount of data can be loaded into the Content Manager OnDemand system within a time \nwindow. \n\nA general approach to load testing a system is described: \n\n(cid:2) Parallel loads: Run a single load and measure the load throughput. If the throughput does \nnot meet the requirements, run two loads in parallel and measure the throughput. While \nthe loads are run, collect system statistics to determine the system resources that are \nbeing used and any potential bottlenecks. Tune or acquire additional system resources as \nneeded. Progressively increase the number of parallel loads until the required throughput \nis met. \n\n**Note:**For most users, a single load process meets the ingestion throughput \nrequirements. \n\n(cid:2) Data types and exits: A different data type, and whether an exit is started during the load \nprocess, affects the load throughput. Test samples of the different types that represent the \ngeneral loads.", + "page_start": 326, + "page_end": 326, + "source_file": "sg246915.pdf" + }, + { + "text": "**9.1 Overview of data conversion**\n\nTo work with data conversion, understand the data conversions that are required, and when \nand how to convert the data. Perform detailed planning before you build your solution so that \nyou achieve a design that remains efficient for many years. \n\nIn this section, we describe why you might need data conversion, when to convert the data \nstream, and how to convert the data. \n\n**9.1.1 Why convert data streams**\n\nYou might want to convert data streams for many reasons: \n\n(cid:2) Certain data streams, such as Hewlett-Packard (HP) Printer Command Language (PCL) \nor Xerox metacode, are printer-specific and cannot be displayed. Before you archive or \ndisplay the documents, these data streams must be transformed into a compatible format. \n\n(cid:2) The archived data stream might need to comply with a company’s internal rules or \n\nregulations. Therefore, the produced data streams must be transformed into the defined \nand required final format before they are archived. \n\n(cid:2) The documents might need to be accessible by a user that is outside of the company. The \ndocument must be displayed through standard tools that are available on any or at least \nmost of the clients, such as an Internet browser or Adobe Acrobat Reader. \n\n(cid:2) The documents might need to be manipulated so that only part of the document is \ndisplayed in a personalized way. \n\n**9.1.2 When to convert data streams**\n\nThe decision of*when*to convert data streams relies mainly on the use of the system. \nTypically, converting data at load time requires more time to process the print stream file, and \nconverting data at retrieval time causes the user retrieval to be a little slower. The decision \nmight depend on how many documents are retrieved, compared to how many documents are \nloaded daily. It might also depend on legal requirements about the format of stored data. \n\n**AFP to PDF**\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) \nformat over the web, from a storage perspective, it is more efficient to store the documents in \ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored \nmore efficiently than PDF documents. \n\nThe PDF print stream, when it is divided into separate customer statements, is larger than \nAFP because each statement contains its own set of structures that are required by the PDF \narchitecture to define a document. \n\nElapsed time and processor time are also essential factors in the decision-making process. \nThe amount of time (elapsed and CPU) that is needed to convert the document depends on \nhow large the document is and how many resources or fonts are associated with the \ndocument. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTablePatients
", + "page_start": 231, + "page_end": 231, + "source_file": "sg246915.pdf" + }, + { + "text": "From a performance perspective, the use of the transaction data field for transaction-style line \ndata optimizes indexing performance by reducing the number of index values to be inserted \ninto the database. Therefore, the process of loading and retrieving these large reports is \nfaster and the Content Manager OnDemand database is many times smaller. \n\n**13.4.3 AFP data**\n\nAFP data is a multi-part data type. In addition to the variable data, external resources, such \nas images, fonts, and logos, are also referenced by the AFP data stream. When Content \nManager OnDemand stores AFP data, the resources are also archived. When the data is \nviewed, the referenced resources are displayed. \n\nIt is a common misconception that if fonts are collected when the data is loaded, they are \navailable for viewing in the Windows client. However, Windows does not recognize AFP fonts. \nIt is not possible to use these fonts even if they are sent to the client as part of the resource. \nWindows clients require a mapping from AFP fonts to Adobe Type Manager (ATM) fonts or \nTrueType (TT) fonts. Content Manager OnDemand provides this mapping for most standard \nfonts. For more information about mapping custom fonts, see*IBM Content Manager -*\n*Windows Client Customization Guide and Reference*, SC27-0837. \n\nOne possibly useful implementation of storing fonts with the resource group is when server \nreprint is necessary. If the fonts are stored with the resource group, they can be retrieved from \nContent Manager OnDemand and used by AFP printers. However, if fonts are collected, they \nare also sent to the client as part of the resources group and then discarded. Storing the fonts \nwith the resource group serves only to increase network traffic when transferring the resource \nto the workstation. A more practical option for server printing is to store the font in a fontlib \nand to keep only the reference (path) to the fontlib. Although the font is accessible on the \nserver, Print Services Facility (PSF) or InfoPrint does not need the font to be inline (stored in \nthe resource group). The use of this approach also allows all AFP data that references the \nfont to use the single instance of the font without redundant inline storage. \n\nFigure 13-5 on page 311 shows the indexer information in the application where you can \nselect the resources to collect with the Restype= parameter. Unless reprints to AFP printers \nwith 100% fidelity is a requirement, do not collect the fonts.", + "page_start": 333, + "page_end": 333, + "source_file": "sg246915.pdf" + }, + { + "text": "**13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be \narchived within Content Manager OnDemand. The following key advantages are available by \nusing this data type as a document format: \n\n(cid:2) It is a read-only format that does not require any external resources, such as images or \nfonts. It is self-contained. \n\n(cid:2) The viewer for PDF can be downloaded at no charge from the Adobe website and the \nbrowser plug-ins for PDF are also available at no charge. \n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in \nthe data stream once and then referenced many times from within the PDF file. If a large \nreport is produced from many small documents, that report requires only one copy of the \nresources. \n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the \ninput file. Each of these documents requires a certain number of PDF structures, which define \na document. These documents are concatenated together in the .out file, and then loaded \ninto Content Manager OnDemand as separate documents. Because the resources are \nextracted and placed into a separate resource file, they are not included in each document. \nFor an illustration of the process, see Figure 13-3. \n\n\n\n\n\n\n\n*Figure 13-3 PDF indexing*\n\nIf no resources are collected, the size of the .out file, which contains all of the individual \ndocuments, might be larger than the original file. For tips about how to reduce the size of the \noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on \npage 173.", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" + }, + { + "text": "You must consider several factors when you use large object support: \n\n(cid:2) The report must be indexed with an indexing program that generates a large object by \n\ndividing large documents into smaller parts and defining the indexing information that is \nused to retrieve the documents. \n\n(cid:2) The amount of data per page and the number of pages that you divide documents into \naffects retrieval and viewing response time. The number of bytes per page typically \ndictates the number of pages that you can divide documents into. In general, the larger the \npage size in bytes, the smaller the number of pages that you can divide your documents \ninto. For example, if the average page in the document contains 2.5 KB of data, choose \n100 - 1000 pages per Large Object (LO) segment; if the average page in the document \ncontains 50 KB of data, choose 1 - 100 pages per LO segment. \n\n(cid:2) The capacity of your network and the traffic in the network might determine the number of \npages that you need to divide your documents into. Larger document sizes (large byte size \neven when compressed) require more network bandwidth (or more time if the bandwidth is \nnot available) to transfer from a Content Manager OnDemand server to a client. The \nnumber of users that are concurrently accessing Content Manager OnDemand and the \nsizes of the documents that are being retrieved determine the overall load in the network. \n\n(cid:2) Response time requirements. The goal of Content Manager OnDemand large objects is to \nprovide better performance and usability. Large object support clearly provides enhanced \nusability. However, you must implement large object support so that dividing your \ndocuments into parts provides better overall performance than other methods of \nsegmenting the input data. \n\nWhen you choose a large object, Content Manager OnDemand displays the Number of \nPages field. Specify the number of pages that you want Content Manager OnDemand to \ndivide documents into in the Number of Pages field. \n\nTo generate large objects, the indexer that is specified on the Indexing Information page must \nbe AFP Conversion and Indexing Facility (ACIF), OS/390, or OS/400. When you select the \nLarge Object check box, Content Manager OnDemand automatically adds the INDEXOBJ=ALL \nparameter to the indexing parameters (which causes the indexing program to generate the \nlarge object indexing information). \n\n**Exporting an application**\nIt is not possible to export an application to application groups with different database fields or \nattributes. However, you can export applications to a different server if the application group \non the target server is identical to the application group on the source server (the server on \nwhich the applications are defined). \n\nEnsure that no existing application has the same application ID in the target application \ngroup. For more information, see the section “Adding items to a server” in the*IBM Content*\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide*, SC19-3352. \n\n**Selecting font by line data graphical indexer**\nThe font that is used by the line data graphical indexer to display a document can be changed \nfrom within the line data graphical indexer at the Content Manager OnDemand Administrator \nClient.", + "page_start": 76, + "page_end": 76, + "source_file": "sg246915.pdf" + }, + { + "text": "Another benefit to using ODF is that you can select and combine documents from different \nreports and organize them by defining their order and separating them by using banner \npages. \n\nFigure 14-2 is an overview of the OnDemand Distribution Facility and its interaction with the \nContent Manager OnDemand server. \n\n\n\n*Figure 14-2 Content Manager OnDemand Distribution Facility overview*\n\nFigure 14-2 shows that the Content Manager OnDemand server and its operation did not \nchange. Reports and documents are loaded into the server, and system users continue to \nview and print their documents normally. The only addition to the library server is a set of ODF \ntables that define the documents that are to be distributed to which users and when. The ODF \nprocess reads the ODF tables and collects the required documents and bundles them for \neach recipient. ODF then send out the “bundles” to the appropriate destinations (email, file, \nand print). Alternatively, ODF can send each recipient (based on system definitions) an email \nnotification that the report and document were loaded and are available for viewing. \n\nDifferent organizations have different report and document load and retrieval patterns. In \ncertain cases, documents are loaded and never retrieved. In other cases, a loaded document \nis retrieved multiple times by multiple users. In other cases, it is known that when a specific \nreport or document is loaded, one or more copies must be distributed to one or more \ndestinations. What benefit does automating this distribution process provide? \n\nThe biggest benefit is that as reports are loaded into Content Manager OnDemand regularly, \nthey can be delivered automatically to one or more users as they are loaded. Also, after the \ndistribution is set up, no other changes are required, such as changing the document \nselection criteria to identify the latest data that is loaded. \n\n\n \n \n \n \n [html]\n
IT - BIII
OnDemand and sends them to a spool file for printing.
", + "page_start": 340, + "page_end": 340, + "source_file": "sg246915.pdf" + }, + { + "text": "Depending on the data that you are working with, consider these options: \n\n(cid:2) For Line Data: \n\n– The line data applet supports annotations. It can work with large object (LOB) reports if \nthe large object functionality is employed at load time. \n\n– The Ajax viewer and direct rendering capabilities of Content Navigator work only on \n\nshorter reports. Additionally, the viewing of annotations and large object documents is \nnot supported. \n\n(cid:2) For AFP data: \n\n– The AFP plug-in is the best choice, because it is almost identical to the client. However, \nit does not support annotations. \n\nThe only viewers that use this functionality are the line data applet, the AFP plug-in \nviewer, and the Content Manager OnDemand Windows client. \n\n– AFP to PDF is a choice that does not require a plug-in rollout at the users’ computers if \n\nthe Acrobat plug-in is installed on their workstations. Font mappings must be \nconfigured at a central location. The additional workload on a rendering system and \nadditional license costs must be considered. Large reports might not be able to be \nrendered or viewed. \n\n**Note:**The AFP viewer plug-in, which is available with ODWEK and Content \nManager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint \nSolutions Company. Although the standard InfoPrint viewer can be used for viewing \nAFP, the ODWEK version uses direct communication with the Content Manager \nOnDemand server, enabling segmented document transfer for LOB documents. \n\n**Annotations**\nOnly the native ODWEK viewers and the Windows client support annotations. These viewers \nand Windows clients support annotations in the following ways: \n\n(cid:2) Line data applet: Supports text. Starting with version 9, the viewer can work with graphical \nannotations, also. \n\n(cid:2) Windows Client: Supports maximum capabilities for all data types. \n\n(cid:2) Other viewers, for example, the AFP plug-in viewer: Do not support and are not aware of \nannotations. \n\nWeb clients, such as Content Navigator or the ODWEK Java API, can work with annotations \nand provide access to them through the hit list. Graphical annotations cannot be accessed \nthat way because they are not exposed through the Java API. \n\n**Large object support**\nLarge object (LOB) support is the methodology for working with large reports. For more \ninformation about how LOB affects your reports, see “Large object” on page 52. \n\nFrom a viewer’s perspective, if a large document is transferred, it generates high network \ntraffic, resource consumption, and long wait times for users. If the viewer supports LOB \ndocuments, the viewer communicates with the server to transfer only the chunk of data that \nthe user is looking at (for example, a 200 page chunk out of a 10,000 page report). If the user \nscrolls to a different chunk of pages, the viewer downloads only that relevant portion of the \ndocument that the user scrolled to.", + "page_start": 212, + "page_end": 212, + "source_file": "sg246915.pdf" + }, + { + "text": "(cid:2) Thin and Compressed \n\nIn addition to on-demand space allocation, data is compressed before being written to \nstorage. \n\n(cid:2) Thin and Deduplicated \n\nIn addition to on-demand space allocation, duplicates of data blocks are detected and are \nreplaced with references to the first copy. \n\n(cid:2) Thin, Compressed, and Deduplicated \n\nThese types provides maximum storage efficiency and capacity savings by combining \nthin, compressed, and deduplicated. \n\nThe following software and hardware requirements are needed for DRP compression and \ndeduplication: \n\n(cid:2) Enabled Compression license \n(cid:2) V8.1.3.2 or higher \n(cid:2) Nodes must have at least 32 GB memory to support deduplication \n\nRandom Access Compression Engine (RACE) compression and DRP compressed volumes \ncan coexist in the same I/O group. However, deduplication is not supported in the same I/O \ngroup as RACE compressed volumes. \n\n**10.4.2 DRP benefits**\n\nDRPs are a new type of storage pool that implement techniques, such as thin-provisioning, \ncompression, and deduplication to reduce the amount of physical capacity that is required to \nstore data. Savings in storage capacity requirements translate into reduction in the cost of \nstoring the data. \n\nThe cost reductions that are achieved through software can facilitate the transition to all Flash \nstorage. Flash storage has lower operating costs, lower power consumption, higher density, \nand are cheaper to cool. However, the cost of Flash storage is still higher than disk storage. \n\nWith technologies, such as DRP, the cost difference can be reduced to a point where an all \nFlash solution is feasible. The first benefit of DRP is in the form of storage savings because of \ndeduplication. The deduplication process identifies unique data patterns, and stores the \nsignature of the data for reference when writing new data. If the signature of the new data \nmatches a signature, the new data is not written to disk, but instead a reference to the stored \ndata is written. The same byte pattern can occur many times, which results in the amount of \ndata that must be stored being greatly reduced. \n\nThe second benefit of DRP comes in the form of performance improvements because of \ncompression. Although deduplication aims to identify the same data elsewhere in the storage \npool and create references to the duplicate data instead of writing extra copies, compression \nis trying to reduce the size of the host data that is written. \n\nCompression and deduplication are not mutually exclusive, one, both, or neither features can \nbe enabled. If the volume is de-duplicated and compressed, data is de-duplicated first and \nthen compressed. Therefore, deduplication references are created on the compressed data \nstored on the physical domain.", + "page_start": 442, + "page_end": 442, + "source_file": "sg247938.pdf" + }, + { + "text": "If a FileNet P8 system is installed in your environment that serves as your primary content \nmanagement system and reports need to be available to users without their knowing that \nthose reports are in a different system, this integration might suit your needs. The same \nsituation applies to the use of FileNet P8 Records Management, which can be applied to \nContent Manager OnDemand documents as well, therefore bringing a level of federated \nrecords management capability to your documents. \n\nWhen you plan your integration with FileNet P8, remember this federation is active: Content \nManager OnDemand actively publishes document links into a FileNet P8 system. You must \nconsider both volumes (FileNet P8 systems usually are smaller than Content Manager \nOnDemand systems) and the active federation process. \n\nFor more information about Content Manager OnDemand and FileNet P8 integration, see \n*IBM FileNet Content Federation Services for Content Manager OnDemand*, SC19-2711. \n\n**8.3 Client API overview**\n\nWith various client options, multiple API options are available to navigate through the system \nand access Content Manager OnDemand documents. Although the Java API that is provided \nby Content Manager ODWEK is the API that is used most by clients and the basis for most \ndevelopment projects, other APIs are available and used for a limited range of scenarios. \n\nThe following list shows the APIs that are available for Content Manager OnDemand: \n\n(cid:2) Content Manager ODWEK: The Java API for Content Manager OnDemand \n\n(cid:2) SOAP and Representational State Transfer (REST) web services that follow the CMIS \nstandard \n\n(cid:2) Windows OLE (ActiveX control) that is provided by the Windows client \n\n(cid:2) XML administrative API through the**ARSXML**server command \n\n(cid:2) Structured APIs on z/OS environments \n\n(cid:2) The standard Content Manager OnDemand server commands that serve as a \nconsole-based API to work with Content Manager OnDemand documents \n\n**8.3.1 Content Manager OnDemand Web Enablement Kit**\n\nODWEK provides a Java API to access Content Manager OnDemand servers and their \ndocuments. It is the strategic client API that provides the largest feature set of any Content \nManager OnDemand API. It is used by web clients, such as Content Navigator or WEBi, by \nabstraction layers, such as Information Integrator, or by API components, such as CMIS. \n\nThe ODWEK Java API and its use to develop Content Manager OnDemand clients are \ndescribed in detail in*IBM Content Manager OnDemand Web Enablement Kit Java APIs: The*\n*Basics and Beyond*, SG24-7646. This section covers only a basic overview and focuses on \nclient considerations about ODWEK. Developers are encouraged to read the referenced book \nbefore they plan a client development that is based on ODWEK. \n\n**Scope**\nODWEK is a Content Manager OnDemand component that can be used by all Content \nManager OnDemand customers. It is focused on typical client use cases, such as searching \nfor and accessing data that is stored in a Content Manager OnDemand archive. It also has \nweb viewers, such as the line data applet and Content Manager OnDemand AFP viewer.", + "page_start": 225, + "page_end": 225, + "source_file": "sg246915.pdf" + }, + { + "text": "If the option to automatically federate is not set, data still can be federated by using the \nWindows client, ODWEK Java APIs, or**ARSDOC**. Figure 17-5 shows where you can select an \noption to federate selected metadata to FileNet P8. \n\n**17.3 Content Federation Services for Content Manager**\n**OnDemand architecture**\n\nContent Federation Services is based on the federation implementation strategy for \nmanaging distributed content. The distinguishing feature of this strategy is the global catalog. \nThe global catalog is a searchable database that contains information about content that is \nstored in various repositories and repository types in separate locations throughout the \nenterprise that are identified for federation. Enabling Content Federation Services for Content \nManager OnDemand does not change the architectural design of Content Manager \nOnDemand. Content Federation Services for Content Manager OnDemand is a mid-tier \nprocess that enhances your ability to manage content more efficiently. \n\nFigure 17-6 on page 373 shows the high-level access path to declare records from Content \nManager OnDemand, Content Navigator, and Content Manager OnDemand clients.", + "page_start": 395, + "page_end": 395, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", + "target_page": 3, + "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "S T A T U T O R Y I N S T R U M E N T S \n\n\n \n \n \n \n [html]\n
Thenternational
ax ComDevelopment ( Accuracy expensions )ndmen
RegTableMade
.-20th Apri
0Laid beforee House of
Comm21st Apri0
\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— \n\n(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**)", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "• \n\n• \n\n•**Compliance**with and impact of legislation. Currently, there are data on the percentage of \nenterprises with a risk assessment but very limited information about the**quality of these risk**\n**assessments and of implemented risk management and reduction measures**. Previous \nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to \ncomply with legal obligations (paper compliance). A possible approach could be an**anonymous**\n**evaluation of the quality of a representative share**of risk assessments. \n\n\n \n \n \n \n [html]\n
TableEurope
ComplementalTable
", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Capital loses in Canada that can be applied against future capital gains$ 43
$44Tax losses in foreign jurisdictions that expire between 2023
and 20331734
Deductible temporary differences in foreign jurisdictions3245
$ 92$ 123
\n\nthe reversal, and the reversal", + "page_start": 109, + "page_end": 109, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "[html]Gross Property and EquipmentBalance as of December 31.2002Cumulative Effect of Changes in Accounting PrinciplesCapital AdditionRetirementsAcquisitions, Net of DivestituresNon - Cash Additions for Asset Retirement ObligationsTransfers and AdjustmentsBalance as of December 31.2003Normal land$ 89.7$6.4$ ( 1.7 )$ —$ —S −$ 94.4β - depletable landfillnd54.0—. 1—5—( 5.1 )49.5dfill development costs1.026.3188.63.7—28.917.969.81.335.2Process and equipment.1.356.8—163.4( 39.3 )10.7—( 1.0 )1.490.6Didings and provement270.9( 11.7 )3.9( 2.8 ). 9—6.2267.4Propostion in progress — needed32.3—78.7———( 50.2 )60.8Parameters____9.1_____17.0______________ ( 19.7 )____6.4Total.............$ 2.839.1$ 176.9$ 273.2$( 43.8 )$ 41.0$ 17.9$—$ 3.304.3Accumulated Depreciation, Amortization and DepletionBalance as of December 31.2002Cumulative Effect of Changes in Accounting PrinciplesAdditions Charged to Expense< underline > Retirements Acquisitions, Net of DivestituresTransfers and AdjustmentsBalance as of December 31.2003dfill development costs$( 304.1 )$ ( 248.4 )$ ( 92.8 )$ —$—$. 7$ ( 644.6 )icles and equipment....( 570.1 )—( 131.6 )34.1. 4. 8( 666.4 )Mings and improvements__ ( 54.9 )___3.0__ ( 9.4 )_______—_ ( 1.5 )__ ( 62.3 )Total........$( 929.1 )$( 245.4 )$ ( 233.8 )$ 34.6S. 4$ —$( 1.373.3 )Gross Property and EquipmentBalance as of December 31.2003Capital AdditionsRetirementsAcquisitions, Net of DivestituresNon - Cash Additions for Asset Retirement ObligationsTransfers and AdjustmentsBalance as of December 31.2004Normal contacts...$94.4$ 3.3$ ( 0.7 )$. 9−$2$97.9- depletable landfill land...49.51.0—1.5—1.453.4dfill development costs1.335.26.6( 1.9 )28.915.3102.41.486.5Concentrations1.490.6169.1( 48.2 )5.3—71.617.5Didings and improvements267.411.4( 1.4 )1.0—8.6287.0Struction in progress — landfill60.878.9———( 100.6 )39.1Struction in progress — other___6.4__13.7———__ ( 12.7 )____7.4Total$", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "retrospectively. We are assessing the impact of this amendment on \nour consolidated financial statements. \n\n*Cable*\n(cid:129) Cable Television and Internet subscribers are represented by a \ndwelling unit, and cable Phone subscribers are represented by line \ncounts. \n\n(cid:129)*IFRIC 21, Levies (IFRIC 21)*– In May 2013, the IASB issued a new \naccounting guidance IFRIC 21, which provides guidance on when to \nrecognize a liability for a levy imposed by a government, both for \nlevies that are accounted for in accordance with IAS 37 Provisions, \nContingent Liabilities and Contingent Assets and those where the \ntiming and amount of the levy is certain. The Interpretation identifies \nthe obligating event for the recognition of a liability as the activity \nthat triggers the payment of the levy in accordance with the relevant \nlegislation. It provides the following guidance on recognition of a \nliability to pay levies (i) the liability is recognized progressively if the \nobligating event occurs over a period of time, and (ii) if an obligation \nis triggered on reaching a minimum threshold, \nthe liability is \nrecognized when that minimum threshold is reached. The standard is \neffective for annual periods beginning on or after January 1, 2014, \nwith early adoption permitted. We are assessing the impact of this \nnew standard on our consolidated financial statements. \n\n(cid:129) When there is more than one unit in one dwelling, like an apartment \nbuilding, each tenant with cable service is counted as an individual \nsubscriber, whether the service is invoiced separately or included in \nthe tenant’s rent. Institutional units, like hospitals or hotels, are each \nconsidered to be one subscriber. \n\n(cid:129) Cable Television, Internet, and Phone subscribers include only those \nsubscribers who have service installed and operating, and who are \nbeing billed accordingly. \n\n**Subscriber Churn**\nSubscriber churn is a measure of the number of subscribers that \ndeactivated as a percentage of \nthe total subscriber base, usually \ncalculated on a monthly basis. Subscriber churn tells us our success in \nretaining our subscribers. We calculate it by dividing the number of \nWireless subscribers that deactivated (usually in a month) by the \naggregate numbers of subscribers at the beginning of the period. When \nused or reported for a period greater than one month, subscriber churn \nrepresents the sum of the number of subscribers deactivating for each \nperiod incurred divided by the sum of the aggregate number of \nsubscribers at the beginning of each period incurred. \n\n**Average Revenue per User**\nAverage Revenue per User (ARPU) helps us identify trends and measure \nour success in attracting and retaining higher value subscribers. We \ncalculate it by dividing revenue (usually monthly) by the average \nnumber of subscribers in the period. For Wireless, ARPU is calculated \nusing network revenue. When used in connection with a particular type \nof \nsubscriber, ARPU is monthly revenue generated from those \nsubscribers, divided by the average number of those subscribers during \nthe month. \n\n(cid:129)*IFRS 9, Financial*", + "page_start": 85, + "page_end": 85, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": ". \ns \nt \nn \ne \nm \ne \nt \na \nt \ns \n\nl \na \ni \nc \nn \na \nn \ni \nf \n\nd \ne \nt \na \nd \ni \nl \no \ns \nn \no \nc \n\ne \ns \ne \nh \nt \n\nf \no \nt \nr \na \np \n7 \n- \nF \n\nl \na \nr \ng \ne \nt \nn \ni \nn \na \n\ne \nr \na \n\ns \ne \nt \no \nn \ng \nn \ni \ny \nn \na \np \nm \no \nc \nc \na \n\ne \nh \nT \n\n\n \n \n \n \n [html]\n
Marketing interventionMarket for Registrant ’ s Common EquityCertain Relationships and Related Transactions,Certain Relationships and Related Transactions,Changes in and Disagreements with Accountants on Accounting and Financial DisclosureConsent of Independent RegisteredAdjustments to reconcile net income to net cash provided by operating activities :CashamidaTableTableTable
", + "page_start": 70, + "page_end": 70, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "impairment; changes in accounting policies and practices; \nReaders are cautioned not to place undue reliance on any \norganizational changes within the Company; the volatility of our \n\nforward-looking statements. All forward-looking statements are \nstock price and the resulting impact on our consolidated financial \nbased on current expectations regarding important risk factors, \nstatements; risks related to legal proceedings to which we are a \nmany of which are outside the Company’s control. Accordingly, \nparty; adverse regulation and legislation, including potential \nactual results may differ materially from those expressed in the \nchanges in tax regulations (e.g., those affecting the use of the \nforward-looking statements, and the making of those statements \nLIFO inventory accounting method and the taxation of foreign- \nshould not be regarded as a representation by the Company or \nsourced income); and the occurrence of extraordinary events \nany other person that the results expressed in the statements will \n(including prolonged labor disputes, natural events and acts of \nbe achieved. In addition, the Company assumes no obligation \nGod, terrorist acts, fires, floods, and accidents). Other factors \npublicly to update or revise any forward-looking statements, \nand unanticipated events could also adversely affect our business, \nwhether because of new information or events, or otherwise, \nfinancial condition or results of operations. We discuss certain of \nexcept as may be required by law. \nthese matters more fully throughout our “Management’s \n\n\n \n \n \n \n [html]\n
QUANTITATIVE AND QUALITATIVEInterest Rate Risk
DISCLOSURES ABOUT MARKET RISKWe repaid the debt that was outstanding at June 30.2010 during
", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**Future Accounting Policy Changes**\n\nIFRS 9 ‑ Financial Instruments (“IFRS 9”) \n\nIFRS 9, as issued in 2010, reflects the first phase of the IASB’s work on the replacement of IAS 39 and applies to classification and measurement \nof financial assets and financial liabilities as defined in IAS 39. The standard was initially effective for annual periods beginning on or after January \n1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7, containing the effective date \nand transition provisions, was amended to remove the mandatory effective date of IFRS 9. This was intended to provide sufficient time for \npreparers to make the transition to the new requirements. The Company may still choose to apply IFRS immediately, but is not required to do so. \n\nIn subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the first phase of IFRS will have an effect on the \nclassification and measurement of the Company’s financial assets, but will not have an impact on the classification measurements of financial \nliabilities. The Company is in the process of assessing the impact IFRS 9 may have on future financial statements. \n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”) \n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant legislation, \noccurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing the impact IFRIC \n21 may have on future financial statements. \n\n**Disclosure Controls and Procedures and Internal Controls**\n\nThe Company’s management, including the Chief Executive Officer and the Chief Financial Officer, does not expect that the Company’s Disclosure \nControls and Procedures and Internal Controls will prevent or detect all error and all fraud. Because of the inherent limitations in all control \nsystems, an evaluation of controls can provide only reasonable, not absolute, assurance that all control issues and instances of fraud or error, if \nany, within the company have been detected. \n\n*Disclosure Controls and Procedures*\nAs of December 31, 2013, the Company’s management evaluated the effectiveness of the operation of its disclosure controls and procedures \n(“Disclosure Controls”), as defined under rules adopted by the Canadian Securities Administrators. This evaluation was performed under the \nsupervision of, and with the participation of, the Chief Executive Officer and the Chief Financial Officer. \n\nDisclosure controls and procedures are designed to ensure that information required to be disclosed in documents filed with securities \nregulatory authorities is recorded, processed, summarized and reported on a timely basis, and is accumulated and communicated to the \nCompany’s management, including the Chief Executive Officer and the Chief Financial Officer, as appropriate, to allow timely decisions regarding \nrequired disclosure. \n\nBased on the evaluation of Disclosure Controls, the Chief Executive Officer and the Chief Financial Officer have concluded that, subject to the \ninherent limitations noted above, the Company’s Disclosure Controls are effective in ensuring that material information relating to the Company \nand its consolidated subsidiaries is made known to the Company’s management on a timely basis by others within those entities, and is included \nas appropriate in this mD&a. \n\n*Internal Controls over Financial Reportin*g \nInternal controls over financial reporting (“ICFR”) are designed to provide reasonable assurance regarding the reliability of the Company’s \nfinancial reporting and its preparation of financial statements for external purposes in accordance with IFRS. Management’s documentation and \nassessment of the effectiveness of the Company’s ICFR continues as of the date of this MD&A with the focus on processes and controls in areas \nidentified as being “key risks”.", + "page_start": 62, + "page_end": 62, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", + "target_page": 7, + "target_passage": "Knee flexors 3,060 ", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**\n\n0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200 1400 1600 \n\n**VM volume (cm3)** **VL volume (cm3)**\n\n**E**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 200 400 600 800 1000 1200 1400 0 100 200 300 400 500 600 \n\n**VI volume (cm3)** **RF volume (cm3)**\n\nflexors, potentially placing a higher demand on the contract- \nile apparatus than for running and jumping tasks. \n\nConsidering individual muscles/compartments, the mus- \ncular development of the WSM was distinctly nonuniform. It \nis striking that the largest muscles relative to the untrained \ncontrol population were the three “guy ropes” (sartorius, gra- \ncilis, and semitendinosus: þ 140–202%). These three muscles \nprovide stability to the pelvis and femur by having origins at \ndiverse points around the pelvis while sharing a common \ninsertion onto the anteromedial tibia [via pes anserinus, the \nconjoined tendons of these three muscles (39)]. Large guy \nrope muscles likely enhance stabilization of the femur and \npelvis and would be expected to be critical during heavy \nweight-bearing tasks. In contrast, the WSM’s five smallest \nmuscles (relative to untrained controls) consisted of two hip \nflexors (iliopsoas and RF) and two monoarticular knee flexors; \nactions that appear far less important for lifting, carrying, and \npulling tasks. \n\nAlthough it was anticipated that the WSM would possess a \nlarger total lower-body muscle volume/mass than untrained \ncontrols and other athletic/trained groups we have previ- \nously measured, the magnitude and pattern of the differen- \nces were unknown. The results indicated that the total \nvolume of the measured muscles was almost twice that of av- \nerage untrained participants and 32–63% larger than subelite \nand elite sprinters. Pronounced development of the anti- \ngravity muscles (i.e., hip extensors, knee extensors, and plan- \ntar flexors) was perhaps not that surprising given the WSM’s \nbackground in heavy lifting events (including being a double \ndeadlift world champion and record holder). However, the \nhip flexors appear less important in these tasks, possibly \nexplaining their more modest size, which was inferior to that \nof three elite 100-m sprinters we have previously assessed. \nThe WSM’s plantar flexors were particularly large relative to \nuntrained controls ( þ 120%). This could be due to the plan- \ntar flexors being the smallest of the antigravity muscle \ngroups that may experience very high mechanical stress \nand, thus, a pronounced adaptive stimulus during heavy lift- \ning, carrying, and pulling tasks. Furthermore, the very heavy \nand, therefore, low-velocity nature of these tasks may limit \nthe contribution of the stretch-shortening cycle and tendon \nrecoil to the positive/concentric work done by the plantar \n\nThe WSM’s quadriceps volume and patellar \n\ntendon \nmoment arm were both greater than that of untrained con- \ntrols and indeed any individual we have previously measured. \nHowever, \nrelative to the \nuntrained controls, was noticeably larger for quadriceps femo- \nris volume (greater than or equal to twice as large) than for \n\nthe magnitude of difference,", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed12.pdf" + }, + { + "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "sprinters (3,218 ± 400 cm3; Fig. 4A). Moreover, the WSM’s \nquadriceps femoris was 18% larger than the most muscular \nindividual we have previously assessed (elite sprinter: 3,716 \ncm3). The volumes of the individual vasti muscles of the WSM \n(VL: 1,508 cm3; VI: 1,336 cm3; VM: 1,088 cm3) were 130–138% \nlarger than untrained controls (VL: 633 ± 117 cm3; VI: 581 ± 120 \ncm3; VM: 461 ± 89 cm3) and also greater than any trained/ath- \nletic individual we have previously assessed (Fig. 4, B–D). \nHowever, the WSM’s RF (453 cm3) was not quite so large, being \n76% greater than untrained controls (257 ± 57 cm3) but smaller \nthan the average elite sprinter ((cid:5)5%; Fig. 4E), 13% greater than \nsubelite sprinters, and 21% greater than long-term resistance- \ntrained individuals. \n\nCompared with untrained control participants (n ¼ 11), \nall 22 of the WSM’s individual muscles/compartments \nwere larger than untrained controls (Table 2 and Fig. 3). \nHowever, the differences in muscle volume were extremely \nvariable, with the biggest differences being for the “guy \nropes,” which were 2.5–3.0 times that of untrained controls \n( þ 140% gracilis; þ 157% ST; þ 202% sartorius), compared \nwith more modest differences such as 23% (BFsh) and 32% \n(iliopsoas) greater. \n\nOverall hamstring volume of the WSM (1,545 cm3) was \n109% greater than a large pooled population of untrained con- \ntrols (739 ± 142 cm3; n ¼ 50), 44% greater than subelite sprint- \ners (1,075 ± 178 cm3), 53% greater than long-term resistance- \ntrained individuals (1,011 ± 142 cm3), and 17% greater than elite \nsprinters (1,315 ± 130 cm3; Fig. 5A). The WSM’s hamstring vol- \nume was also marginally larger ( þ 3%) than the most muscu- \nlar individual we have previously assessed (subelite sprinter, \n1,495 cm3). The ST (563 cm3) and BFlh (454 cm3) volumes of \nthe WSM were 132–182% larger than that of the pooled popula- \ntion of untrained controls (ST: 200 ± 48 cm3; BFlh: 196 ± 47 \ncm3; Fig. 5, C and D) and greater than the mean of any \ntrained/athletic group we have previously assessed (Fig. 5, C \nand D). SM (392 cm3) volume of the WSM was 66% greater \nthan untrained controls (SM 236 ± 46 cm3) and greater than \nthe mean for trained/athletic groups we have previously \n\nQuadriceps Femoris and Hamstring Size \n\nOverall quadriceps femoris volume of the WSM (4,386 cm3) \nwas 127% greater than a large, pooled population of untrained \ncontrols (1,932 ± 336; n ¼ 102), 66% greater than subelite sprint- \ners (2,636 ± 401 cm3), 53% greater than long-term resistance- \ntrained individuals (2,876 ± 311 cm3), and 36% greater than elite \n\n794 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "0 300 \n600 \n900 \n1200 \n**HAMS volume (cm3)**\n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 100 200 300 400 500 600 \n\n**SM volume (cm3)**\n\n1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained \n\npatellar tendon moment arm ( þ 18%). Therefore, of these two \nkey strength determinants, muscle size, rather than joint lever- \nage, appeared to be the predominant factor responsible for the \nWSM’s extraordinary strength. Indeed, when we previously \ncompared the muscle morphology and joint mechanics of indi- \nviduals with distinct maximum strength capacity (long-term \nresistance-trained individuals vs. untrained controls), muscle \nsize was the primary factor separating the groups with much \nmore subtle differences in moment arm (10). The extreme \nexample of muscle size provided by the WSM’s quadriceps femoris also gave the opportunity to investigate the scaling of \ntendon size to muscle size; extreme muscular size (greater \nthan or equal to twice that for untrained controls) might be \nexpected to be accompanied by comparable tendinous tissue \nsize to effectively transmit high muscular forces to the skele- \nton. However, the WSM’s patellar tendon CSA was only 30% \nlarger than untrained controls and within the range of indi- \nviduals we have previously measured (Fig. 6A). This obser- \nvation supports the notion that tendon structure may be \nlargely fixed by adulthood (40), with only slow/limited \n\n**A** **B**\n\nFigure 6. Patellar tendon mean cross-sec- \ntional area (A) and patellar tendon moment \narm (B) of a World’s Strongest Man and \ndeadlift champion (WSM) compared with \nlong-term resistance trained [n ¼ 16, from \nthe work by Massey et al. (15)] and untrained \ncontrol populations [n ¼ 39, from the work \nby Massey et al. (15)]. \n\nWSM \n\nUntrained control \n\n30 35 40 45 50 55 \n60 \n**Patellar tendon cross-sectional area (mm2)**\n160 \n**Patellar tendon moment arm (mm)**", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed12.pdf" + }, + { + "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "changes in response to functional overload/resistance \ntraining. For example, we previously found patellar ten- \ndon CSA to show very subtle changes after 15 wk (45 train- \ning sessions) of heavy resistance training [ þ 1.4% (41)] and \nno differences between long-term resistance-trained indi- \nviduals and untrained controls (15). \n\npopulations. Overall leg muscle volume of the WSM was \napproximately twice that of untrained controls but with pro- \nnounced anatomical variability in the extent of muscular de- \nvelopment. The plantar flexor muscle group and the guy \nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 \nto þ 202%), which stabilize the pelvis and femur, demon- \nstrated the largest differences. The pronounced quadriceps \nfemoris size of the WSM (greater than or equal to twice that \nof untrained) was accompanied by a more modest difference \nin patella tendon moment arm ( þ 18%) and was not matched \nby a proportional difference in tendon size ( þ 30%). \n\nLimitations \n\nDATA AVAILABILITY \n\nData will be made available upon reasonable request. \n\nSUPPLEMENTAL MATERIAL \n\nSupplemental Material: https://doi.org/10.6084/m9.figshare. \n26152939. \n\nACKNOWLEDGMENTS \n\nThe authors thank radiographer Julie Thompson. \n\nDISCLOSURES \nNo conflicts of interest, financial or otherwise, are declared by \nthe authors. \n\nAUTHOR CONTRIBUTIONS \n\nT.G.B. and J.P.F. conceived and designed research; T.G.B., G.J.M., \nR.M., E.J.M., and J.P.F. performed experiments; T.G.B., G.J.M., R.M., \nE.J.M., and T.M.M.-W. analyzed data; T.G.B. and J.P.F. interpreted \nresults of experiments; T.G.B. prepared figures; T.G.B. and J.P.F. \ndrafted manuscript; T.G.B. and J.P.F. edited and revised manuscript; \nT.G.B., G.J.M., R.M., E.J.M., T.M.M.-W., and J.P.F. approved final ver- \nsion of manuscript. \n\nREFERENCES \n\n1. \n\nCrowther NB. Weightlifting in antiquity: achievement and training. \nGreece Rome 24: 111–120, 1977. doi:10.1017/s0017383500018416. \n2. Dixon E. How Wave.tv is making the World’s Strongest Man think \nbigger with its digital plans (Online). SportsPro, 2020.https://www. \nsportspromedia.com/insights/analysis/worlds-strongest-man-wavetv- \nthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024]. \nSuchomel TJ, Nimphius S, Stone MH. The importance of muscular \nstrength in athletic performance. Sports Med 46: 1419–1449, 2016. \ndoi:10.1007/s40279-016-0486-0. \n\n3. \n\n4. Opar DA, Williams MD, Timmins RG, Hickey J, Duhig SJ, Shield AJ. \nEccentric hamstring strength and hamstring injury risk in Australian \nfootballers. Med Sci Sports Exerc 47: 857–865, 2015. doi:10.1249/ \nmss.0000000000000465.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "All muscles \n\nPlantar flexors \nKnee flexors \nHip extensors \nKnee extensors \nHip flexors \nIsometric Midthigh Pull and Countermovement Jump \n\nGross (including body weight) and net (above body \nweight) IMTP peak forces of the WSM were 9,171 N and 7,480 \nN, respectively. The WSM’s gross IMTP peak force was 54% \ngreater than the highest comparable group mean we located \n(subelite weightlifters: 5,942 ± 844 N (20); Fig. 2A). The \nWSM’s net IMTP peak force was 100% greater than the high- \nest comparable group mean value in the literature (collegiate \nsoccer athletes: 3,740 ± 692 N (26); Fig. 2B). \n\nSartorius \nSemitendinosus \nGracilis \nSoleus \nVastus medialis \nAdductor Magnus \nGluteus maximus \nBiceps femoris long head \nMedial gastrocnemius \nVastus lateralis \nGluteus medius and minimus \nLateral gastrocnemius \nVastus intermedius \nTensor fasciae latae \nLateral compartment \nAnterior compartment \nSemimembranosus \nRectus femoris \nPopliteus \nIliopsoas \nPosterior compartment \nBiceps femoris short head \n\nThe WSM’s CMJ peak power and jump height were 9,866 W \nand 53.3 cm, respectively. The peak CMJ power of the WSM \nwas >2.5-fold (164%) that of the mean of an untrained control \ngroup previously measured in our laboratory (3,735 ± 760 W; \nunpublished) and 51% greater than the highest comparable \ngroup mean value we located in the literature (professional \nbasketball players: 6,518 ± 923 W (32); Fig. 2C). Not surpris- \ningly, given the WSM’s high body mass, his jump height was \nless exceptional, while still being 20% greater than that of a \ngroup of untrained control participants previously measured \nin our laboratory (44.3 ± 9.2 cm; unpublished). However, his \njump height was 25% lower than the highest group mean CMJ \nheight we are aware of in the published literature (elite inter- \nnational gymnasts: 71.3 ± 4.5 cm (37); Fig. 2D). \n\nLeg Muscle Volumes \n\n+201.9% \n+157.1% \n+139.8% \n+134.6% \n+128.6% \n+113.8% \n+112.7% \n+105.4% \n+105.2% \n+103.0% \n+101.0% \n+98.8% \n+96.5% \n+94.1% \n+65.6% \n+52.9% \n+49.8% \n+49.6% \n+42.2% \n+32.4% \n+24.6% \n+23.1% \n\n0 250 \n\n**Difference in muscle volume (%)**\n\nFigure 3. Percentage differences in muscle volumes of all muscles, 5 func- \ntional muscle groups, and 23 individual muscles/compartments between \nthe World’s Strongest Man and deadlift champion (WSM; n ¼ 1) and \nuntrained control participants (n ¼ 11) from the work by Miller et al. (13). A \npositive value indicates greater muscle volume of WSM relative to the \ngroup mean of the untrained controls. The functional muscle groups and \nindividual muscles are ordered according to the magnitude of the percent- \nage differences for absolute muscle volume. \n\nThe total unilateral muscle volume of the 22 measured \nmuscles/compartments of WSM (14,922 cm3) was nearly \ntwice that of a relatively modest (n ¼ 11) sample of untrained \ncontrols (7,628 ± 1,548 cm3; þ 96%; Fig. 3), while being 63% \ngreater than subelite (9,164 ± 1,207 cm3) and þ 32% greater \nthan elite 100-m sprinters (11,323 ± 1,328 cm3; Table 2). The \nmuscle group differences were largest for the plantar flexors \n( þ 120% vs. untrained; þ 100% vs. subelite sprinters; þ 70% \nvs. elite sprinters) and smallest for the hip flexors ( þ 65% vs. \nuntrained; þ 30% vs. subelite sprinters; þ 5% vs. elite \nsprinters). The WSM had the highest values of any individ- \nual we have observed for four out of five muscle groups, but \nnot the hip flexors, which were inferior to three of the elite \n100-m sprinters (n ¼ 5).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "\n \n \n \n \n [html]Muscle Group / Muscle or CompartmentMuscle Volume, cm3\n
WSMElite Sprinters ( n = 5 )Subelite Sprinters ( n = 26 )Untrained ( n = 11 )
All muscles14.92211.323 ± 1.3289.164 ± 1.2077.628 ± 1.548
Hip flexors1.7041.620 ± 2001.314 ± 2161.031 ± 151
Hip extensors4.7244.002 ± 4893.029 ± 4222.257 ± 220
Knee flexors3.0602.304 ± 1781.859 ± 3011.460 ± 196
Knee extensors4.3863.218 ± 4002.636 ± 4012.202 ± 315
Plantar flexors1.8881.112 ± 181943 ± 156860 ± 172
Iliopsoas681702 ± 97618 ± 101514 ± 75
Sartorius429306 ± 46209 ± 50142 ± 25
Tensor fasciae latae142135 ± 4186 ± 2573 ± 24
Adductor magnus1.3341.056 ± 83828 ± 128624 ± 81
Gracilis235180 ± 37142 ± 3798 ± 23
Gluteus maximus1.9801.797 ± 3761.257 ± 197931 ± 108
Gluteus medius and minimus1.172626 ± 129575 ± 97583 ± 76
Rectus femoris453476 ± 45401 ± 78303 ± 55
Vastus lateralis1.5081.132 ± 180925 ± 156743 ± 98
Vastus intermedius1.336962 ± 145789 ± 140680 ± 115
Vastus medialis1.088649 ± 97521 ± 79476 ± 1 †¶
Semimembranosus392359 ± 60327 ± 59262 ± 18
Semitendinosus563449 ± 70350 ± 79219 ± 39
Biceps femoris long head454340 ± 31267 ± 47221 ± 42
Biceps femoris short head135167 ± 26131 ± 34110 ± 28
Popliteus2723 ± 517 ± 519 ± 6
Lateral gastrocnemius310202 ± 34170 ± 37156 ± 41
Medial gastrocnemius515300 ± 38262 ± 58251 ± 52
Soleus1.063610 ± 137510 ± 76453 ± 95
Anterior compartment445302 ± 59273 ± 47291 ± 47
Lateral compartment253147 ± 32161 ± 42153 ± 35
Posterior compartment406401 ± 76345 ± 71326 ± 93
\n\nassessed (Fig. 5B). BFsh volume (135 cm3) of the WSM was a \nmodest 26% greater than that of our pool of untrained control \nparticipants (107 ± 31 cm3; Fig. 5E) but smaller than that of \nboth long-term resistance-trained individuals ((cid:5)1%; 136 ± 27 \ncm3) and elite sprinters ((cid:5)19%; 167 ± 26 cm3; Fig. 5E). \n\nPatella Tendon Cross-Sectional Area and Moment Arm", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "isometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and \n\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). \nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024 \n\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0. \nPublished by the American Physiological Society. \nwww.jappl.org", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What are the nutritionnal added components to the word's strongest man regime ?", + "target_page": 2, + "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "isometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and \n\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). \nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024 \n\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0. \nPublished by the American Physiological Society. \nwww.jappl.org", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**\n\n0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200 1400 1600 \n\n**VM volume (cm3)** **VL volume (cm3)**\n\n**E**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 200 400 600 800 1000 1200 1400 0 100 200 300 400 500 600 \n\n**VI volume (cm3)** **RF volume (cm3)**\n\nflexors, potentially placing a higher demand on the contract- \nile apparatus than for running and jumping tasks. \n\nConsidering individual muscles/compartments, the mus- \ncular development of the WSM was distinctly nonuniform. It \nis striking that the largest muscles relative to the untrained \ncontrol population were the three “guy ropes” (sartorius, gra- \ncilis, and semitendinosus: þ 140–202%). These three muscles \nprovide stability to the pelvis and femur by having origins at \ndiverse points around the pelvis while sharing a common \ninsertion onto the anteromedial tibia [via pes anserinus, the \nconjoined tendons of these three muscles (39)]. Large guy \nrope muscles likely enhance stabilization of the femur and \npelvis and would be expected to be critical during heavy \nweight-bearing tasks. In contrast, the WSM’s five smallest \nmuscles (relative to untrained controls) consisted of two hip \nflexors (iliopsoas and RF) and two monoarticular knee flexors; \nactions that appear far less important for lifting, carrying, and \npulling tasks. \n\nAlthough it was anticipated that the WSM would possess a \nlarger total lower-body muscle volume/mass than untrained \ncontrols and other athletic/trained groups we have previ- \nously measured, the magnitude and pattern of the differen- \nces were unknown. The results indicated that the total \nvolume of the measured muscles was almost twice that of av- \nerage untrained participants and 32–63% larger than subelite \nand elite sprinters. Pronounced development of the anti- \ngravity muscles (i.e., hip extensors, knee extensors, and plan- \ntar flexors) was perhaps not that surprising given the WSM’s \nbackground in heavy lifting events (including being a double \ndeadlift world champion and record holder). However, the \nhip flexors appear less important in these tasks, possibly \nexplaining their more modest size, which was inferior to that \nof three elite 100-m sprinters we have previously assessed. \nThe WSM’s plantar flexors were particularly large relative to \nuntrained controls ( þ 120%). This could be due to the plan- \ntar flexors being the smallest of the antigravity muscle \ngroups that may experience very high mechanical stress \nand, thus, a pronounced adaptive stimulus during heavy lift- \ning, carrying, and pulling tasks. Furthermore, the very heavy \nand, therefore, low-velocity nature of these tasks may limit \nthe contribution of the stretch-shortening cycle and tendon \nrecoil to the positive/concentric work done by the plantar \n\nThe WSM’s quadriceps volume and patellar \n\ntendon \nmoment arm were both greater than that of untrained con- \ntrols and indeed any individual we have previously measured. \nHowever, \nrelative to the \nuntrained controls, was noticeably larger for quadriceps femo- \nris volume (greater than or equal to twice as large) than for \n\nthe magnitude of difference,", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed12.pdf" + }, + { + "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "26. Suchomel TJ, Nimphius S, Stone MH. Scaling isometric mid-thigh \npull maximum strength in division I athletes: are we meeting the \nassumptions? Sports Biomech 19: 532–546, 2020. doi:10.1080/ \n14763141.2018.1498910. \n\n8. \n\nAbe T, Buckner SL, Mattocks KT, Jessee MB, Dankel SJ, Mouser \nJG, Bell ZW, Loenneke JP. Skeletal muscle mass and architecture \nof the world’s strongest raw powerlifter: a case study. Asian J Sports \nMed 9: e61763, 2018. doi:10.5812/asjsm.61763. \nPowell PL, Roy RR, Kanim P, Bello MA, Edgerton VR. Predictability \nof skeletal muscle tension from architectural determinations in \nguinea pig hindlimbs. J Appl Physiol Respir Environ Exerc Physiol \n57: 1715–1721, 1984. doi:10.1152/jappl.1984.57.6.1715. \n\n9. \n\n27. Cunningham DJ, Shearer DA, Drawer S, Pollard B, Cook CJ, \nBennett M, Russell M, Kilduff LP. Relationships between physical \nqualities and key performance indicators during match-play in senior \ninternational rugby union players. PLoS One 13: e0202811, 2018. \ndoi:10.1371/journal.pone.0202811. \n\n10. Maden-Wilkinson TM, Balshaw TG, Massey G, Folland JP. What \nmakes long-term resistance-trained individuals so strong? A com- \nparison of skeletal muscle morphology, architecture, and joint \nmechanics. J Appl Physiol (1985) 128: 1000–1011, 2019. doi:10.1152/ \njapplphysiol.00224.2019. \nBalshaw TG, Maden-Wilkinson TM, Massey GJ, Folland JP. The \nhuman muscle size and strength relationship: effects of architecture, \nmuscle force, and measurement location. Med Sci Sports Exerc 53: \n2140–2151, 2021. doi:10.1249/mss.0000000000002691. \n\n28. Doyle TLA, Fain AC, Wills JA, Cooper D, Toonen K, Kamphius B. \nMeasures of \nlower body strength associated with injuries in \nAustralian special forces selection candidates. J Appl Biomech 38: \n255–262, 2022. doi:10.1123/jab.2021-0134. \n\n29. Kawamori N, Rossi SJ, Justice BD, Haff EE, Pistilli EE, O’Bryant HS, \nStone MH, Haff GG. Peak force and rate of force development dur- \ning isometric and dynamic mid-thigh clean pulls performed at vari- \nous intensities. J Strength Cond Res 20: 483–491, 2006. doi:10.1519/ \n18025.1. \n\n11. \n\n12. Baxter JR, Piazza SJ. Plantar flexor moment arm and muscle volume \npredict torque-generating capacity in young men. J Appl Physiol \n(1985)116: 538–544, 2014. doi:10.1152/japplphysiol.01140.2013. \n13. Miller R, Balshaw TG, Massey GJ, Maeo S, Lanza MB, Johnston \nM, Allen SJ, Folland JP. The muscle morphology of elite sprint \nrunning. Med Sci Sports Exerc 53: 804–815, 2021. doi:10.1249/ \nmss.0000000000002522. \nBalshaw TG, Funnell MP, McDermott E, Maden-Wilkinson TM, \nAbela S, Quteishat B, Edsey M, James LJ, Folland JP. The effect of \nspecific bioactive collagen peptides on function and muscle remod- \neling during human resistance training. Acta Physiol \n(Oxf) 237: \n(Oxf) 237:e13952, 2023]. \ne13903, 2023 [Erratum in Acta Physiol \ndoi:10.1111/apha.13903. \n\n30. Wang R, Hoffman JR, Tanigawa S, Miramonti AA, Monica MB, \nBeyer KS, Church DD, Fukuda DH, Stout JR. Isometric mid-thigh \npull correlates with strength, sprint, and agility performance in colle- \ngiate rugby union players. J Strength Cond Res 30: 3051–3056, \n2016. doi:10.1519/jsc.0000000000001416. \n\n31. Haff GG, Stone M, O’Bryant HS, Harman E, Dinan C, Johnson R, \nHan KH. Force-time dependent characteristics of dynamic and iso- \nmetric muscle actions. J Strength Cond Res 11: 269–272, 1997. \ndoi:10.1519/1533-4287(1997)011<0269:FTDCOD>2.3.CO;2. \n\n14. \n\n32. Mercer RAJ, Russell JL, McGuigan LC, Coutts AJ, Strack DS, \nMcLean BD. Finding the signal in the noise—interday reliability and \nseasonal sensitivity of 84 countermovement jump variables in pro- \nfessional basketball players. J Strength Cond Res 37: 394–402, \n2023. doi:10.1519/jsc.0000000000004182.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed12.pdf" + }, + { + "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "0 300 \n600 \n900 \n1200 \n**HAMS volume (cm3)**\n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\nElite sprint runners \n\nSub-elite sprint runners \n\nUntrained control \n\n0 100 200 300 400 500 600 \n\n**SM volume (cm3)**\n\n1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained \n\npatellar tendon moment arm ( þ 18%). Therefore, of these two \nkey strength determinants, muscle size, rather than joint lever- \nage, appeared to be the predominant factor responsible for the \nWSM’s extraordinary strength. Indeed, when we previously \ncompared the muscle morphology and joint mechanics of indi- \nviduals with distinct maximum strength capacity (long-term \nresistance-trained individuals vs. untrained controls), muscle \nsize was the primary factor separating the groups with much \nmore subtle differences in moment arm (10). The extreme \nexample of muscle size provided by the WSM’s quadriceps femoris also gave the opportunity to investigate the scaling of \ntendon size to muscle size; extreme muscular size (greater \nthan or equal to twice that for untrained controls) might be \nexpected to be accompanied by comparable tendinous tissue \nsize to effectively transmit high muscular forces to the skele- \nton. However, the WSM’s patellar tendon CSA was only 30% \nlarger than untrained controls and within the range of indi- \nviduals we have previously measured (Fig. 6A). This obser- \nvation supports the notion that tendon structure may be \nlargely fixed by adulthood (40), with only slow/limited \n\n**A** **B**\n\nFigure 6. Patellar tendon mean cross-sec- \ntional area (A) and patellar tendon moment \narm (B) of a World’s Strongest Man and \ndeadlift champion (WSM) compared with \nlong-term resistance trained [n ¼ 16, from \nthe work by Massey et al. (15)] and untrained \ncontrol populations [n ¼ 39, from the work \nby Massey et al. (15)]. \n\nWSM \n\nUntrained control \n\n30 35 40 45 50 55 \n60 \n**Patellar tendon cross-sectional area (mm2)**\n160 \n**Patellar tendon moment arm (mm)**", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed12.pdf" + }, + { + "text": "changes in response to functional overload/resistance \ntraining. For example, we previously found patellar ten- \ndon CSA to show very subtle changes after 15 wk (45 train- \ning sessions) of heavy resistance training [ þ 1.4% (41)] and \nno differences between long-term resistance-trained indi- \nviduals and untrained controls (15). \n\npopulations. Overall leg muscle volume of the WSM was \napproximately twice that of untrained controls but with pro- \nnounced anatomical variability in the extent of muscular de- \nvelopment. The plantar flexor muscle group and the guy \nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 \nto þ 202%), which stabilize the pelvis and femur, demon- \nstrated the largest differences. The pronounced quadriceps \nfemoris size of the WSM (greater than or equal to twice that \nof untrained) was accompanied by a more modest difference \nin patella tendon moment arm ( þ 18%) and was not matched \nby a proportional difference in tendon size ( þ 30%). \n\nLimitations \n\nDATA AVAILABILITY \n\nData will be made available upon reasonable request. \n\nSUPPLEMENTAL MATERIAL \n\nSupplemental Material: https://doi.org/10.6084/m9.figshare. \n26152939. \n\nACKNOWLEDGMENTS \n\nThe authors thank radiographer Julie Thompson. \n\nDISCLOSURES \nNo conflicts of interest, financial or otherwise, are declared by \nthe authors. \n\nAUTHOR CONTRIBUTIONS \n\nT.G.B. and J.P.F. conceived and designed research; T.G.B., G.J.M., \nR.M., E.J.M., and J.P.F. performed experiments; T.G.B., G.J.M., R.M., \nE.J.M., and T.M.M.-W. analyzed data; T.G.B. and J.P.F. interpreted \nresults of experiments; T.G.B. prepared figures; T.G.B. and J.P.F. \ndrafted manuscript; T.G.B. and J.P.F. edited and revised manuscript; \nT.G.B., G.J.M., R.M., E.J.M., T.M.M.-W., and J.P.F. approved final ver- \nsion of manuscript. \n\nREFERENCES \n\n1. \n\nCrowther NB. Weightlifting in antiquity: achievement and training. \nGreece Rome 24: 111–120, 1977. doi:10.1017/s0017383500018416. \n2. Dixon E. How Wave.tv is making the World’s Strongest Man think \nbigger with its digital plans (Online). SportsPro, 2020.https://www. \nsportspromedia.com/insights/analysis/worlds-strongest-man-wavetv- \nthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024]. \nSuchomel TJ, Nimphius S, Stone MH. The importance of muscular \nstrength in athletic performance. Sports Med 46: 1419–1449, 2016. \ndoi:10.1007/s40279-016-0486-0. \n\n3. \n\n4. Opar DA, Williams MD, Timmins RG, Hickey J, Duhig SJ, Shield AJ. \nEccentric hamstring strength and hamstring injury risk in Australian \nfootballers. Med Sci Sports Exerc 47: 857–865, 2015. doi:10.1249/ \nmss.0000000000000465.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "sprinters (3,218 ± 400 cm3; Fig. 4A). Moreover, the WSM’s \nquadriceps femoris was 18% larger than the most muscular \nindividual we have previously assessed (elite sprinter: 3,716 \ncm3). The volumes of the individual vasti muscles of the WSM \n(VL: 1,508 cm3; VI: 1,336 cm3; VM: 1,088 cm3) were 130–138% \nlarger than untrained controls (VL: 633 ± 117 cm3; VI: 581 ± 120 \ncm3; VM: 461 ± 89 cm3) and also greater than any trained/ath- \nletic individual we have previously assessed (Fig. 4, B–D). \nHowever, the WSM’s RF (453 cm3) was not quite so large, being \n76% greater than untrained controls (257 ± 57 cm3) but smaller \nthan the average elite sprinter ((cid:5)5%; Fig. 4E), 13% greater than \nsubelite sprinters, and 21% greater than long-term resistance- \ntrained individuals. \n\nCompared with untrained control participants (n ¼ 11), \nall 22 of the WSM’s individual muscles/compartments \nwere larger than untrained controls (Table 2 and Fig. 3). \nHowever, the differences in muscle volume were extremely \nvariable, with the biggest differences being for the “guy \nropes,” which were 2.5–3.0 times that of untrained controls \n( þ 140% gracilis; þ 157% ST; þ 202% sartorius), compared \nwith more modest differences such as 23% (BFsh) and 32% \n(iliopsoas) greater. \n\nOverall hamstring volume of the WSM (1,545 cm3) was \n109% greater than a large pooled population of untrained con- \ntrols (739 ± 142 cm3; n ¼ 50), 44% greater than subelite sprint- \ners (1,075 ± 178 cm3), 53% greater than long-term resistance- \ntrained individuals (1,011 ± 142 cm3), and 17% greater than elite \nsprinters (1,315 ± 130 cm3; Fig. 5A). The WSM’s hamstring vol- \nume was also marginally larger ( þ 3%) than the most muscu- \nlar individual we have previously assessed (subelite sprinter, \n1,495 cm3). The ST (563 cm3) and BFlh (454 cm3) volumes of \nthe WSM were 132–182% larger than that of the pooled popula- \ntion of untrained controls (ST: 200 ± 48 cm3; BFlh: 196 ± 47 \ncm3; Fig. 5, C and D) and greater than the mean of any \ntrained/athletic group we have previously assessed (Fig. 5, C \nand D). SM (392 cm3) volume of the WSM was 66% greater \nthan untrained controls (SM 236 ± 46 cm3) and greater than \nthe mean for trained/athletic groups we have previously \n\nQuadriceps Femoris and Hamstring Size \n\nOverall quadriceps femoris volume of the WSM (4,386 cm3) \nwas 127% greater than a large, pooled population of untrained \ncontrols (1,932 ± 336; n ¼ 102), 66% greater than subelite sprint- \ners (2,636 ± 401 cm3), 53% greater than long-term resistance- \ntrained individuals (2,876 ± 311 cm3), and 36% greater than elite \n\n794 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "Analysis and Comparative Data \n\nMuscle volumes, patellar tendon CSA, and patellar tendon \nmoment arm measurements assessed on both legs of the \nWSM were averaged to provide unilateral criterion values; \nthis facilitated comparisons with various untrained, resist- \nance-trained, and athletic groups previously investigated in \npublished works from our laboratory (10, 11, 13–15; Table 1). \nIMTP and CMJ values were predominantly compared with \nexisting research literature with the highest comparable male \ndata [e.g., IMTP gross peak force: (18–25); IMTP net peak force: \n\nRESULTS \n\nParticipant Descriptives and Anthropometrics \n\nThe WSM was 30.6 yr old and 1.90 m tall and his body \nmass was 172 kg upon reporting for the laboratory visit. The \nage, height, and body mass of participants from the compar- \native datasets featured in our previously published research \nare presented in Table 1. Age, height, and body mass for \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org 793", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", + "target_page": 10, + "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. \n\n5. McLeod M, Breen L, Hamilton DL, Philp A. Live strong and prosper: \nthe importance of skeletal muscle strength for healthy ageing. \nBiogerontology 17: 497–510, 2016. doi:10.1007/s10522-015-9631-7. \nKraemer WJ, Caldwell LK, Post EM, DuPont WH, Martini ER, \nRatamess NA, Szivak TK, Shurley JP, Beeler MK, Volek JS, Maresh \nCM, Todd JS, Walrod BJ, Hyde PN, Fairman C, Best TM. Body com- \nposition in elite strongman competitors. J Strength Cond Res 34: \n3326–3330, 2020. doi:10.1519/jsc.0000000000003763. \nAbe T, Buckner SL, Dankel SJ, Jessee MB, Mattocks KT, Mouser \nJG, Loenneke JP. Skeletal muscle mass in human athletes: what is \nthe upper limit? Am J Hum Biol 30: e23102, 2018. doi:10.1002/ \najhb.23102. \n\n6. \n\nConclusions \n\nIn conclusion, this novel investigation documented the \nmuscle and tendon morphology and whole body strength \nand power characteristics of an exceptionally strong individ- \nual, relative to comparative athletic, trained, and untrained \n\n798 J Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "The participant reported for their MRI scan [3.0-T \nDiscovery MR750W (70-cm-wide bore), GE Medical] having \nnot completed any strenuous physical activity in (cid:2)24 h and \nhad received prior instruction to arrive in a relaxed state hav- \ning eaten and drunk normally. The participant sat quietly for \n15 min prior to their scan. The participant lay supine for the \nMRI scan of the lower-body musculature from T12 to the lat- \neral malleolus. A body coil (GE Medical) allowed axial T1- \nweighted images (time of repetition/time to echo 600/8.144 \nms, image matrix 512 (cid:3) 512, field of view 500 (cid:3) 500 mm, \npixel size 0.9766 (cid:3) 0.9766 mm, slice thickness 5 mm, and \ninterslice gap 5 mm) to be acquired in five overlapping \nblocks. Images of both sides of the body were acquired \nwithin a single scan for blocks 1 (T12 to pelvis), 4 (knee joint \nspace to midshank), and 5 (midshank to lateral malleolus). \nHowever, due to the size of the participant’s thighs, it was \nnecessary to scan each thigh individually for blocks 2 (pelvis \nto midthigh) and 3 (midthigh to knee joint space); this \ninvolved the radiographer repositioning the field of view \nbetween scanning the first and the second thigh but not \nphysically moving the coil or the participant. Oil-filled cap- \nsules were secured to the surface of the participant’s skin \nwith Transpore tape at intervals along the length of the lower \nbody prior to the scan and in an offline analysis used to ver- \nify the alignment of the blocks (Horos software, Version 3.36, \nhttps://horosproject.org/). \n\nTraining History \n\nThe WSM had been continuously involved in systematic, \nregular upper- and lower-body resistance training for 15 yr at \nthe time of testing. In the 12 mo prior to testing, the partici- \npant’s resistance training consisted of the following typical \nexercises: lower body: squats, deadlifts, leg press, and knee \nextension; and upper body: bench press, shoulder press, \ndumbbell/barbell rows, and lat pull-down. The proportion of \nthe participant’s training within the following repetition \nranges over the last 12 mo was as follows: near maximum \nloads [1–5 repetition maximum (RM)]: 10%; heavy loads (6– \n14 RM): 80%; and moderate loads ((cid:2)15 RM): 10%. The partici- \npant reported only occasional (<1(cid:3)/week) use of advanced \nresistance training practices (i.e., complex training and ac- \nfrequently (>3(cid:3)/ \ncommodating resistance method) but \nweek) executed training repetitions with the intention to \nmove the load as fast as possible. The WSM’s nutritional \n\n790 \n\nThe offline analysis was of the following muscles/com- \npartments (Fig. 1): iliopsoas (psoas major and iliacus com- \nbined); sartorius; tensor fasciae latae; adductor magnus; \ngracilis; gluteus maximus; gluteus medius and minimus \n(combined, due to difficulty separating the two muscles); \nrectus femoris (RF); vastus lateralis (VL), medialis (VM), and \nintermedius (VI); semimembranosus (SM); semitendinosus \n(ST); biceps femoris long (BFlh) and short heads (BFsh); pop- \nliteus; lateral and medial gastrocnemius; soleus; and the an- \nlateral, and deep posterior compartments of the \nterior, \nshank. The anterior shank compartment consisted of the \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "isometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and \n\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). \nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024 \n\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0. \nPublished by the American Physiological Society. \nwww.jappl.org", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "Figure 1. Example axial MRI images from \nthe World’s Strongest Man and deadlift \nchampion (WSM; A–C) and an untrained \nfrom the hip \ncontrol participant \n(A and D), thigh (B and E), and lower leg (C \nand F). Image location relative to femur \nand shank length was matched between \nthe WSM and the untrained control as fol- \nlows: hip image is at approximately midfe- \nmoral head, thigh image is at (cid:6)52% of \nfemur length (0% is distal end of femur, \n100% is greater trochanter), and lower leg \nimage is at (cid:6)70% of shank length (0% is \nlateral malleolus, 100% is proximal end of \ntibia). The untrained control participant \ndisplayed was from the work by Miller et al. \n(13) and had a total measured muscle vol- \nume of all measured muscles that was 5.1% \nsmaller than the mean of the untrained \ngroup within that study. \n\n(D–F) \n\nadjustment to different heights. A bar height producing a \nknee joint angle of 145(cid:7) (measured by a manual goniometer) \nwas selected, and the participant was instructed to keep his \ntorso upright while completing the IMTP efforts. Two cali- \nbrated 10-kN-capacity force platforms (model 9286B, Kistler \nInstruments, Ltd., London, UK), one underneath each foot, \nwere placed on top of the isometric rig’s base plate, and verti- \ncal force signals from the eight individual load cells across the \ntwo force platforms were outputted (External Control Unit \nmodel 5233 A, Kistler Instruments, Ltd.) and sampled at 2,000 \nHz using an external analog-to-digital converter (Micro 1401; \n\nCED, Cambridge, UK) and recorded with Spike 2 computer \nsoftware (CED, Cambridge, UK). \n\nFollowing a warm-up consisting of a series of incremental \nwarm-up contractions of (cid:6)5 s duration ranging from 50% to \n90% of maximum perceived effort, two maximum IMTP \nefforts of 3��5 s duration were performed under the instruc- \ntion to “pull as hard as possible.” Six minutes separated the \nmaximum efforts, based on a self-selected recovery period. \nWrist wraps were worn to remove the influence of grip \nstrength from the assessment. Real-time overall feedback \nfrom the force platforms (the sum of the force signals from", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed12.pdf" + }, + { + "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract \n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. \n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength \n\nINTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "**MRI acquisition.**MRI scanning sessions at the University of Califor- \nnia, Santa Barbara and Irvine were conducted on 3T Prisma scanners \nequipped with 64-channel phased-array head/neck coil (of which 50 \ncoils are used for axial brain imaging). High-resolution anatomical scans \nwere acquired using a T1-weighted (T1w) magnetization prepared rapid \ngradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, \ntime to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, \n0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, \nTE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) \nturbo spin echo scan was also acquired with an oblique coronal orienta- \ntion positioned orthogonally to the main axis of the hippocampus (TR/ \nTE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, \n2-mm slice thickness, 38 interleaved slices with no gap, total acquisi- \ntion time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) \nprotocol sampled the entire brain with the following parameters: \nsingle phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, \n*b*-max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm \nvoxel resolution. These images were linearly registered to the \nwhole-brain T1w MPRAGE image. A custom foam headcase was used \nto provide extra padding around the head and neck, as well as to mini- \nmize head motion. Additionally, a custom-built sound-absorbing foam \ngirdle was placed around the participant’s waist to attenuate sound \nnear the fetus during second-trimester and third-trimester scanning. \n\n**Study design**\nThe participant underwent 26 MRI scanning sessions from 3 weeks \nbefore conception through 2 years postpartum (162 weeks), during \nwhich high-resolution anatomical and diffusion spectrum imaging \nscans of the brain were acquired. Scans were distributed throughout \nthis period, including prepregnancy (four scans), first trimester (four \nscans), second trimester (six scans), third trimester (five scans) and \npostpartum (seven scans; Fig. 1c). The first 6 sessions took place at \nthe UCSB Brain Imaging Center (BIC), the final 20 sessions took place \nat the UCI Facility for Imaging and Brain Research (FIBRE). The major- \nity of scans took place between 9 AM and 2 PM, limiting significant \nAM–PM fluctuations49. The MRI protocol, scanner (Siemens 3T Prisma) \nand software (version MR E11) were identical across sites. Each scan- \nner was checked weekly for the duration of the study and passed all \nQC reports indicating no significant alterations in the geometry. To \nensure the robustness of the findings, after the final study session, the \nparticipant completed back-to-back validation scans at UCI and UCSB \nwithin a 12-h window to assess reliability between scanners. Intraclass \ncorrelation coefficients (two-way, random effects, absolute agreement, \nsingle rater) reveal ‘excellent’ test–retest reliability between scanners, \nincluding ROI-level GMV (ICC = 0.97, 95% CI: 0.80–0.99), ROI-level \nCT (ICC = 0.96, 95% CI: 0.90–0.98), MTL subfield volume (ICC = 0.99, \n95% CI: 0.97–0.99) and ROI-level QA (ICC = 0.94, 95% CI: 0.91–0.97). \nFurthermore, when examining the relationship between gestation \nweek and GMV among UCI-only gestational sessions, findings were \nconsistent (Supplementary Fig. 12), indicating that site differences \nare highly unlikely to have contributed meaningfully to the observed \neffects. Although not applicable here, we note that having a control \nparticipant scanned over a similar duration within the same scanner is \ncritical for estimating how much variation in the brain can be attributed \nto within-scanner variability.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed4.pdf" + }, + { + "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). \n\nIn this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "Analysis and Comparative Data \n\nMuscle volumes, patellar tendon CSA, and patellar tendon \nmoment arm measurements assessed on both legs of the \nWSM were averaged to provide unilateral criterion values; \nthis facilitated comparisons with various untrained, resist- \nance-trained, and athletic groups previously investigated in \npublished works from our laboratory (10, 11, 13–15; Table 1). \nIMTP and CMJ values were predominantly compared with \nexisting research literature with the highest comparable male \ndata [e.g., IMTP gross peak force: (18–25); IMTP net peak force: \n\nRESULTS \n\nParticipant Descriptives and Anthropometrics \n\nThe WSM was 30.6 yr old and 1.90 m tall and his body \nmass was 172 kg upon reporting for the laboratory visit. The \nage, height, and body mass of participants from the compar- \native datasets featured in our previously published research \nare presented in Table 1. Age, height, and body mass for \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org 793", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed12.pdf" + }, + { + "text": "Following an (cid:6)10-min self-selected whole body loaded \nbarbell-based warm-up and three submaximum warm-up \nCMJs performed with (cid:6)50% of perceived maximum effort, \nthe WSM performed three maximal effort CMJs, with 30 s of \nrest between jumps, on a portable Kistler force plate (Quattro \nJump, Type 9290AD, Kistler, Switzerland), interfaced with a \npersonal computer. Prior to all jumps, the participant was \ninstructed to stand still on the force plate in an upright pos- \nture with their arms by their sides. Sampling was initiated \nwhen they provided an indication they were ready to begin, \nand after a 2-s pause to collect the force due to body mass \nand a 3-s countdown, the participant performed a CMJ for \nmaximal height, with arm movement and the depth of coun- \ntermovement self-selected by the participant. The Quattro \njump device records vertical ground reaction force at a sam- \npling frequency of 500 Hz and calculates jump height and \npeak power using integration/double integration of the force \nsignal (Quattro jump software, type 2822A1-1, version 1.1.1.4) \nto derive velocity (multiplied by force to calculate power) \nand displacement (jump height). \n\nXn(cid:5)1 \nh \nVm ¼ ðAmi þ Ami þ 1Þ \n2 \ni¼1 \n\nwhere Am represents the muscle CSA calculated from each \nimage, i is the image number, n is the total number of \nimages, and h is the distance between images. The volume of \nfive functional muscle groups was calculated as the sum \nof the following muscles: hip extensors (gluteus maxi- \nmus, adductor magnus, BFlh, SM, and ST), hip flexors \n(iliopsoas, RF, sartorius, and tensor fasciae latae), knee \nextensors (RF, VI, VM, and VL), knee flexors (gracilis, \nBFlh and BFsh, SM, ST, sartorius, popliteus, and medial \nand lateral gastrocnemius), and plantarflexors (medial \nand lateral gastrocnemius and soleus). The sum of all the \nmeasured lower-body muscles was also quantified as the \nvolume of “all muscles.” \n\nOnce muscle MRI scanning had been completed, a flex \ncoil (GE Medical) was used to acquire unilateral T1-weighted \naxial (time of repetition/time to echo 650/9.476 ms, image \nmatrix 512 (cid:3) 512, field of view 180 (cid:3) 180 mm, pixel size \n0.3516 (cid:3) 0.3516 mm, slice thickness 2 mm, and interslice gap \n0 mm) and sagittal images (time of repetition/time to echo \n606/9.512 ms, image matrix 512 (cid:3) 512, field of view 180 (cid:3) 180 \nmm, pixel size 0.3516 (cid:3) 0.3516 mm, slice thickness 2 mm, \nand interslice gap ¼ 0 mm) from both knee joints. The axial \nimages were obtained perpendicular to the line of the tendon \nfrom (cid:6)2 cm superior to the apex of the patella to (cid:6)2 cm \n\nIsometric Midthigh Pull \n\nIMTP contractions were performed within an isometric \nrig consisting of a base plate with stainless steel uprights \n(ESP Fitness, Loughborough, UK), which facilitated barbell \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org 791", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + }, + { + "text": "As a further test of the robustness of the dataset, we ran QC assess- \nments on all T1w images using the IQMs pipeline64 from MRIQC (ver- \nsion 23.1). Assessments of interest included (1) coefficient of joint \nvariation (CJV), (2) signal-to-noise ratio for gray matter (SNR) and (3) \ncontrast-to-noise ratios (CNR). All QC metrics fell within expected \nstandard ranges65 (Supplementary Fig. 4b–d). Although relationships \nexisted between gestation week and QC measures (CJV,*r*= 0.70 and \n*P*< 0.001; SNR and CNR,*r*= −0.83 and*P*< 0.001), including these vari- \nables in the regression models did not detract from our finding sug- \ngesting cortical GMV reductions occur over gestation, especially within \nregions belonging to attention and somatosensory networks (Supple- \nmentary Fig. 5). When looking across all MRIQC outputs, discrepancies \nwere noted in session seven (gestation week nine, first trimester). \nRemoving this day from the analyses only strengthened observed \nrelationships between cortical volume and gestation; however, for \ncompleteness, data from this day is included in the main findings. \nThese QC outputs for each session of the experiment can be found \nin Supplementary Data 1. Finally, we used FreeSurfer’s Eueler num- \nber to evaluate a field-standard quantitative assessment of each T1w \nstructural image66. We observed no significant relationships between \nthe Euler number and gestation week or summary brain metrics. A \ndiscrepancy (for example, two s.d. below average) was noted in session \neight; however, again, removing this session did not detract from our \nmain findings showing reductions in GMV over gestation.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What is typical age at which multiple sclerosis is diagnosed ?", + "target_page": 2, + "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "activity correlates in Swedish adults with multiple sclerosis: \n\n\n \n \n \n \n [html]\n
22 De Jagher H, Ds Paslo E. Participatory sense - making an enactive approach to social oupation. Phenomenel Cogni lici. ( 2007 ) 6 ( 4 ): 485 – 507. doi : 1011007 / A1197 - 9076 - 9
23. DiCicco - Bloom B, Crabtee BF. The qualitative research interview. Med Educ ( 2006 ) 40 ( 4 ) 314 – 21. doi : 10.111 ( 1.165 - 2929.200.02418. x
24 Malternal K. The art and scimce of clinical knowledge : evidence beyond measures and numbers. Lavcet : ( 2001 ) 358 ( 9279 ; 397 – 400. doi : 10106 / 60140 – 6736 ( 01 ) 10548 - 9
25. Tong A, Sainsbury P, Crag 1. Consolidated criteria for neporting qualitative research ( COREQ ): a 32 - term checklist for interviews and focus groups. Int J Qual Health Care : ( 2007 ) 19 ( 6 ): 349 – 37. doi : 10.10.100 / integluc / mam042
26 Antiers EC, Breaten T, Fikke HE, Normane Is, Feasibility of a now intervention addressing group - hased balance and ligh - intensity training, physical activity, and omployment in individuals with multiple sclerosis a pist randomizo
27 : Podgaate G : Foltabuli : sgen kitter insotins, steeths aller bogge diet? / failored in there own culture : from within, vatuile or both? In : Foundalent E, Fugistal OL, Aue TB, edure. Mendole Foltarbuli. Produleson or Evaluative Data / M
28. Malteral X. Theory and interprotation in qualitative studies from general practice : why and how? Scored / Public Hoslib. ( 2016 ) 44 ( 2 ): 120 - 9 doi : 10.1177 / 1405494815621181
29. Kartike JF. Rating neurologic impairment in multiple sclerosis an expanded disability stutus scale ( EDSS ). Neurology. ( 1983 ) 33 ( 11 ) 1444 – 52. doi : 10.1212 / wnl 33.11144
30. Malteral X. Systematic test condenation : a strategy for qualitative analysis. Scand J Public Health ( 2012 ) 40 ( 8 ): 795 – 805. dos : 10.11177 / 1403404812465030
31. Rused N, Gallagher S, Meti RM, Hayes S, Meti RW, Coste S. Experiences of people with multiple sclerosis participating in a secal cognitive behavior change physical activity interention. Physiother Therry Pract. ( 2012 ) 39 ( 3 ) 1 – 9 dot
32. Smith M, Neibling B, Wiflumo G, Hisks M, Barker R. Consumer experience of a featible exercise participation program ( HIP ) for individuals with multiple ederesis : a minad - methods study. Physiother flox Jot ( 2011 ) 26 ( 4 ): e102 ): inta
\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018).", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). \n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "s \nt \nh \ng \ni \ne \nw \nn \no \ni \nt \ns \ne \nu \nQ \n\n; \ny \nr \nt \ne \nm \no \nr \ni \np \ns \n\nd \ne \nr \ni \na \np \nm \n\n. \nn \nw \no \nh \ns \ni \n\no \ni \nt \na \nr \ne \nr \na \n\nd \ne \nv \nr \ne \ns \ne \nr \np \n¼ \nm \nS \nI \nR \nP \n\ns \ne \ny \n\nd \ne \nr \ne \nw \ns \nn \na \n\no \nh \nw \ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\n; \nt \ns \ne \nT \n\nt \nn \ne \nm \n\ns \ns \ne \ns \ns \nA \nD \nP \nO \nC \n¼ \nT \nA \nC \n\nf \no \n\ns \ne \ng \na \nt \nn \ne \nc \nr \ne \np \n\ne \nr \ne \nh \nw \n\nHowever, 1,415 either did not attend or were unable to \ncomplete adequate spirometry. Ultimately, 2,857 (67%) \nof those eligible underwent both pre- and post-BD \nspirometry. \n\nOf these 2,857 participants, 2,090 (73.2%) had normal \nspirometry, 265 (9.3%) had undiagnosed asthma, 330 \n(11.5%) had undiagnosed COPD, and 172 (6.0%) had \nPRISm based on post-BD spirometry. Of the 595 \nindividuals with spirometric evidence of asthma or \nCOPD, 253 were independently assessed by a \npulmonologist. In 245 of these 253 cases (97%), the \nindependent physician diagnosis agreed with the study \ndiagnosis of asthma or COPD. \n\nIndividuals in the COPD group were generally older \nand more likely to be male compared with all other \nstudy groups (Table 1). All groups, including healthy \ncontrol participants, had mean BMIs in the overweight \nor obese ranges. The PRISm group was heaviest with an \naverage BMI of 34.7, and 22% of PRISm patients met \nBMI criteria for morbid obesity. Compared with all \nother groups, those with COPD were the most likely to \nhave active or previous tobacco use, with the highest \naverage total pack-years of 32.7. The control group had \nthe lowest number of people with active or previous \ntobacco use. \n\n. \ns \nn \no \ni \nt \ns \ne \nu \nq \n\n, \ns \nn \no \ni \nt \ns \ne \nu \nq \nl \n\na \nu \nd \ni \nv \ni \nd \nn \no \nn \nr \no \ni \ns \ne \ny \nw \no \ne \nb \nl \ns \na \n\ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\nn \nw \no \nh \ns \n\ne \nr \na \n\nt \nn \ne \nm \no \nt \n\nd \ne \nt \nn \ne \ns \ne \nr \np \ns \ns \ne \ns \ns \na \n\na \ne \nn \np \ns \ny \nd \n\ne \nr \ne \nw \n5 \n1 \nQ \no \nt \ne \nh \nt \n\ng \nn \ni \nt \na \nu \nc \na \nc \n3 \nQ \nd \nn \na \n\n, \n) \nl \na \nt \no \nt \n( \nr \no \nf \n\nd \ne \ns \nu \n\nTable 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. \n\nl \n\n. \ne \nr \ni \na \nn \nn \no \ni \nt \ns \ne \nu \nQ \n\nl \n\n3 \nQ \nd \nn \na \n\n) \ns \nt \nn \ne \ni \nc \nfi \nf \ne \no \nc \ny \nr \no \nt \na \nr \ni \np \ns \ne \nR \n\n, \n2 \nQ \n\n, \n1 \nQ \nr \no \nf \ng \nn \ni \nr \no \nc \ns \ns \ne \ng \nr \no \ne \nG \n\n’ \n) \nD \nS \n( \n\ns \ni \ns \ny \na \nn \na \nn \na \ne \nm \n\n. \nt \nS \n¼ \nQ \nR \nG \nS \n\nl \n\ns \na \n\nt \nn \ne \nn \no \np \nm \no \nc \nd \ne \nt \nn \ne \ns \ne \nr \np \nl \n\na \np \ni \nc \nn \ni \nr \np \n( \n\ne \nr \na \n\na \nt \na \nD", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "**Figure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005**\n**and 2013, by age of individual at first presentation.**\n\n\n\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableNo. of and how parameters
", + "page_start": 28, + "page_end": 28, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", + "page_start": 26, + "page_end": 26, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the \n\nEthics statement \n\nThis study involving humans was approved by Regional \nCommittee for Medical Research Ethics in North Norway (REK \nNorth: \nat \nthe Data \nNordlandssykehuset Hospital Trust, Norway. This study was \nlegislation and \nconducted in accordance with the \n\nProtection Officer 174,837) and \n\nlocal \n\n4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "0.0011.45Baseline disability0.810.18< 0.0012.250.980.19< 0.0012.66Change in pain0.340.11< 0.0011.410.370.11< 0.0011.45Emergency roomAge− 0.00.03< 0.0010.910.48− 0.060.030.030.940.50Anatomical location ( neck ) c0.540.970.581.71− 0.370.920.690.69Anatomical location ( low back ) c0.720.950.452.05− 0.040.890.970.96Anatomical location ( shoulder ) c− 2.861.490.060.06− 3.521.530.020.03Insurance ( public ) d1.89", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed5.pdf" + }, + { + "text": "performed an outlier check, labeling images as a ‘low-quality outlier’ if \nthe correlation coefficient was >3 s.d. from the absolute mean. None of \nour scans were flagged as outliers. The reconstructed participant files \nwere aggregated into one connectometry database per metric. *Subcortical GMV*. A similar statistical approach was taken for subcorti- \ncal volume estimates. We ran a multivariate regression analysis predict- \ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by \ngestation week (FDR-corrected at*q*< 0.05). \n\nTo evaluate the relationship between gestation week and MTL \nsubregion volume over pregnancy (*n*= 7 bilateral subregions and \n*n*= 18 MTL scans), we used a combination of linear and nonlinear \nmodels based on individual subregion data patterns. Models were \ncompared for best fit with each subregion via AIC from the GLM output \n(as described in ‘Summary brain metrics’). A linear regression model \nwas most appropriate for PHC (AICdiff < 3), whereas a quadratic model \nperformed best for CA1 and CA2/CA3. As a control, we repeated the \nanalyses with MTL subregion volumes after proportional volume cor- \nrection of total GMV calculated by ASHS. Finally, we evaluated the \nrelationship between endogenous sex hormones (estrogen and proges- \nterone) and subregion volumes using linear regression. Relationships \nwere considered significant only if they met FDR correction at*q*< 0.05. \n\n*Day2Day control dataset*. To compare our findings against a control \ngroup of nonpregnant densely-sampled individuals, we used the Day- \n2Day dataset23 which offered comparable whole-brain T1 and T2 MTL \nscans for eight participants (two male) scanned 12–50 times over 2–7 \nmonths. Each participant was run through the ANTs CT and ASHS pro- \ncessing pipelines as outlined above (‘Cortical volume and thickness’ \nand ‘Hippocampal segmentation’). To note, for each participant, we \ncreated an SST based on their first two sessions for consistency with \nthe primary dataset; subfield volumes for the T2 MTL scans did not \nundergo manual retouching. Due to missing header information on \nthe publicly available diffusion scans, we were unable to benchmark \nour white matter changes with the Day2Day dataset. \n\n**Statistical analysis.**Statistical analyses were conducted using R (sMRI; \nversion 3.4.4) and DSI Studio (dMRI; Chen-2022-07-31).", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", + "target_page": 4, + "target_passage": "Age in years Mean 47.6", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual,", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "activity correlates in Swedish adults with multiple sclerosis: \n\n\n \n \n \n \n [html]\n
22 De Jagher H, Ds Paslo E. Participatory sense - making an enactive approach to social oupation. Phenomenel Cogni lici. ( 2007 ) 6 ( 4 ): 485 – 507. doi : 1011007 / A1197 - 9076 - 9
23. DiCicco - Bloom B, Crabtee BF. The qualitative research interview. Med Educ ( 2006 ) 40 ( 4 ) 314 – 21. doi : 10.111 ( 1.165 - 2929.200.02418. x
24 Malternal K. The art and scimce of clinical knowledge : evidence beyond measures and numbers. Lavcet : ( 2001 ) 358 ( 9279 ; 397 – 400. doi : 10106 / 60140 – 6736 ( 01 ) 10548 - 9
25. Tong A, Sainsbury P, Crag 1. Consolidated criteria for neporting qualitative research ( COREQ ): a 32 - term checklist for interviews and focus groups. Int J Qual Health Care : ( 2007 ) 19 ( 6 ): 349 – 37. doi : 10.10.100 / integluc / mam042
26 Antiers EC, Breaten T, Fikke HE, Normane Is, Feasibility of a now intervention addressing group - hased balance and ligh - intensity training, physical activity, and omployment in individuals with multiple sclerosis a pist randomizo
27 : Podgaate G : Foltabuli : sgen kitter insotins, steeths aller bogge diet? / failored in there own culture : from within, vatuile or both? In : Foundalent E, Fugistal OL, Aue TB, edure. Mendole Foltarbuli. Produleson or Evaluative Data / M
28. Malteral X. Theory and interprotation in qualitative studies from general practice : why and how? Scored / Public Hoslib. ( 2016 ) 44 ( 2 ): 120 - 9 doi : 10.1177 / 1405494815621181
29. Kartike JF. Rating neurologic impairment in multiple sclerosis an expanded disability stutus scale ( EDSS ). Neurology. ( 1983 ) 33 ( 11 ) 1444 – 52. doi : 10.1212 / wnl 33.11144
30. Malteral X. Systematic test condenation : a strategy for qualitative analysis. Scand J Public Health ( 2012 ) 40 ( 8 ): 795 – 805. dos : 10.11177 / 1403404812465030
31. Rused N, Gallagher S, Meti RM, Hayes S, Meti RW, Coste S. Experiences of people with multiple sclerosis participating in a secal cognitive behavior change physical activity interention. Physiother Therry Pract. ( 2012 ) 39 ( 3 ) 1 – 9 dot
32. Smith M, Neibling B, Wiflumo G, Hisks M, Barker R. Consumer experience of a featible exercise participation program ( HIP ) for individuals with multiple ederesis : a minad - methods study. Physiother flox Jot ( 2011 ) 26 ( 4 ): e102 ): inta
\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018).", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the \n\nEthics statement \n\nThis study involving humans was approved by Regional \nCommittee for Medical Research Ethics in North Norway (REK \nNorth: \nat \nthe Data \nNordlandssykehuset Hospital Trust, Norway. This study was \nlegislation and \nconducted in accordance with the \n\nProtection Officer 174,837) and \n\nlocal \n\n4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "The meaningfulness of exploring \none’s own limits through \ninteractions and enjoyment \nin outdoor high-intensity \nphysiotherapy for people \nwith multiple sclerosis: a \nqualitative study \n\nStine Susanne Haakonsen Dahl1*, Ellen Christin Arntzen1 and \nBritt Normann1,2 \n\n1Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2Department of Physiotherapy, \nNordland Hospital Trust, Bodø, Norway \n\n\n \n \n \n \n [html]\n
OPEN ACCESS
EDITED IIY
Jacqui H Morris,
University of Dundee, United Kingdom
REVIEWED IIY
Nicola Saywell, Auckland University of Technology, New Zealand
Verna Stavric,
Auckland University of Technology, New Zealand
+ CORRISPONDENCE
Stine Susanne Haakonsen Dahl
# stine. s. dahl @ nord. no
RECEIVED 27 September 2023
AcccrTto 06 March 2024
Pumusved 18 March 2024
CITATION
Dahl SSH, Arntzen EC and Normann B ( 2024 ) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in
The meaningfulness of exploring one ’ s own limits through interactions and enjoyment in outdoor high - intensity physiotherapy for
people with multiple sclerosis : a qualitative study.
Front. Rehabil. Sci. 5 : 1303094.
doi : 10.5389 / fresc. 2024.1303094
COPYRIGHT
© 2024 Dahl, Arntzen and Normann. This is an open - access article distributed under the terms of the Creative Commons Attribution
License ( CC BY ). The use, distribution or reproduction in other forums is permitted, provided the original author ( s ) and the
copyright owner ( s ) are credited and that the original publication in this journal is cited, in accordance with accepted academic practic
No use, distribution or reproduction is permitted which does not comply with these terms.
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory \n\n1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). \n\nphysically active as their sensorimotor impairments improved \n(16). To address PA challenges in pwMS, GroupCoreDIST was \nfurther developed to include a four-week period of outdoor \ntraining, \nand \nGroupCoreDIST exercises are integrated (Table 2). To our \ntraining \nknowledge, \nand \nfunctions have been \nrehabilitation of \nfor \nsparsely explored. Patient perspectives are essential \nthe \nthe new \nevaluation of healthcare interventions (17); however, \nto be \noutdoor component of CoreDISTparticipation has yet \nfirst-person \nParticularly \ninvestigated \ninteresting is what participants perceive as meaningful regarding \nthe intervention, as \nfor motivation, motor \nlearning and exercise adherence (18). \n\nin which high-intensity walking/running \n\ncombinations \n\nof \nspecific sensorimotor \n\nhigh-intensity \n\nEarly promotion of PA and exercise is recommended due to \nnumerous established benefits in health, symptom management \nand well-being for pwMS (4). \nIn particular, high-intensity \ntraining is endorsed, as it has possible neuroprotective effects in \nIn addition, exercises addressing \nthe disease course (5, 6). \nsensorimotor \nstrength, \n(e.g., \nimpairments \nreduced neuromuscular control) are recommended, as they target \nindividuals’ \n(7). \nSensorimotor impairments can influence trunk control, which is \ncommonly disturbed in pwMS, even when disability is low (8, 9), \nand correlate with impaired balance, walking capacity and \nexercise benefits, \ndistance \nattitudes and motivations, as well as contextual aspects such as \nlack of optimal exercise interventions, accessibility and support, \naffect the level of PA and exercise participation (12). \n\nTo deepen our understanding of what \n\nis concurrently expressing \n\nan exercise \n\nrepertoire for perception and action \n\nCoreDISTparticipation (Table 1) is a new comprehensive \nintervention addressing sensorimotor function, \ntrunk control, \nhigh-intensity running/walking and work participation in pwMS \nwith low disability (13). It is based on the GroupCoreDIST1 \nintervention, which has been shown to have significant short- \nand long-term effects on trunk control, balance and walking \namong pwMS (14, 15). However, no effects of the intervention \non objectively measured PA have been identified, even though \nthe participants reported perceptions of new possibilities to be", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). \n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt \n\nWe consider the instances of the physiotherapist running \ntogether with the participant, which were perceived as important \nfor participants’ performance, to be an example of “participatory \nsense-making” (22). As participants appreciated being guided or \nthe \neven pushed by the physiotherapists, \nphysiotherapists were trusted in directing this interaction. As \nsuch, we argue that \nto \nparticipants’ movements, \nspeech and gestures—tailoring the \ninteraction to their needs—was important for this ability to be \nperceived as purposeful. This is supported by the few negative \nincidents \nparticipant-physiotherapist \ninteraction seemed to not be jointly coordinated and appeared to \nfail. The reported mutual influences of sensorimotor capabilities \nand interpersonal coordination, with the physiotherapists but \nalso the group, are in accordance with sensorimotor capacities \nand intersubjective interactions being important \nsense- \nmaking in the world (35). The benefits of these individualized \nparticipant-physiotherapist \ninteractions are also described in \nspecific core-stability exercises in indoor groups (16, 43) and are \nin line with the \nfacilitation of \nthrough hands-on interaction previously proposed \nmovement \n(44, 45). Our study informs new knowledge of physiotherapist- \nparticipant \nto achieve the recommended high- \nintensity training and calls for physiotherapy clinical reasoning \nthrough bodily and verbal communication skills adapted to the \nparticipants’ responses in an ongoing and situated way. \n\ndescribed where the \n\nand detailed \nsensorimotor exercises was valued and provided meaningful \nembodied experiences, improving participants’ ability to master \nPA and their beliefs of their own possibilities for being active in \nthe future. However, the manner in which the content of an \nexercise intervention is delivered and the environment in which \nit is delivered should be accounted for, as these aspects were \nperceived to be of great importance in creating and shaping \nparticipants’ experiences. In particular, tailored physiotherapist- \nparticipant bodily interactions and an engaging group and \noutdoor \nfor \nexploring one’s own potential. \n\nCombining high-intensity walking/running \n\nenvironment were perceived to be pertinent \n\nTo minimize negative incidents in future interventions, we \nsuggest that (1) the effort required from one’s leg muscles \nduring the detailed exercises (in between the running/walking \nnegative \nintervals) \nconsequences of \nleg muscle fatigue prior to high-intensity \nrunning/walking, (2) the capacity for running/walking at high- \nintensity should be explored in one-to-one physiotherapy \nassessment prior to group training to optimize individuals \ncapabilities and safety, and (3) homogenous and small-sized \ngroups \nshould be used to enable ongoing and tailored \nphysiotherapist-participant interactions.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "\n \n \n \n \n [html]Week 1 : MS outpatient clinicWeek 2 - 5 : MunicipalityOutlies proup 94 mix × 2 weekly, for 4 weeks. It maximum of ton participants and two physiotherapists were included in outs program. Trank ; control and halance ( Group ) and / OUT rearcises ) were addressed, and high - intensity walking or mav\n
Consultations with 66 MS were 120 min / n address were rolered issues based on a structured gaids comprising the following themes : howebdge ). of MS at the workplace, experienced work - educated challenges due to 180, potential nonb and far
Physiotherapy associoteneity to explore the potential for changes in balance and walking aiming to term focus toward possibilities and thus.’ motivate the patient.
Based on those assessments the 105 nurse and the physiotherapist indicated the appects of impertance on a standardized form to inferm the monicipal physiotherapist.
Standardized testing ( baseline, for the RCT ).
Physiotherapy usessest ( 40 – 90 min ) to oxplore the pelont ' s impairments and protential for improvements in a clinical examination prior to group - teaming
Inder proup ( 60 min × 2 would ); These wore these to they participants in acid group and on physiotherapist. Treated, halance ) and physical activity were adhressed ( Group Ceref / M5D ). Participants restred a fails to GerdNST Algial cortis
Digital morting with a multidisciplinary team ( proMS, employee, physiotherapist & MS search ( 20 min ) regarding herien to work participations ) and needs for adaptations regarding work and physical activity, according to structuredi
Week 6
Standardized testing ( midway, for the RCT ).Week 7 – 10. Municipality
Additionally, porticipants were exoveraged to comply with the exercise - videos through a weekly SMS - reminder.
Week 11 – 14
Standardized testing ( final, for the RCT ) and qualitative interviews.
\n\n2 Materials and methods \n\n2.1 Design \n\nin-depth interviews using a phenomenological- \ninspired approach were chosen, as this is suitable for exploring \nthe meaning and significance of pwMS’s \nexperiences and \nreflections (23, 24). \n\nIndividual \n\n2.2 Ethical considerations \n\nThe study was conducted according to the Declaration of \nHelsinki and approved by the Regional Committee for Medical \nResearch Ethics in North Norway (REK North: 174837). Written \ninformed consent was obtained prior to the intervention and \nconfirmed verbally when arranging the interviews. Participation \nwas voluntary and anonymous, \nand the participants were \ninformed about the opportunity to withdraw from the study. The \nConsolidated Criteria for Reporting Qualitative Research (COREQ) \n(25) were used to optimize the conduct and reporting of the study. \n\n2.3 Study context \n\ninterview study was nested within a randomized \n(RCT) comparing the CoreDISTparticipation \ncontrolled trial \nintervention to usual care (26) and conducted at a regional \nhospital MS-outpatient clinic (Nordland Hospital Trust) and in \ntwo affiliated municipalities in the northern Norway. The current \nintervention group’s \nstudy investigates participants \nexperiences of the four-week outdoor group, which was part of \nthis new intervention (Table 2). The outdoor sessions were \nconducted by three trained physiotherapists working in the \n\nThis \n\nin the", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", + "target_page": 4, + "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "activity correlates in Swedish adults with multiple sclerosis: \n\n\n \n \n \n \n [html]\n
22 De Jagher H, Ds Paslo E. Participatory sense - making an enactive approach to social oupation. Phenomenel Cogni lici. ( 2007 ) 6 ( 4 ): 485 – 507. doi : 1011007 / A1197 - 9076 - 9
23. DiCicco - Bloom B, Crabtee BF. The qualitative research interview. Med Educ ( 2006 ) 40 ( 4 ) 314 – 21. doi : 10.111 ( 1.165 - 2929.200.02418. x
24 Malternal K. The art and scimce of clinical knowledge : evidence beyond measures and numbers. Lavcet : ( 2001 ) 358 ( 9279 ; 397 – 400. doi : 10106 / 60140 – 6736 ( 01 ) 10548 - 9
25. Tong A, Sainsbury P, Crag 1. Consolidated criteria for neporting qualitative research ( COREQ ): a 32 - term checklist for interviews and focus groups. Int J Qual Health Care : ( 2007 ) 19 ( 6 ): 349 – 37. doi : 10.10.100 / integluc / mam042
26 Antiers EC, Breaten T, Fikke HE, Normane Is, Feasibility of a now intervention addressing group - hased balance and ligh - intensity training, physical activity, and omployment in individuals with multiple sclerosis a pist randomizo
27 : Podgaate G : Foltabuli : sgen kitter insotins, steeths aller bogge diet? / failored in there own culture : from within, vatuile or both? In : Foundalent E, Fugistal OL, Aue TB, edure. Mendole Foltarbuli. Produleson or Evaluative Data / M
28. Malteral X. Theory and interprotation in qualitative studies from general practice : why and how? Scored / Public Hoslib. ( 2016 ) 44 ( 2 ): 120 - 9 doi : 10.1177 / 1405494815621181
29. Kartike JF. Rating neurologic impairment in multiple sclerosis an expanded disability stutus scale ( EDSS ). Neurology. ( 1983 ) 33 ( 11 ) 1444 – 52. doi : 10.1212 / wnl 33.11144
30. Malteral X. Systematic test condenation : a strategy for qualitative analysis. Scand J Public Health ( 2012 ) 40 ( 8 ): 795 – 805. dos : 10.11177 / 1403404812465030
31. Rused N, Gallagher S, Meti RM, Hayes S, Meti RW, Coste S. Experiences of people with multiple sclerosis participating in a secal cognitive behavior change physical activity interention. Physiother Therry Pract. ( 2012 ) 39 ( 3 ) 1 – 9 dot
32. Smith M, Neibling B, Wiflumo G, Hisks M, Barker R. Consumer experience of a featible exercise participation program ( HIP ) for individuals with multiple ederesis : a minad - methods study. Physiother flox Jot ( 2011 ) 26 ( 4 ): e102 ): inta
\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018).", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the \n\nEthics statement \n\nThis study involving humans was approved by Regional \nCommittee for Medical Research Ethics in North Norway (REK \nNorth: \nat \nthe Data \nNordlandssykehuset Hospital Trust, Norway. This study was \nlegislation and \nconducted in accordance with the \n\nProtection Officer 174,837) and \n\nlocal \n\n4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n\n \n \n \n \n [html]\n
VariableTotal ( n = 15 )
Age in yearsMean 47.6 ( SD 6.04 )
Gender ( women / men )12 woman / 3 men ( 80 %/ 20 %)
Type of MSRelapsing remitting 15 ( 100 %)
EDSSMean 1.8 ( SD 0.9 )
Years since diagnosisMean 10.4 ( SD 7.8 )
Participation in the outdoor groupMean 4.6 sessions / total mean attendance 57.3 %
\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). \n\ntrustworthiness \nthe methodology, findings,", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). \n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual,", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \n\n\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt \n\nWe consider the instances of the physiotherapist running \ntogether with the participant, which were perceived as important \nfor participants’ performance, to be an example of “participatory \nsense-making” (22). As participants appreciated being guided or \nthe \neven pushed by the physiotherapists, \nphysiotherapists were trusted in directing this interaction. As \nsuch, we argue that \nto \nparticipants’ movements, \nspeech and gestures—tailoring the \ninteraction to their needs—was important for this ability to be \nperceived as purposeful. This is supported by the few negative \nincidents \nparticipant-physiotherapist \ninteraction seemed to not be jointly coordinated and appeared to \nfail. The reported mutual influences of sensorimotor capabilities \nand interpersonal coordination, with the physiotherapists but \nalso the group, are in accordance with sensorimotor capacities \nand intersubjective interactions being important \nsense- \nmaking in the world (35). The benefits of these individualized \nparticipant-physiotherapist \ninteractions are also described in \nspecific core-stability exercises in indoor groups (16, 43) and are \nin line with the \nfacilitation of \nthrough hands-on interaction previously proposed \nmovement \n(44, 45). Our study informs new knowledge of physiotherapist- \nparticipant \nto achieve the recommended high- \nintensity training and calls for physiotherapy clinical reasoning \nthrough bodily and verbal communication skills adapted to the \nparticipants’ responses in an ongoing and situated way. \n\ndescribed where the \n\nand detailed \nsensorimotor exercises was valued and provided meaningful \nembodied experiences, improving participants’ ability to master \nPA and their beliefs of their own possibilities for being active in \nthe future. However, the manner in which the content of an \nexercise intervention is delivered and the environment in which \nit is delivered should be accounted for, as these aspects were \nperceived to be of great importance in creating and shaping \nparticipants’ experiences. In particular, tailored physiotherapist- \nparticipant bodily interactions and an engaging group and \noutdoor \nfor \nexploring one’s own potential. \n\nCombining high-intensity walking/running \n\nenvironment were perceived to be pertinent \n\nTo minimize negative incidents in future interventions, we \nsuggest that (1) the effort required from one’s leg muscles \nduring the detailed exercises (in between the running/walking \nnegative \nintervals) \nconsequences of \nleg muscle fatigue prior to high-intensity \nrunning/walking, (2) the capacity for running/walking at high- \nintensity should be explored in one-to-one physiotherapy \nassessment prior to group training to optimize individuals \ncapabilities and safety, and (3) homogenous and small-sized \ngroups \nshould be used to enable ongoing and tailored \nphysiotherapist-participant interactions.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "The meaningfulness of exploring \none’s own limits through \ninteractions and enjoyment \nin outdoor high-intensity \nphysiotherapy for people \nwith multiple sclerosis: a \nqualitative study \n\nStine Susanne Haakonsen Dahl1*, Ellen Christin Arntzen1 and \nBritt Normann1,2 \n\n1Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2Department of Physiotherapy, \nNordland Hospital Trust, Bodø, Norway \n\n\n \n \n \n \n [html]\n
OPEN ACCESS
EDITED IIY
Jacqui H Morris,
University of Dundee, United Kingdom
REVIEWED IIY
Nicola Saywell, Auckland University of Technology, New Zealand
Verna Stavric,
Auckland University of Technology, New Zealand
+ CORRISPONDENCE
Stine Susanne Haakonsen Dahl
# stine. s. dahl @ nord. no
RECEIVED 27 September 2023
AcccrTto 06 March 2024
Pumusved 18 March 2024
CITATION
Dahl SSH, Arntzen EC and Normann B ( 2024 ) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in
The meaningfulness of exploring one ’ s own limits through interactions and enjoyment in outdoor high - intensity physiotherapy for
people with multiple sclerosis : a qualitative study.
Front. Rehabil. Sci. 5 : 1303094.
doi : 10.5389 / fresc. 2024.1303094
COPYRIGHT
© 2024 Dahl, Arntzen and Normann. This is an open - access article distributed under the terms of the Creative Commons Attribution
License ( CC BY ). The use, distribution or reproduction in other forums is permitted, provided the original author ( s ) and the
copyright owner ( s ) are credited and that the original publication in this journal is cited, in accordance with accepted academic practic
No use, distribution or reproduction is permitted which does not comply with these terms.
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory \n\n1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). \n\nphysically active as their sensorimotor impairments improved \n(16). To address PA challenges in pwMS, GroupCoreDIST was \nfurther developed to include a four-week period of outdoor \ntraining, \nand \nGroupCoreDIST exercises are integrated (Table 2). To our \ntraining \nknowledge, \nand \nfunctions have been \nrehabilitation of \nfor \nsparsely explored. Patient perspectives are essential \nthe \nthe new \nevaluation of healthcare interventions (17); however, \nto be \noutdoor component of CoreDISTparticipation has yet \nfirst-person \nParticularly \ninvestigated \ninteresting is what participants perceive as meaningful regarding \nthe intervention, as \nfor motivation, motor \nlearning and exercise adherence (18). \n\nin which high-intensity walking/running \n\ncombinations \n\nof \nspecific sensorimotor \n\nhigh-intensity \n\nEarly promotion of PA and exercise is recommended due to \nnumerous established benefits in health, symptom management \nand well-being for pwMS (4). \nIn particular, high-intensity \ntraining is endorsed, as it has possible neuroprotective effects in \nIn addition, exercises addressing \nthe disease course (5, 6). \nsensorimotor \nstrength, \n(e.g., \nimpairments \nreduced neuromuscular control) are recommended, as they target \nindividuals’ \n(7). \nSensorimotor impairments can influence trunk control, which is \ncommonly disturbed in pwMS, even when disability is low (8, 9), \nand correlate with impaired balance, walking capacity and \nexercise benefits, \ndistance \nattitudes and motivations, as well as contextual aspects such as \nlack of optimal exercise interventions, accessibility and support, \naffect the level of PA and exercise participation (12). \n\nTo deepen our understanding of what \n\nis concurrently expressing \n\nan exercise \n\nrepertoire for perception and action \n\nCoreDISTparticipation (Table 1) is a new comprehensive \nintervention addressing sensorimotor function, \ntrunk control, \nhigh-intensity running/walking and work participation in pwMS \nwith low disability (13). It is based on the GroupCoreDIST1 \nintervention, which has been shown to have significant short- \nand long-term effects on trunk control, balance and walking \namong pwMS (14, 15). However, no effects of the intervention \non objectively measured PA have been identified, even though \nthe participants reported perceptions of new possibilities to be", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "34. Gallagher S, Bower M. Making enactivism even more embodied. AVANT: \nJ Philos Interdiscip Vanguard. (2014) 5(2):232–47. doi: 10.26913/50202014.0109.0011 \n\n35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life \nand Language. Cambridge: MIT press (2018). \n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat \nGan). (2017) 45(4):1437–51. doi: 10.1007/s11406-017-9817-0 \n\n37. Bandura A. Health promotion by social cognitive means. Health Educ Behav. \n(2004) 31(2):143–64. doi: 10.1177/1090198104263660 \n\n38. Casey B, Coote S, Hayes S, Gallagher S. Changing physical activity behavior in \npeople with multiple sclerosis: a systematic review and meta-analysis. Arch Phys Med \nRehabil. (2018) 99(10):2059–75. doi: 10.1016/j.apmr.2017.12.013 \n\n39. Silveira SL, Cederberg KLJ, Jeng B, Sikes EM, Sandroff BM, Jones CD, et al. Do \nphysical activity and social cognitive theory variable scores differ across symptom \ncluser severity groups in multiple sclerosis? Disabil Health J. (2021) 14(4):101163. \ndoi: 10.1016/j.dhjo.2021.101163 \n\n40. Learmonth YC, Motl RW. Exercise training for multiple sclerosis: a narrative \nreview of history, benefits, safety, guidelines, and promotion. Int J Environ Res \nPublic Health. (2021) 18(24):13245. doi: 10.3390/ijerph182413245 \n\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical \nactivity interventions among persons with multiple sclerosis. Neurorehabil Neural \nRepair. (2019) 33(1):3–14. doi: 10.1177/1545968318818904 \n\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in fitness, \nmobility and cognition with exercise-training in MS. Acta Neurol Scand. (2019) 139 \n(2):183–91. doi: 10.1111/ane.13041 \n\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, \nindividualized physiotherapy intervention for people with multiple sclerosis: a \nqualitative study. Physiother Res Int. (2019) 25(3):e1829. doi: 10.1002/pri.1829 \n\n44. Normann B. Facilitation of movement: new perspectives provide expanded \ninsights to guide clinical practice. Physiother Theory Pract. (2020) 36(7):769–78. \ndoi: 10.1080/09593985.2018.1493165 \n\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in \n(2015) 31(4):244–52. doi: 10.3109/ \nphysical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis:", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What was the sales revenue of Santos in 2004 ?", + "target_page": 12, + "target_passage": " Sales revenue was a record $1,501 million", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \n\n\n \n \n \n \n [html]decline reduced n by a furthern boe.to effectively control its casts in the face of significant external pressures in the form of risingthese factors, Santos ’ ojects are starting to jine and have bequn toExamining production costs in detail. reveals :edecline experienced oast three years. Two vere commissioned in Bayu - Undan liquids▪ the start - up of Bayu - Undan and acquisitions added $ 16 million to Santos ’ cost baseand the Minerva gas n addition, acquisitions▪ changes in our accounting added a further $ 16 million to Santos ’ production costsproduction is expected• higher insurance premiums ($ 8 mllion ) and one - off stock res.The impact of the ncident. Santos now roduction to be around boe in 2005. Thisoffset by $ 17 million in cost savings largely as a result of Santos ' continuous improvement initiativess largely driven by the oning of Mutineer - Exeter 2005 and the 3ohnthe Moomba incident resulted in $ 17 million of one - off costs in 2004.as field in the middle ar.Piecing this together, the key themes in our financial performance were :ION COSTS DNTROLcosts in 2004 were lon, up $ 45 million or 003. Analysis shows os was able to continue\n
▪ cost savings in established production areas more than offset increases in the price of services and materialsMean definitionε0Santos ’ cost : base rose as production from new developments and acquisitions were added to the Company ’ s expanding portfolio of producing assets.
0.465Table4030
zo32710
", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n**1,544.3**\n**–**\n**3.5**\n**14.5**\n**19.9**\n**(583.6)**\n**(169.6)**\n**(65.2)**\n**(158.8)** 1,637.3 \n0.4 \n2.5 \n17.0 \n28.2 \n(439.9) \n(118.7) \n(60.9) \n(168.6) **644.4**\n**251.7**\n**45.1**\n**19.0**\n**18.0**\n**(279.0)**\n**(78.4)**\n**(90.6)**\n**(137.5)** 683.0 \n0.4 \n36.9 \n22.1 \n1.6 \n(186.4) \n(39.8) \n(83.6) \n(65.1) \n\n**605.0** 897.3 **392.7** 369.1 \n\n**Cash flows from operating activities**\nReceipts from customers \nDividends received \nInterest received \nOverriding royalties received \nPipeline tariffs and other receipts \nPayments to suppliers and employees \nRoyalty, excise and PRRT payments \nBorrowing costs paid \nIncome taxes paid \n\n**Net cash provided by operating activities**\n\n**Cash flows from investing activities**\nPayments for: \n\nExploration \nDelineation \nDevelopment \nLand and buildings, plant and equipment \nAcquisitions of oil and gas assets \nAcquisitions of controlled entities \nShare subscriptions in controlled entities \nRestoration \n\nProceeds from disposal of non-current assets \nProceeds from disposal of controlled entities \nOther investments \n\n**Net cash used in investing activities**\n\n**Cash flows from financing activities**\nDividends paid \nProceeds from issues of ordinary shares \nProceeds from issue of redeemable convertible preference shares \nRedemption of reset convertible preference shares \nNet drawdowns/(repayments) of borrowings \nNet (payments to)/receipts from controlled entities \nPremium paid on buy-back of reset convertible preference shares \nOther \n\n**Net cash (used in)/provided by financing activities**\n\n**Net increase/(decrease) in cash**\n**Cash at the beginning of the year**\nEffects of exchange rate changes on the balances of cash held in foreign currencies \n\n**Cash at the end of the year**\n\n(149.8) \n(75.0) \n(188.1) \n(337.8) \n(7.6) \n(22.7) \n– \n(2.6) \n108.0 \n22.6 \n– \n\n(653.0) \n\n(198.0) \n8.3 \n– \n– \n(20.4) \n– \n– \n– \n\n(210.1) \n\n34.2 \n84.8 \n(7.9) \n\n111.1 \n\n**(65.7)**\n**(6.1)**\n**(124.4)**\n**(127.7)**\n**–**\n**(93.6)**\n**(151.7)**\n**(0.1)**\n**430.0**\n**–**\n**(0.5)**\n\n**(139.8)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**–**\n**(297.0)**\n**(2.4)**\n**–**\n\n**(266.3)**\n\n**(13.4)**\n**52.9**\n**(0.2)**\n\n**39.3**\n\n(30.6) \n(29.5) \n(68.7) \n(91.7) \n(1.5) \n(22.7) \n(469.9) \n(0.3) \n62.7 \n3.9 \n– \n\n(648.3) \n\n(198.0) \n8.3 \n– \n– \n– \n494.1 \n– \n– \n\n304.4 \n\n25.2 \n26.6 \n1.1 \n\n52.9 \n\n**(126.0)**\n**(73.7)**\n**(256.1)**\n**(343.1)**\n**(14.5)**\n**(112.3)**\n**–**\n**(7.3)**\n**39.9**\n**–**\n**(0.5)**\n\n**(893.6)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**282.8**\n**–**\n**(2.4)**\n**0.4**\n\n18 \n18 \n\n**313.9**\n\n**25.3**\n**111.1**\n**(8.4)**\n\n**128.0**\n\nThe statements of cash flows are to be read in conjunction with the notes of the financial statements.", + "page_start": 53, + "page_end": 53, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **15. Interest-Bearing Liabilities**\n\n**Current**\nAmounts owing to controlled entities \nLong-term notes \nBank loans \nOther **–**\n**43.7**\n**5.2**\n**1.0** – \n45.4 \n– \n– **1,685.4**\n**–**\n**–**\n**1.0** 1,411.7 \n– \n– \n– \n\n**49.9** 45.4 **1,686.4** 1,411.7 \n\nThe interest-bearing amounts owing to controlled entities are for loans made in the \nordinary course of business on normal market terms and conditions for an indefinite period. \n\n**Non-current**\nBank loans \nCommercial paper \nMedium-term notes \nLong-term notes **222.7**\n**209.0**\n**20.0**\n**757.8** – \n110.0 \n20.0 \n833.3 **–**\n**–**\n**–**\n**–** – \n– \n– \n– \n\n**1,209.5** 963.3 **–** – \n\n**Details of major credit facilities**\n**(a) Bank loans**\nThe Santos Group has access to the following committed revolving facilities: \n\n***Revolving facilities at 31 December 2004***\n**Year of maturity** **Currency**\n\n2005 \n2006 \n2008 \n2009 Multi-currency \nMulti-currency \nMulti-currency \nMulti-currency \n\n**Amount**\n**A$million**\n\n**75.0**\n**125.0**\n**300.0**\n**200.0**\n\n**700.0**\n\nRevolving bank loans bear interest at the relevant interbank reference rate plus 0.25% to 0.43%. The amount drawn at 31 December 2004 \nis $nil (2003: $nil). \n\n***Term facilities at 31 December 2004***\n**Year of maturity** **Currency** **Amount**\n\n**Amount Drawn at**\n**31 December 2004**\n**A$million** **A$million**\n\n2005 \n2006 \n2007 \n2008 \n2009 \n2010 \n2011 \n2012 \n2013 \n2014 \n2015 \n2016 \n2017 USD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD \nUSD **5.2**\n**10.5**\n**20.6**\n**19.7**\n**24.5**\n**25.4**\n**26.3**\n**22.6**\n**19.0**\n**20.0**\n**20.4**\n**20.8**\n**21.9** **5.2**\n**10.5**\n**18.6**\n**18.1**\n**22.3**\n**23.0**\n**23.8**\n**20.0**\n**16.2**\n**17.0**\n**17.3**\n**17.5**\n**18.4**\n\n**256.9** **227.9**\n\nDrawdowns under the term loans are dependent upon expenditure for specific projects. \n\nTerm loans bear interest at the relevant interbank reference rate plus a margin of up to 0.75%. The amount drawn at 31 December 2004 \nis US$177.5 million (A$227.9 million) at a weighted average annual effective interest rate of 2.70%. \n\n**(b) Commercial paper**\n\nThe Santos Group has an A$800.0 million (2003: A$800.0 million) Australian commercial paper program supported by the revolving facilities \nreferred to in (a) above. At 31 December 2004, A$209.0 million (2003: A$110.0 million) of commercial paper is on issue and the weighted \naverage annual effective interest rate is 5.61% (2003: 5.50%).", + "page_start": 61, + "page_end": 61, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "STATEMENTS OF FINANCIAL PERFORMANCE \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]NoteCo2004Smillion619Earnings per share ( cents )Diluted\n
2003 $ millionS2004SmillionLtd2003 $ millionProduct sales
21.500.91.465.0568.8616.3
Cost of sales3( 1.049.8 )( 974.4 )( 414.5 )( 356.6 )
Gross profit451.1490.6154.3259.7Other revenue
2252.3154.4858.0126.2
Other expenses3( 129.0 )( 179.5 )( 221.0 )( 108.3 )
Borrowing costs4( 33.6 )( 34.6 )( 91.1 )( 84.0 )
Profit from ordinary activities before income tax expense540.8430.9700.2193.6Income tax expense relating to ordinary activities
( 160.9 )( 103.9 )( 57.1 )( 10.7 )
Net profit after income tax attributable to the shareholders of Santos Ltd379.9327.0643.1182.9Net exchange differences relating to self - sustaining foreign operations
( 0.2 )( 4.7 )
Total changes in equity from non - owner related transactions attributableto the shareholders of Santos Ltd379.7322.3643.1182.9
Basic2158.652.1
2158.551.5
", + "page_start": 51, + "page_end": 51, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **19. Foreign Currency Translation Reserve**\n\nBalance at the end of the year **(9.0)** (8.8) **–** – \n\n**Movements during the year**\nBalance at the beginning of the year \nExchange difference on net investment in foreign operations and related hedges: \n**(8.8)** (4.1) **–** – \n\nGross hedges \nRelated income tax \nOverseas net assets **17.3**\n**(5.2)**\n**(12.3)** 123.5 \n(37.1) \n(91.1) **–**\n**–**\n**–** – \n– \n– \n\nNet translation adjustment **(0.2)** (4.7) **–** – \n\nBalance at the end of the year **(9.0)** (8.8) **–** – \n\nThe foreign currency translation reserve records the foreign currency differences arising from the translation of self-sustaining foreign operations, the \ntranslation of transactions that hedge the Company’s net investment in a foreign operation or the translation of foreign currency monetary items \nforming part of the net investment in a self-sustaining operation. \n\n**Consolidated** **Santos Ltd**", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. \n\nImportantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **29. Commitments for Expenditure**\n\nThe Santos Group has the following commitments for expenditure: \n**(a) Capital commitments**\n\nCapital expenditure contracted for at balance date for which no amounts \nhave been provided in the financial statements: \n\nDue not later than one year \nDue later than one year but not later than five years **253.5**\n**13.4** 237.7 \n33.2 **93.9**\n**8.2** 84.3 \n0.2 \n\n**266.9** 270.9 **102.1** 84.5 \n\nSantos Ltd has guaranteed the capital commitments of certain controlled entities \n(refer note 31 for further details). \n**(b) Minimum exploration commitments**\n\nMinimum exploration commitments for which no amounts have been provided \nin the financial statement or capital commitments: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years **42.1**\n**118.8**\n**11.6** 108.2 \n207.7 \n31.4 **10.3**\n**61.2**\n**–** 36.5 \n70.9 \n– \n\n**172.5** 347.3 **71.5** 107.4 \n\nThe Santos Group has certain obligations to perform minimum exploration work and expend \nminimum amounts of money pursuant to the terms of the granting of petroleum \nexploration permits in order to maintain rights of tenure. These commitments may be \nvaried as a result of renegotiations of the terms of the exploration permits, licences or \ncontracts or alternatively upon their relinquishment. The minimum exploration \ncommitments are less than the normal level of exploration expenditures expected to be \nundertaken by Santos Ltd and its controlled entities. \n\n**(c) Lease commitments**\nOperating leases: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years \n\n**54.7**\n**102.9**\n**0.1** 39.1 \n140.1 \n19.0 **8.4**\n**21.1**\n**–** 18.7 \n115.1 \n18.9 \n\n**157.7** 198.2 **29.5** 152.7 \n\n**30. Superannuation Commitments**\n\nSantos Ltd and certain controlled entities participate in a number of superannuation funds and pension plans in Australia and the United States of \nAmerica. From 1 February 2002, three of the more significant employee benefit plans were combined into a single plan which provides benefits either \non a defined benefit or cash accumulation basis for employees or their dependants on retirement, resignation, temporary or permanent disablement \nor death. The employers and employee members make contributions as specified in the rules of the plan. \n\nIn the case of the defined benefit component of the combined plan, employer contributions are based on the advice of the plan’s actuary. The most \nrecent actuarial assessment of the plan was undertaken as at 1 January 2004. \n\nThe following is a summary of the Santos Superannuation Plan: \n\n**Type of benefit**\n**Basis of contributions**\n\n\n \n \n \n \n [html]\n
Type of benefitDefined benefits and cash accumulation
Basis of contributions
Percentage of member ' s salary contributed by member and employers. The employer ' s percentage reflects the amount to provide an accumulation and the amount recommended by the actuary to provide the defined benefit.Last actuarial assessment :
Balance date1 January 2004
Date issued20 December 2004
", + "page_start": 83, + "page_end": 83, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. \n\nIn Australia, our increasing focus \non the potential of offshore areas \nwill see Santos drill three wells \noff Western Australia in 2005, \none off southern Australia and \ntwo wells off northern Australia. \nWe will also drill two wells \nonshore in Queensland and one \nonshore in Victoria. \n\nThe discovery of oil and gas \nat Hiu Aman in the Kutei Basin, \noffshore East Kalimantan, has \nprovided a strong start to our \n2005 exploration program and \nwe look forward with anticipation \nto further work on that \nsignificant find. Santos has a \n50% interest in the discovery. We \nbelieve this region of Indonesia \nis very promising and Santos \nexpects to drill four wells in the \nKutei Basin in 2005. \n\n**BIGGEST DEVELOPMENT**\n**YEAR YET**\nI am pleased also to report \nthat 2004 was a record year for \ndevelopment with six projects \nadvancing through the pipeline. \n\nSantos has an exciting \nexploration program for 2005: one \nthat I believe holds the highest \nresource potential of any program \nin the Company's 50-year history. \n\n5 Annual Report 2004", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**32. Additional Financial Instruments Disclosure**\n\n**(a) Foreign exchange risk exposure**\n\nThe Santos Group is exposed to foreign exchange risk principally through the sale of liquid petroleum products denominated in US dollars, \nUS dollar borrowings and US dollar expenditure. In order to hedge this foreign exchange risk, the Santos Group has from time to time entered \ninto forward foreign exchange, foreign currency swap and foreign currency option contracts. \n\nAt 31 December 2004 the Santos Group has one open forward foreign currency exchange contract which has expired in January 2005. If closed \nout at balance date a loss of $0.2 million would have resulted. \n\nUS dollar denominated borrowings are either swapped into Australian dollar exposure (2004: US$321.4 million; 2003: US$115.0 million) or \ndesignated as a hedge of US dollar denominated investments in self-sustaining overseas controlled entities (2004: US$313.0 million; \n2003: US$323.6 million) or as a hedge of future US denominated sales revenues (2004: US$146.4 million; 2003: US$219.4 million). As a result, \nthere were no net foreign currency gains or losses arising from translation of US denominated dollar borrowings recognised in the statements \nof financial performance in 2004. Accordingly, $37.4 million of unrealised foreign currency gains were deferred as at 31 December 2004 \n(2003: gains of $66.3 million). The ultimate foreign currency gains or losses will be included in the measurement of the specific hedged US dollar \ndenominated sales revenues to be realised in the years 2005 through 2006. \n\nThe Australian dollar equivalents of foreign currency monetary items included in the statements of financial position to the extent that they are \nnot effectively hedged are: \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n\n \n \n \n \n [html]0042003\n
20042003$ million$ million
$ million$ millionCurrent assets– United States dollars126.482.7
32.941.3Current liabilities– United States dollars60.535.4
6.58.5Non - current liabilities– United States dollars26.5
", + "page_start": 85, + "page_end": 85, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**ACQUIRING NEW ACREAGE**\nFuture exploration success depends \non quality exploration acreage. \nSantos acquired five exploration \nblocks in three hydrocarbon \nprovinces during 2004. The most \nsignificant of these were in Egypt \nand Indonesia. \n\n• the addition of three new \n\n**2004 EXPLORATION**\n**EXPENDITURE BY CATEGORY** **2004 EXPLORATION**\n**EXPENDITURE BY REGION**\n\nventure areas in the shallow \nwaters of the Gulf of Mexico \nand onshore Montana and \nTexas, which significantly \nexpands and diversifies the \nUS exploration acreage and \nprospect inventory \n\nDrilling \n$63.6 million Offshore Australia \n$32.6 million \n\nGeoscience and other \n$37.5 million Onshore Australia \n$23.4 million \n\n• the farm-out of a 60% interest \nand operatorship of the NT/P61 \npermit in the Bonaparte Basin, \noffshore northern Australia to \nConocoPhillips \n\nSeismic \n$17.2 million South East Asia \n$41.4 million \n\nNew ventures \n$7.3 million United States \n$28.2 million \n\nEgypt and surrounding countries \nare a focus area for Santos. The \nCompany has farmed in to three \nexploration blocks in Egypt with \nUS petroleum group, Devon \nEnergy, committing approximately \n$70 million to an eight-well \nexploration joint venture over \nthe next three years in the Gulf \nof Suez. This is Santos’ first move \ninto the North Africa–Middle East \nregion, which is considered the \nworld’s premier hydrocarbon \nprovince. \n\n• the farm-out of a 16.67% \ninterest in the WA-264-P \npermit offshore Western \nAustralia to Beach Petroleum \n\n• the farm-out of a 70% interest \nin the deep water exploration \nblock, Nth Bali 1 PSC, offshore \nEast Java Basin to Total \nand Mitsui \n\nAn example of this is the strong \nposition Santos has created in \nthe Kutei Basin, with interests in \nthree neighbouring production \nsharing contracts: Popodi, \nDonggala and Papalang. 2004 also marked the year that \nSantos drilled its first operated \ndeep water wells – a significant \nachievement for a company that \nhad its beginnings in a desert \nenvironment. \n\nSantos continues to seek other \nexploration opportunities in this \narea, concentrating on the Gulf \nof Suez and the onshore Desert \nBasins. \n**KUTEI BASIN**\n\nSantos has acquired six \nexploration permits in Indonesia \nover the past three years, \nincluding an interest in the \nDonggala PSC in the Kutei Basin \nduring late 2004. This block lies \nbetween Santos’ other Kutei \nacreage: the Papalang and \nPopodi PSCs. \n\n• the farm-out of a 25% \n\ninterest in the VIC P/51 \nblock containing the Callister \nprospect to Mitsui & Co \nsubsidiary Mitwell Energy \nResources. \n\nThese farm-outs continued the \ntrend of risk-sharing with quality \npartners. \n\n**ADDING MATERIAL PROSPECTS**\nSantos is now in a position that \nexploration success in 2004 and \ngood acreage management has \ncreated future options that will \nultimately translate into greater \nvalue for the business in 2005 \nand beyond. \n\nThe addition of the Donggala PSC \ngives Santos a particularly strong \npresence in the Kutei Basin and \ncovers a highly prospective trend, \nwhile adding to the Company’s \ngrowing Indonesian operations. \n\nThis has been achieved by \nfocusing on ‘basin excellence’. \nThis means becoming a technical \nleader in basins, within our focus \nareas, entering early where \npossible to keep entry costs \ndown, balancing the commercial \nand the technical risks and \nselecting the right co-venturers. \n\nOther exploration acreage \nportfolio management and \nactivities during 2004 included: \n\n• the award of exploration permit \n\nT/36P in the Sorell Basin, \noffshore Tasmania \n\nAnnual Report 2004", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "How have been confirmed nonvanishing neutrino ?", + "target_page": 2, + "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "parameter to be consistent with the current observations. We also calculate the scattering \n\ncross section between the DM particle and nucleon and discuss the implication for the direct \n\nDM search experiments. We summarize our results in the section IV. Our notations and the \n\nformulas used in our analysis are listed in Appendix. \n\nII. THE MINIMAL GAUGED U (1)B L MODEL WITH Z2 PARITY \n− \n\nThe model is based on the gauge group SU(3)C × SU(2)L × U(1)Y × \nU(1)B L. Additional \n\n− \nL, a SM singlet \nfields besides the standard model fields are a gauge field Z ′µ of the U(1)B \n− \n\nB L Higgs boson Ψ with two U(1)B L charge, and three RH neutrinos Ni which are \n− \n− \n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH \n\nneutrinos, we use the four component representation of RH neutrino constructed from the \n\nWeyl spinor νRi, \n\nνRi \n\nNi ≡ \n, (1) \n  \n\nǫ ν∗Ri \n  \nFor the two RH neutrinos, N1 and N2, we assign Z2 parity even, while odd for N3, so that \n\nthe RH neutrino N3 is stable and, hence, the DM candidate. \n\nDue to the additional gauge symmetry U(1)B L, the covariant derivative for each fields \n− \n\nis given by \n\nDµ = D(SM ) iqB LgB \nLZ ′µ, \n(2) \nµ \n− \n− − \n\nwhere D(SM ) is the covariant derivative in the SM, and qB L is the charge of each fields µ \n− \n\nunder the U(1)B L with its gauge coupling gB L. \n− − \n\nYukawa interactions relevant for the neutrino masses are given by \n\n3 2 3 \n\n1 \n2 yαi ¯Lα ˜ΦNi − \n¯NiΨPRNi + h.c., λRi \nLint = \n(3) \n\nXα=1 Xi=1 Xi=1 \n\nwhere ˜Φ = iτ2Φ∗ for Φ being the SM Higgs doublet, and without loss of generality we have \n− \n\nworked out in the basis where the second term in the right-hand-side is in flavor diagonal \n\nfor RH neutrinos. Because of the Z2 parity, the DM candidate N3 has no Yukawa couplings \n\nwith the left-handed lepton doublets. \n\nThe general Higgs potential for the SU(2)L doublet Φ and a singlet B L Higgs Ψ is \n− \n\ngenerally given by \n\nV (Φ, Ψ) = m2 \n1| 2 + m2 \n2| \n\n2 + λ1| \n3 \n\n4 + λ2| 4 + λ3| \n\n2 \n2. \nΦ \n| \nΨ \nΦ \n| \nΨ \nΦ \n| \nΨ (4) \n| | | |", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation \n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most \n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in \n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. \nU(1)Y × \nL model based on the gauge group SU(3)C × \nL [2] is an elegant and simple extension of the SM, in which the RH neutrinos of \n\nThe minimal gauged U(1)B \nSU(2)L × \n− \n\nU(1)B \n− \n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly \n\nIn addition, the mass of RH neutrinos arises associated with the U(1)B cancellations. L \n− \n\ngauge symmetry breaking. \n\nAlthough the scale of the B L gauge symmetry breaking is basically arbitrary as long as \n− \n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV \n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance \n\nis imposed on the minimal U(1)B L model, the symmetry breaking scale appears to be the \n− \n\nTeV scale naturally. If this is the case, all new particles, the Z ′ gauge boson, the B L \n\n− \nL gauge Higgs boson H and the RH neutrinos appear at the TeV scale unless the U(1)B \n− \n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5–8]. \n\nThen we may be able to understand the relation between the gauge symmetry breaking and \n\nthe origin of neutrino masses. \n\nAlthough such a TeV scale model is interesting and appealing, one might think that the \n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino \n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple \n\nidea to introduce the DM candidate in the minimal gauged U(1)B L model. We introduce \n− \n\nthe Z2 parity into the model and impose one of three RH neutrinos to be odd, while the \n\nothers even. In this way, the Z2-odd RH neutrino becomes stable and the DM candidate. \n\nNote that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "The Higgs fields φ and ψ are obtained by expanding Φ and Ψ as \n\n0 \n(5) \n\n1 \n√2 \n\n \n1 \n√2 \n\naround the true vacuum with the vacuum expectation values v and v′. These are related \n\nwith the mass eigenstates h and H through \n\nh cos θ sin θ φ \n\n− \ncos θ \n, \n=  \n(7) \n     \nH sin θ ψ \n\n \n \nwith θ being the mixing angle. Their masses are given by \n\n    \n\nM 2 \nh = 2λ1v2 cos2 θ + 2λ2v′ \n2 sin2 θ 2λ3vv′ sin θ cos θ, (8) \n− \n\nM 2 \nH = 2λ1v2 sin2 θ + 2λ2v′ 2 cos2 θ + 2λ3vv′ sin θ cos θ. (9) \n\nThe mass of the new neutral gauge boson Z ′ arises by the U(1)B L gauge symmetry \n− \n\nbreaking, \n\nM 2 \nZ ′ = 4g2 \nB \n2. \nLv′ \n(10) \n− \n\nAssociated with the U(1)B L gauge symmetry breaking, the RH neutrinos Ni acquire masses \n− \n\nv′ \n√2 \nMNi = \n(11) \n\nFrom LEP experiment, the current lower bound on the Z ′ boson mass has been found to \n\nbe [10, 11] \n\nMZ ′ \ngB \n= 2v′ & 6 7 TeV. (12) \n− L \n− \n\nTwo Z2-even RH neutrinos N1 and N2 are responsible for light neutrino masses via the \n\nseesaw mechanism, \n\nv2 \n2MNi \nmναβ = yαiyiβ . (13) \n\n− Xi=1,2 \nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless.", + "page_start": 3, + "page_end": 3, + "source_file": "1002.2525.pdf" + }, + { + "text": "From Eq. (19), one can see that σ(p) (sin 2θ/v′)2 for a given DM mass mN . Fig. 3 shows \nSI ∝ \n\nthe spin-independent cross section of RH neutrino with a proton. The resultant cross section \n\nis found to be far below the current limits reported by XENON10 [24] and CDMSII [25]: \n\n8 \n7 pb, for a DM mass of 100 GeV-1 TeV. Future experiments such σSI . 4 10− 2 10− \n× − × \n\nas XENON1T [26] can reach the cross section predicted in our model. \n\n10-8 \n\nFIG. 3: The spin independent scattering cross section with a proton. All parameters are same as \n\nthose used in the previous section. The upper and lower lines correspond to sin θ = 0.7 and 0.3, \n\nrespectively. \n\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\n\n \n \n \n \n [html]\n
TableAge ( years )ControlAvo antianantAllongeryStatementsParametersDataStatements
\n\n8", + "page_start": 7, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "Our RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino \n\nDM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process \n\nis Higgs exchange and the resultant cross section for a proton is given by \n\n2 \n\nmpmN \nmp + mN (cid:19) 4 \nπ (cid:18) \nσ(p) \nSI = f 2 \np , \n(17) \n\nwith the hadronic matrix element \n\nfp \nmp αq \nmq αq \nmq 2 \n27 \nf (p) \nT q f (p) \nT G \n, = + (18) \n\nXq=u,d,s Xc,b,t \n\nand the effective vertex (see Appendix for notations) \n\n∂Φ \n∂h ∂Ψ \n∂h ∂Φ \n∂H ∂Ψ \n∂H (cid:19) \n1 \nM 2 \nh 1 \nM 2 \nH \nαq = \nλN yq (cid:18) \n− \n, + (19)", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "Higgs portal dark matter in the minimal gauged U (1)B L model \n− \n\nNobuchika Okada∗ \n\nDepartment of Physics and Astronomy, \n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA \n\n0 \n1 \n0 \n2 \n\nb \ne \nF \n3 \n1 \n\n] \nh \np \n- \np \ne \nh \n[ \n\n2 \nv \n5 \n2 \n5 \n2 \n. \n2 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nOsamu Seto† \n\nDepartment of Architecture and Building Engineering, \n\nHokkai-Gakuen University, Sapporo 062-8605, Japan \n\nAbstract \n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal \n\ngauged U (1)B L model by introducing an additional parity which ensures the stability of dark \n− \n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the \n\ns-channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. \n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of \n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross \n\nsection with nucleon and show that the next generation direct dark matter search experiments can \n\nexplore this model.", + "page_start": 0, + "page_end": 0, + "source_file": "1002.2525.pdf" + }, + { + "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. \n\nOn a more careful look, we found that indifference of \nδW (ωc) to the increase of λ is merely the consequence of \nthe fact that above we kept λωsf constant. Indeed, at \nsmall frequencies, fermionic self-energy in the NS is Σ′ = \nλω, Σ” = λ2ω2/(λωsf ), and both Σ′ and Σ′′ increase \nwith λ if we keep λωsf constant. But at frequencies larger \nthan ωsf , which we actually probe by ∆W (ωc), the self- \nenergy essentially depends only on λωsf , and increasing λ \nbut keeping λωsf constant does not bring us closer to the \nphysics associated with the recovery of electron coherence \nin the SCS. To detect this physics, we need to see how \nthings evolve when we increase λωsf above the scale of \n∆ , i.e., consider a truly strong coupling when not only \nλ ≫ 1 but also the normal state ΣN S(ω ≥ ∆) >> ∆. \n\nIn this work we analyzed the behavior of optical in- \nωc \no σ(ω)dω and Kubo sum rules in \ntegrals W (ωc) ∝ \nthe normal and superconducting states of interacting \nfermionic systems on a lattice. Our key goal was to \nunderstand what sets the sign of ∆WK = ∆W (∞) be- \ntween the normal and superconducting states and what \nis the behavior of W (ωc) and ∆W (ωc) at finite ωc. In a \nweak coupling BCS superconductor, ∆W (ωc) is positive \nat ωc < 2∆ due to a contribution from superfluid den- \nsity, but becomes negative at larger ωc, and approach a \nnegative value of ∆WK. Our study was motivated by fas- \ncinating optical experiments on the cuprates7–10. In over- \ndoped cuprates, there is clear indication11 that ∆W (ωc) \nbecomes negative above a few ∆, consistent with BCS \nbehavior. In underdoped cuprates, two groups argued8,9 \nthat ∆W integrated up to the bandwidth remains posi- \ntive, while the other group argued10 that it is negative. \nThe reasoning why ∆WK may potentially change sign \nat strong coupling involves the correlation between −WK \nand the kinetic energy. \nIn the BCS limit, kinetic en- \nergy obviously increases in a SCS because of gap opening, \nhence −WK increases, and ∆WK is negative. At strong \ncoupling, there is a counter effect – fermions become more \nmobile in a SCS due to a smaller self-energy. \n\nR", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "175 \n0 \n20 \nΓ in meV \n40 \n\nFIG. 13: Behavior of WK with Γ for the original MFLI model \nat very small α = 0.05. We set ω1 = ∆ = 32 meV . Observe \nthe inconsistency with WK in the BCSI model in Fig 4. \n\n0.4 \n) \nc \nω \n( \n\nS \nN \nW \n− \n) \n0 \nc \nω \n( \n\nC \nS \nW \n\n−0.4 \n0.2 0.4 \n0.6 \n in eV \n0.8 \nω \nc \n\nFIG. 14: The special case of α = 1.5,Γ = 5 meV , other pa- \nrameters the same as in Fig. 10. These parameters are chosen \nto illustrate that two sign changes (indicated by arrows in the \nfigure) are also possible within the original MFLI model. \n\n1 \n) \n\n∞ \nW \n( \n\n0.6 \n/ \n) \nc \n\nω \nW \n( \n\n0.2 \n\n0 \n0.5 \nω \n in eV \nc \n\nFIG. 11: The evolution of the optical integral in the NS (top) \nand the SCS (bottom) in the original MFLI model. Parame- \nters are the same as above. Note that only \n80% of the \nspectral weight is recovered up to 1eV . \n75 \n∼ − \n\nNS and SCS ∆W (Original MFLI) \n\nwith lattice \nwithout lattice \n\n) \nc \n20 \nω \n( \n\nS \nN \nW \n− \n) \n10 \n\nnot not a generic one. There exists a range of parame- \nters α and Γ where ∆WK is still positive, but ∆W (ωc) \nchanges the sign twice and is negative at intermediate \nfrequencies. We show an example of such behavior in \nFig14. Still, for most of the parameters, the behavior of \n∆W (ωc) is the same as in Fig. 12. \n\nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.6 \n0.4 \nω \n in eV \nc \n\nFIG. 12: Evolution of the difference of the optical integrals in \nthe SCS and the NS with the upper cut-off ωc. Parameters are \nthe same as before. Observe that the optical sum in the SCS \nis larger than in the NS and that ∆W has not yet reached \n∆WK up to the bandwidth. The dashed line is the FGT \nresult. \n\nOn more careful looking we found the problem with the \noriginal MFLI model. We recall that in this model the \nself-energy in the SCS state was obtained by just cutting \nthe NS self energy at ω1 (see Eq.18). We argue that \nthis phenomenological formalism is not fully consistent, \nat least for small α. Indeed, for α = 0, the MFLI model \nreduces to BCSI model for which the behavior of the self- \nenergy is given by Eq. (12). This self-energy evolves with \nhas a square-root singularity at ω = ∆ + ωo \nω and Σ \nin the original MFLI model \n(with ωo = 0). Meanwhile Σ \nin Eq. (18) simply jumps to zero at ω = ω1 = ∆, and \nthis happens for all values of α including α = 0 where the \nMFLI and BCSI model should merge. This inconsistency \nis reflected in Fig 13, where we plot the near-BCS limit \nof MFLI model by taking a very small α = 0.05. We \nsee that the optical integral WK in the SCS still remains \nlarger than in the NS over a wide range of Γ, in clear \ndifference with the exactly known behavior in the BCSI \n\n′′ \n\nThis clearly affects nk because it is expressed via the full \nGreen’s function and competes with the conventional ef- \nfect of the gap opening. The distribution function from \nthis model, which we show in Fig.2b brings this point \nout by showing that in a MFLI model, at ǫ < 0, nk in a \nsuperconductor is larger than nk in the normal state, in \nclear difference with the BCSI case. \n\nWe analyzed the original MFLI model for various pa- \nrameters and found that the behavior presented in Fig. \n12, where ∆W (ωc) > 0 for all frequencies, is typical but", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. \n\nWe now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ \n\n) \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. \n\nThe most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. \n\n− \n\nmodel, where WK is larger in the NS for all Γ (see Fig. \nIn other words, the original MFLI model does not \n4). \nhave the BCSI theory as its limiting case. \n\nWe modified the MFLI model is a minimal way by \nΓ \nchanging the damping term in a SCS to \nω2+∆2 to be \nconsistent with BCSI model. We still use Eq. (18) for \nthe MFL term simply because this term was introduced \nin the NS on phenomenological grounds and there is no \nway to guess how it gets modified in the SCS state with- \n\n√ \n−", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle \n\nand mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What are the dominant contributions in thermal relic density ?", + "target_page": 5, + "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 \n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). \n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "A + 2b \n2b(cid:12) \nA \n(cid:12) \n(cid:12) \n(cid:12) \niλhhh + \nh + iMhΓh \n\nI22 + J22 ln , \n\n(cid:12) \n(cid:12) \n(cid:12) \ni \n(cid:12) \n\n(cid:19) − \n− \n\ns \n− \n\n, \n\n4 \n\n∂Ψ \n∂h (cid:19) \n8 \n(cid:18)− \n2 \n\n(B8) \n\n∂Ψ \n∂h (cid:19) \n4m2 \n2b \n\n∂Ψ \n∂h \n(cid:18) \nN + A \n\n∂Ψ \n∂H \n\ni \n∗2 = 4mN λ3 \n2 M1M \n\nN (cid:18) \ns \n\nM 2 \nA + 2b \n2b(cid:12) \nA \n(cid:19) \n(cid:12) \n(cid:12) \n(cid:12) \n\nM 2 s \nH + iMHΓH \n− \n\n4 + ln (B9) − \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nwhere θ is the scattering angle in the center of mass frame. The auxiliary functions appear \n\n(cid:18)− \n− \n\nabove are defined as \n\ns(A + m2 3m2 4m2 \nN (s N ) N ) \nI22(s) , (B10) − − \n\n4a2 2m2 \nN )(m2 m2 \nh) \n2A(A + 2a) (s \nN − − − \n\n(B11) \n\n(B12) \n\nm2 b(s, mN , mh) (B13) \nhr ≡ r \n\n(A + 2a)2 2(s + 4m2 \n\nN )A \n− \nA2 \nA(s + 4m2 \n\n4 − \n\n4b2 \n− \nN ) + A2 \n\n≡ \n\n1 \nAb \n(cid:0) \n+3m2 \ns \n2 \ns \n4 − \n\nJ22(s, mh) \n≡ \n\n− \nN ) \n\n− \n\n4m2 \nN (s \n, \n\n− \n+ m2 \nh, \n(cid:1) \nA(s, mh) \n≡ − \n\ns \n4 − \nm2 \nN . \n\nIn partial wave expansion, the thermal averaged cross section is given by \n\ndw \nds (cid:19) \n\nT \nmN (cid:21)(cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n1 \nm2 \nN (cid:20) \ndw \nds (cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n3 \n2 (cid:18) \n4m2 \nN \nσv w(s) 2w(s) = \nh i − − \n\nT \nmN \n, = 6 \n\nwith \n\n4m2 \ns \n\ns d cos θ \n\n1 \n8π r \n2 = 2, \nfinal \n4w(s) dLIPS − \n\n2 X |M| \n≡ Z \nX |M| \nZ \n\nwhere mfinal is the mass of final state particle. \n\n[1] T. Yanagida, in Proceedings of Workshop on the Unified Theory and the Baryon Number in \n\nthe Universe, Tsukuba, Japan, edited by A. Sawada and A. Sugamoto (KEK, Tsukuba, 1979), \n\np 95; M. Gell-Mann, P. Ramond, and R. Slansky, in Supergravity, Proceedings of Workshop,", + "page_start": 11, + "page_end": 11, + "source_file": "1002.2525.pdf" + }, + { + "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle \n\nand mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "2 J.-H. Chung, S. J. Chung, S. Lee, B. J. Kirby, J. A. \nBorchers, Y. J. Cho, X. Liu, and J. K. Furdyna, Phys. \nRev. Lett. 101, 237202 (2008). \n\nPolesya, H. Ebert, U. Wurstbauer, M. Hochstrasser, G. \nRossi, G. Woltersdorf, W. Wegscheider, and C. H. Back, \nPhys. Rev. Lett. 101, 267201 (2008). \n\n8 R. P. Campion, K. W. Edmonds, L. X. Zhao, K. Y. Wang, \nC. T. Foxon, B. L. Gallagher, and C. R. Staddon, J. Crys- \ntal Growth 247, 42 (2003). \n\n9 F. Maccherozzi, G. Panaccione, G. Rossi, M. Hochstrasser, \nM. Sperl, M. Reinwald, G. Woltersdorf, W. Wegscheider, \nand C. H. Back, Phys. Rev. B 74, 104421 (2006). \n\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Ed- \nmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. \n93, 132103 (2008). \n\n10 Ch. Binek, S. Polisetty, X. He and A. Berger, Phys. Rev. \nLett. 96, 067201 (2006). \n\n11 C. Won, Y.Z. Wu, E. Arenholz, J. Choi, J. Wu, and Z. Q. \n\n4 M. Zhu, M. J. Wilson, B. L. Sheu, P. Mitra, P. Schiffer, \nand N. Samarth, Appl. Phys. Lett. 91, 192503 (2007); M. \nZhu, M. J. Wilson, P. Mitra, P. Schiffer, and N. Samarth, \nPhys. Rev. B 78, 195307 (2008). \n\nQiu, Phys. Rev. Lett. 99, 077203 (2007). \n12 J. Nogues and I. K. Schuller, J. Magn. Magn. Mater. 192, \n203 (1999). \n\n13 K. F. Eid, M. B. Stone, K. C. Ku, O. Maksimov, P. Schiffer, \nN. Samarth, T. C. Shih and C. J. Palmstrom, Appl. Phys. \nLett. 85, 1556 (2004). \n\n5 S. Mark, C. Gould, K. Pappert, J. Wenisch, K. Brunner, \nG. Schmidt, and L. W. Molenkamp, Phys. Rev. Lett. 103, \n017204 (2009). \n\n14 B. T. Thole, P. Carra, F. Sette, and G. van der Laan, \nPhys. Rev. Lett. 68, 1943 (1992); P. Carra, B. T. Thole, \nM. Altarelli, and X. Wang, Phys. Rev. Lett. 70, 694 (1993). \n15 T. Jungwirth, J. Masek, K. Y. Wang, K. W. Edmonds, \n\n6 G. Wastlbauer and J.A.C. Bland, Adv. Phys. 54, 137 \n(2005). \n7 F. Maccherozzi, M. Sperl, G. Panaccione, J. Minar, S.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "**References**\n\nJ. G. Mangum, and M. S. Yun (2007), vol. 375 \nof Astronomical Society of the Pacific Conference \nSeries, p. 234. \n\n[6] S. E. Healey, R. W. Romani, G. Cotter, P. F. \nMichelson, E. F. Schlafly, A. C. S. Readhead, \nP. Giommi, S. Chaty, I. A. Grenier, and L. C. \nWeintraub, ApJS 175, 97 (2008). \n\n[7] A. A. Abdo, M. Ackermann, M. Ajello, W. B. At- \nwood, M. Axelsson, L. Baldini, J. Ballet, G. Bar- \nbiellini, D. Bastieri, B. M. Baughman, et al., ApJ \n700, 597 (2009). \n\n[8] T. Hovatta, E. Nieppola, M. Tornikoski, E. Val- \ntaoja, M. F. Aller, and H. D. Aller, A&A 485, 51 \n(2008). \n\n[1] M. Sikora and G. Madejski, in American Insti- \ntute of Physics Conference Series, edited by F. A. \nAharonian and H. J. V¨olk (2001), vol. 558 of \nAmerican Institute of Physics Conference Series, \npp. 275–288. \n\n[2] M. Sikora, in Blazar Demographics and Physics, \nedited by P. Padovani and C. M. Urry (2001), vol. \n227 of Astronomical Society of the Pacific Con- \nference Series, pp. 95–104. \n\n[3] J. A. Stevens, S. J. Litchfield, E. I. Robson, D. H. \nHughes, W. K. Gear, H. Terasranta, E. Valtaoja, \nand M. Tornikoski, ApJ 437, 91 (1994). \n[4] P. T. P. Ho, J. M. Moran, and K. Y. Lo, ApJl [9] B. C. Kelly, J. Bechtold, and A. Siemiginowska, \n616, L1 (2004). ApJ 698, 895 (2009). \n[10] M. Sikora, R. Moderski, and G. M. Madejski, ApJ \n675, 71 (2008). \n\n[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris,", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0806.pdf" + }, + { + "text": "175 \n0 \n20 \nΓ in meV \n40 \n\nFIG. 13: Behavior of WK with Γ for the original MFLI model \nat very small α = 0.05. We set ω1 = ∆ = 32 meV . Observe \nthe inconsistency with WK in the BCSI model in Fig 4. \n\n0.4 \n) \nc \nω \n( \n\nS \nN \nW \n− \n) \n0 \nc \nω \n( \n\nC \nS \nW \n\n−0.4 \n0.2 0.4 \n0.6 \n in eV \n0.8 \nω \nc \n\nFIG. 14: The special case of α = 1.5,Γ = 5 meV , other pa- \nrameters the same as in Fig. 10. These parameters are chosen \nto illustrate that two sign changes (indicated by arrows in the \nfigure) are also possible within the original MFLI model. \n\n1 \n) \n\n∞ \nW \n( \n\n0.6 \n/ \n) \nc \n\nω \nW \n( \n\n0.2 \n\n0 \n0.5 \nω \n in eV \nc \n\nFIG. 11: The evolution of the optical integral in the NS (top) \nand the SCS (bottom) in the original MFLI model. Parame- \nters are the same as above. Note that only \n80% of the \nspectral weight is recovered up to 1eV . \n75 \n∼ − \n\nNS and SCS ∆W (Original MFLI) \n\nwith lattice \nwithout lattice \n\n) \nc \n20 \nω \n( \n\nS \nN \nW \n− \n) \n10 \n\nnot not a generic one. There exists a range of parame- \nters α and Γ where ∆WK is still positive, but ∆W (ωc) \nchanges the sign twice and is negative at intermediate \nfrequencies. We show an example of such behavior in \nFig14. Still, for most of the parameters, the behavior of \n∆W (ωc) is the same as in Fig. 12. \n\nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.6 \n0.4 \nω \n in eV \nc \n\nFIG. 12: Evolution of the difference of the optical integrals in \nthe SCS and the NS with the upper cut-off ωc. Parameters are \nthe same as before. Observe that the optical sum in the SCS \nis larger than in the NS and that ∆W has not yet reached \n∆WK up to the bandwidth. The dashed line is the FGT \nresult. \n\nOn more careful looking we found the problem with the \noriginal MFLI model. We recall that in this model the \nself-energy in the SCS state was obtained by just cutting \nthe NS self energy at ω1 (see Eq.18). We argue that \nthis phenomenological formalism is not fully consistent, \nat least for small α. Indeed, for α = 0, the MFLI model \nreduces to BCSI model for which the behavior of the self- \nenergy is given by Eq. (12). This self-energy evolves with \nhas a square-root singularity at ω = ∆ + ωo \nω and Σ \nin the original MFLI model \n(with ωo = 0). Meanwhile Σ \nin Eq. (18) simply jumps to zero at ω = ω1 = ∆, and \nthis happens for all values of α including α = 0 where the \nMFLI and BCSI model should merge. This inconsistency \nis reflected in Fig 13, where we plot the near-BCS limit \nof MFLI model by taking a very small α = 0.05. We \nsee that the optical integral WK in the SCS still remains \nlarger than in the NS over a wide range of Γ, in clear \ndifference with the exactly known behavior in the BCSI \n\n′′ \n\nThis clearly affects nk because it is expressed via the full \nGreen’s function and competes with the conventional ef- \nfect of the gap opening. The distribution function from \nthis model, which we show in Fig.2b brings this point \nout by showing that in a MFLI model, at ǫ < 0, nk in a \nsuperconductor is larger than nk in the normal state, in \nclear difference with the BCSI case. \n\nWe analyzed the original MFLI model for various pa- \nrameters and found that the behavior presented in Fig. \n12, where ∆W (ωc) > 0 for all frequencies, is typical but", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "15 \n\nF. Marsiglio for many discussions concerning the infrared \nconductivity and optical integrals and thank A. Boris, E. \nvan Heumen, J. Hirsch, and F. Marsiglio for the com- \nments on the manuscript. The work was supported by \nnsf-dmr 0906953. \n\nWe would like to thank M. Norman, Tom Timusk, \nDmitri Basov, Chris Homes, Nicole Bontemps, Andres \nSantander-Syro, Ricardo Lobo, Dirk van der Marel, A. \nBoris, E. van Heumen, A. B. Kuzmenko, L. Benfato, and \n\n1 R. Kubo, J. Phys. Soc. Jpn 12, 570(1957). \n2 R.A. Ferrrel and R.E. Glover, Phys. Rev.109, 1398 (1958). \n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2, 331 \n(1959), M. Tinkham, Introduction to Superconductivity \n(McGraw-Hill, New York, 1975). \n\nand Phys. Rev. B 62, 15131 (2000). \n\n24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi \nand C. Castellani, Phys. Rev. Lett. 95, 097002 (2005). \n25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der \nMarel, Phys. Rev. B 74, 174516 (2006). \n26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck, \nPhys. Rev. B 71, 104511 (2005). \n\n4 J. Hirsch, Physica C 199, 305 (1992). \n5 D. N. Basov and T. Timusk, Rev. Mod. Phys. 77, 721 \n(2005); A. V. Puchkov, D. N. Basov and T. Timusk, J. \nPhys. Cond. Matter 8, 10049 (1996). \n27 D. van der Marel, H.J.A. Molegraaf, C. Presura, and I. \nSantoso, Concepts in Electron Correlations, edited by A. \nHewson and V. Zlatic (Kluwer, 2003) \n\n6 C. M. Varma et al, Phys. Rev. Lett. 63, 1996 (1989). \n7 D. N. Basov, S. I. Woods, A. S. Katz, E. J. Singley, R. C. \nDynes, M. Xu, D. G. Hinks, C. C. Homes and M. Strongin, \nScience 283, 49 (1999). \n\n28 L. Benfatto, J.P. Carbotte and F. Marsiglio, Phys. Rev. B \n74, 155115 (2006) \n\n29 F. Marsiglio, Phys. Rev. B 73, 064507(2006). \n30 M.R. Norman and C. P´epin, Phys. Rev. B 66, 100506(R) \n\n8 H.J.A Molegraaf, C. Presura, D. van der Marel, P.H. Kess, \nM. Li, Science 295, 2239 (2002); A. B. Kuzmenko, H. J. A. \nMolegraaf, F. Carbone and D. van der Marel, Phys. Rev. \nB 72, 144503 (2005). \n\n(2002). \n\n31 J. Fink et al., Phys. Rev. B 74, 165102(R) (2006). \n32 M. Eschrig, Adv. Phys. 55, 47-183 (2006) \n33 M.R. Norman and A.V. Chubukov, Phys. Rev. B 73, \n\n9 A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z. \nKonstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62, \n568 (2003); \n140501(R)(2006). \n\n34 A.E. Karakozov and E.G. Maksimov, cond-mat/0511185, \nA. E. Karakozov, E. G. Maksimov and O. V. Dolgov, Solid \nState Comm. 124, 119 (2002); A. E. Karakozov and E. G. \nMaksimov, ibid. 139, 80 (2006). 10 A. V. Boris, N. N. Kovaleva, O. V. Dolgov, T. Holden, \nC. T. Lin, B. Keimer and C. Bernhard, Science 304, 708 \n(2004). \n11 G. Deutscher, A. F. Santander-Syro and N. Bontemps, \n\n35 see e.g., P. B. Allen, Phys. Rev. B 3, 305 (1971); S. V. \nShulga, O. V. Dolgov and E. G. Maksimov, Physica C \n178, 266 (1991). \nPhys. Rev. B 72, 092504 (2005). \n\n36 A. A. Abriskov and L. P. Gor’kov, JETP 35, 1090 (1959), \n\n12 F. Carbone, A. B. Kuzmenko, H. J. A. Molegraaf, E. van \nHeumen, V. Lukovac, F. Marsiglio, D. van der Marel, K. \nHaule, G. Kotliar, H. Berger, S. Courjault, P. H. Kes and \nM. Li, Phys. Rev. B 74, 064510 (2006). \n\nSang Boo Nam, Phys. Rev. 156, 470 (1967). \n37 Theory of superconductivity, Schrieffer, (W. A. Benjamin \n13 C. C. Homes, S. V. Dordevic, D. A. Bonn, R. Liang and Inc., New York 1964). \n38 M.R. Norman, M. Randeria, H. Ding, and J.C. Cam- \n\nW. N. Hardy, Phys. Rev. B 69, 024514 (2004). \n14 J. Hwanget al, Phys. Rev. B 73, 014508 (2006). \n15 E. van Heumen, R. Lortz, A. B. Kuzmenko, F. Carbone, \nD. van der Marel, X. Zhao, G. Yu, Y. Cho, N. Barisic, M. \nGreven, C. C. Homes and S. V. Dordevic, Phys. Rev. B \n75, 054522 (2007). \n\npuzano, Phys. Rev. B 52, 615 (1995). \n\n39 Z.X. Shen and D.S. Dessau, Phys. Rep. 253, 1(1995), \nJ. C. Campuzano, M. R. Norman, and M. Randeria, \n“Superconductivity”(Vol-1), 923-992, Springer (2008). \n40 A. V. Chubukov, Ar. Abanov, and D. N. Basov, Phys. Rev. \n\n16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003).", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "2.5 \n2.6 \n\n*cv,*max \n2.5 \n2 \n2.4 \n\n2.3 \n1.5 \n*B*\n*k*\n2.2 \n*L*\n*/*\n*v*\n2.1 *c*\n1 20 30 40 70 50 60 \n\n*L*= 24 \n*L*= 32 \n*L*= 48 \n*L*= 64 \n0.5 \n\n0 \n0 20 40 60 \n\n80 \n*T*(K) \n\n100 120 140 \n\nFIG. 2: (color online) Specific heat cv per spin vs. temper- \nature for thickness n = 16 (for lateral dimension, see the \nlegend inside the figure). Inset: Maximum of cv vs. L ob- \ntained through MH technique. The continuum red line is a \npower law fit. \n\ndependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. \n\nl )2 + (my \n(mx \nl )2 , \nml = (2) \nq \n\nwhich is related to the SO(2) symmetry breaking. At the \nsame time, it turns out to be significant also the average \norder parameter of the film, defined as \n\nn \n\nThe thermodynamic observables we have investigated \n\nentering the definition of κ in Eq. (4)), we remind that \nsuch quantity has generally to be managed with particu- \nlar care, as discussed in details in Refs.14,15, where it was \nshown that the presence of block structures prevents us \nto unambiguously relate the evolution of S(~q) with the \nonset of helical order. However, for the specific case of \nthe model under investigation such integrated quantity \ncan still be considered a fairly significant order parame- \nter, as no block structures emerge from the simulations \n(see below). \n\ninclude the FM order parameter for each plane l: \n\n1 \nn \nM = ml . (3) \nXl=1 \n\nIn order to get a clear picture of the critical region and \nto give an accurate estimate of the critical temperature, \nwe look also at the following quantities \n\nTurning to the helical order, which is the relevant \nquantity for the Z2 × SO(2) symmetry, we can explore \nit along two different directions. The first one is by the \nintroduction of the chirality order parameter1,2 \n(6) \n\n(7) \n\n(8) \n\nu4(o) = 1 − (9) \n\ncv = nL2β2 \nhe2i − hei2 \n(cid:0) \n(cid:1) \nχo = nL2β \nho2i − hoi2 \n, \n(cid:0) \n∂βo = nL2 (hoei − hoihei) , \nho4i \n3ho2i2 , \n\n, \n\n(cid:1) \n\nwhere the sum refers to spins belonging to NN layers \ni and j, respectively, while Qz is the bulk helical pitch \nvector along the z direction. The second possibility is \nthat of looking at the integral of the structure factor: \n\nwhere β = 1/kBT , and o is one of the relevant observ- \nables, i.e. ml, M, κ, MHM . In this paper, we shall mainly \nlocate the critical temperature by looking at the intersec- \ntion of the graphs of the Binder cumulant25, Eq. (9), as a \nfunction of T obtained at different L. For clarity reasons, \nwe introduce also the following symbols: by TN (n) we \nwill denote the helical/fan phase transition temperature \nfor thickness n, TC(n) will instead indicate the order- \ning temperature of the sample as deduced by looking at \nthe behaviour of the average order parameter (3), while \nT l \nC(n) will be the l-th plane transition temperature re- \nlated to the order parameter defined in Eq. (2). \n\nπ \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What happend to the annihilation and the relic density when the DM is heavier ?", + "target_page": 6, + "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 \n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). \n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle \n\nand mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "can be achieved only when the annihilation processes are enhanced by Higgs resonances. \n\nTherefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. \n\nWe have also calculated the elastic scattering cross section between the DM particle and a \n\nproton and found it within the reach of future experiments for the direct DM search. \n\nThe Higgs potential (4) contains five parameters: m2 \n1, m2 2, λ1, λ2 and λ3. These parameters \n\ncan be rewritten in terms of two Higgs VEVs, two physical Higgs masses and the mixing \n\nangle between them. The stationary conditions are \n\n1 \n2 \n1 \n2 \n\nm2 \n1 + λ1v2 + \n2 = 0, λ3v′ (A1) \n\nm2 \n2 + λ2v2 + \n2 = 0. λ3v′ (A2) \n\nThe physical Higgs masses are given by Eqs. (8) and (9) with the mixing angle that θ satisfies \n\nλ3vv′ \n\n(λ1v2 2) \nλ2v′ \n− \n\nHiggs self interaction terms are expressed as \n\n1 \n2 1 \n4 Lint = λ1vφ3 + λ2v′ψ3 + \nλ3(vφψ2 + v′ψφ2) + (λ1φ4 + λ2ψ4 + λ3φ2ψ2), \n\nin terms of φ and ψ. With Eq. (7), these are rewritten in terms of h and H with θ as \n\nLint \nλ1v cos3 θ \n(cid:20) 1 \n2 \nλ2v′ sin3 θ + λ3(v cos θ sin2 θ v′ sin θ cos2 θ) hhh = \n(cid:21) − − \n\n1 \n2 3λ1v cos2 θ sin θ + 3λ2v′ sin2 θ cos θ + \n(cid:20) \n+ \n− \n\n+v′(cos3 θ 2 sin2 θ cos θ)) hhH \n\n− \n3λ1v cos θ sin2 θ \n(cid:20) \n+v′( \n\n(cid:3) \n\n1 \n2 \n3λ2v′ sin θ cos2 θ + λ3(v(cos3 θ 2 sin2 θ cos θ) + \n− − \n\nsin3 θ + 2 sin θ cos2 θ)) \n(cid:3) \n1 \n2 \n\nhHH \n\n− \nλ1v sin3 θ + λ2v′ cos3 θ + \n(cid:20) (cid:21) \n\n+four point interactions.", + "page_start": 8, + "page_end": 8, + "source_file": "1002.2525.pdf" + }, + { + "text": "parameter to be consistent with the current observations. We also calculate the scattering \n\ncross section between the DM particle and nucleon and discuss the implication for the direct \n\nDM search experiments. We summarize our results in the section IV. Our notations and the \n\nformulas used in our analysis are listed in Appendix. \n\nII. THE MINIMAL GAUGED U (1)B L MODEL WITH Z2 PARITY \n− \n\nThe model is based on the gauge group SU(3)C × SU(2)L × U(1)Y × \nU(1)B L. Additional \n\n− \nL, a SM singlet \nfields besides the standard model fields are a gauge field Z ′µ of the U(1)B \n− \n\nB L Higgs boson Ψ with two U(1)B L charge, and three RH neutrinos Ni which are \n− \n− \n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH \n\nneutrinos, we use the four component representation of RH neutrino constructed from the \n\nWeyl spinor νRi, \n\nνRi \n\nNi ≡ \n, (1) \n  \n\nǫ ν∗Ri \n  \nFor the two RH neutrinos, N1 and N2, we assign Z2 parity even, while odd for N3, so that \n\nthe RH neutrino N3 is stable and, hence, the DM candidate. \n\nDue to the additional gauge symmetry U(1)B L, the covariant derivative for each fields \n− \n\nis given by \n\nDµ = D(SM ) iqB LgB \nLZ ′µ, \n(2) \nµ \n− \n− − \n\nwhere D(SM ) is the covariant derivative in the SM, and qB L is the charge of each fields µ \n− \n\nunder the U(1)B L with its gauge coupling gB L. \n− − \n\nYukawa interactions relevant for the neutrino masses are given by \n\n3 2 3 \n\n1 \n2 yαi ¯Lα ˜ΦNi − \n¯NiΨPRNi + h.c., λRi \nLint = \n(3) \n\nXα=1 Xi=1 Xi=1 \n\nwhere ˜Φ = iτ2Φ∗ for Φ being the SM Higgs doublet, and without loss of generality we have \n− \n\nworked out in the basis where the second term in the right-hand-side is in flavor diagonal \n\nfor RH neutrinos. Because of the Z2 parity, the DM candidate N3 has no Yukawa couplings \n\nwith the left-handed lepton doublets. \n\nThe general Higgs potential for the SU(2)L doublet Φ and a singlet B L Higgs Ψ is \n− \n\ngenerally given by \n\nV (Φ, Ψ) = m2 \n1| 2 + m2 \n2| \n\n2 + λ1| \n3 \n\n4 + λ2| 4 + λ3| \n\n2 \n2. \nΦ \n| \nΨ \nΦ \n| \nΨ \nΦ \n| \nΨ (4) \n| | | |", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "175 \n0 \n20 \nΓ in meV \n40 \n\nFIG. 13: Behavior of WK with Γ for the original MFLI model \nat very small α = 0.05. We set ω1 = ∆ = 32 meV . Observe \nthe inconsistency with WK in the BCSI model in Fig 4. \n\n0.4 \n) \nc \nω \n( \n\nS \nN \nW \n− \n) \n0 \nc \nω \n( \n\nC \nS \nW \n\n−0.4 \n0.2 0.4 \n0.6 \n in eV \n0.8 \nω \nc \n\nFIG. 14: The special case of α = 1.5,Γ = 5 meV , other pa- \nrameters the same as in Fig. 10. These parameters are chosen \nto illustrate that two sign changes (indicated by arrows in the \nfigure) are also possible within the original MFLI model. \n\n1 \n) \n\n∞ \nW \n( \n\n0.6 \n/ \n) \nc \n\nω \nW \n( \n\n0.2 \n\n0 \n0.5 \nω \n in eV \nc \n\nFIG. 11: The evolution of the optical integral in the NS (top) \nand the SCS (bottom) in the original MFLI model. Parame- \nters are the same as above. Note that only \n80% of the \nspectral weight is recovered up to 1eV . \n75 \n∼ − \n\nNS and SCS ∆W (Original MFLI) \n\nwith lattice \nwithout lattice \n\n) \nc \n20 \nω \n( \n\nS \nN \nW \n− \n) \n10 \n\nnot not a generic one. There exists a range of parame- \nters α and Γ where ∆WK is still positive, but ∆W (ωc) \nchanges the sign twice and is negative at intermediate \nfrequencies. We show an example of such behavior in \nFig14. Still, for most of the parameters, the behavior of \n∆W (ωc) is the same as in Fig. 12. \n\nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.6 \n0.4 \nω \n in eV \nc \n\nFIG. 12: Evolution of the difference of the optical integrals in \nthe SCS and the NS with the upper cut-off ωc. Parameters are \nthe same as before. Observe that the optical sum in the SCS \nis larger than in the NS and that ∆W has not yet reached \n∆WK up to the bandwidth. The dashed line is the FGT \nresult. \n\nOn more careful looking we found the problem with the \noriginal MFLI model. We recall that in this model the \nself-energy in the SCS state was obtained by just cutting \nthe NS self energy at ω1 (see Eq.18). We argue that \nthis phenomenological formalism is not fully consistent, \nat least for small α. Indeed, for α = 0, the MFLI model \nreduces to BCSI model for which the behavior of the self- \nenergy is given by Eq. (12). This self-energy evolves with \nhas a square-root singularity at ω = ∆ + ωo \nω and Σ \nin the original MFLI model \n(with ωo = 0). Meanwhile Σ \nin Eq. (18) simply jumps to zero at ω = ω1 = ∆, and \nthis happens for all values of α including α = 0 where the \nMFLI and BCSI model should merge. This inconsistency \nis reflected in Fig 13, where we plot the near-BCS limit \nof MFLI model by taking a very small α = 0.05. We \nsee that the optical integral WK in the SCS still remains \nlarger than in the NS over a wide range of Γ, in clear \ndifference with the exactly known behavior in the BCSI \n\n′′ \n\nThis clearly affects nk because it is expressed via the full \nGreen’s function and competes with the conventional ef- \nfect of the gap opening. The distribution function from \nthis model, which we show in Fig.2b brings this point \nout by showing that in a MFLI model, at ǫ < 0, nk in a \nsuperconductor is larger than nk in the normal state, in \nclear difference with the BCSI case. \n\nWe analyzed the original MFLI model for various pa- \nrameters and found that the behavior presented in Fig. \n12, where ∆W (ωc) > 0 for all frequencies, is typical but", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "From Eq. (19), one can see that σ(p) (sin 2θ/v′)2 for a given DM mass mN . Fig. 3 shows \nSI ∝ \n\nthe spin-independent cross section of RH neutrino with a proton. The resultant cross section \n\nis found to be far below the current limits reported by XENON10 [24] and CDMSII [25]: \n\n8 \n7 pb, for a DM mass of 100 GeV-1 TeV. Future experiments such σSI . 4 10− 2 10− \n× − × \n\nas XENON1T [26] can reach the cross section predicted in our model. \n\n10-8 \n\nFIG. 3: The spin independent scattering cross section with a proton. All parameters are same as \n\nthose used in the previous section. The upper and lower lines correspond to sin θ = 0.7 and 0.3, \n\nrespectively. \n\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\n\n \n \n \n \n [html]\n
TableAge ( years )ControlAvo antianantAllongeryStatementsParametersDataStatements
\n\n8", + "page_start": 7, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "Higgs portal dark matter in the minimal gauged U (1)B L model \n− \n\nNobuchika Okada∗ \n\nDepartment of Physics and Astronomy, \n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA \n\n0 \n1 \n0 \n2 \n\nb \ne \nF \n3 \n1 \n\n] \nh \np \n- \np \ne \nh \n[ \n\n2 \nv \n5 \n2 \n5 \n2 \n. \n2 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nOsamu Seto† \n\nDepartment of Architecture and Building Engineering, \n\nHokkai-Gakuen University, Sapporo 062-8605, Japan \n\nAbstract \n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal \n\ngauged U (1)B L model by introducing an additional parity which ensures the stability of dark \n− \n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the \n\ns-channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. \n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of \n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross \n\nsection with nucleon and show that the next generation direct dark matter search experiments can \n\nexplore this model.", + "page_start": 0, + "page_end": 0, + "source_file": "1002.2525.pdf" + }, + { + "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. \n\nOn a more careful look, we found that indifference of \nδW (ωc) to the increase of λ is merely the consequence of \nthe fact that above we kept λωsf constant. Indeed, at \nsmall frequencies, fermionic self-energy in the NS is Σ′ = \nλω, Σ” = λ2ω2/(λωsf ), and both Σ′ and Σ′′ increase \nwith λ if we keep λωsf constant. But at frequencies larger \nthan ωsf , which we actually probe by ∆W (ωc), the self- \nenergy essentially depends only on λωsf , and increasing λ \nbut keeping λωsf constant does not bring us closer to the \nphysics associated with the recovery of electron coherence \nin the SCS. To detect this physics, we need to see how \nthings evolve when we increase λωsf above the scale of \n∆ , i.e., consider a truly strong coupling when not only \nλ ≫ 1 but also the normal state ΣN S(ω ≥ ∆) >> ∆. \n\nIn this work we analyzed the behavior of optical in- \nωc \no σ(ω)dω and Kubo sum rules in \ntegrals W (ωc) ∝ \nthe normal and superconducting states of interacting \nfermionic systems on a lattice. Our key goal was to \nunderstand what sets the sign of ∆WK = ∆W (∞) be- \ntween the normal and superconducting states and what \nis the behavior of W (ωc) and ∆W (ωc) at finite ωc. In a \nweak coupling BCS superconductor, ∆W (ωc) is positive \nat ωc < 2∆ due to a contribution from superfluid den- \nsity, but becomes negative at larger ωc, and approach a \nnegative value of ∆WK. Our study was motivated by fas- \ncinating optical experiments on the cuprates7–10. In over- \ndoped cuprates, there is clear indication11 that ∆W (ωc) \nbecomes negative above a few ∆, consistent with BCS \nbehavior. In underdoped cuprates, two groups argued8,9 \nthat ∆W integrated up to the bandwidth remains posi- \ntive, while the other group argued10 that it is negative. \nThe reasoning why ∆WK may potentially change sign \nat strong coupling involves the correlation between −WK \nand the kinetic energy. \nIn the BCS limit, kinetic en- \nergy obviously increases in a SCS because of gap opening, \nhence −WK increases, and ∆WK is negative. At strong \ncoupling, there is a counter effect – fermions become more \nmobile in a SCS due to a smaller self-energy. \n\nR", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "Our RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino \n\nDM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process \n\nis Higgs exchange and the resultant cross section for a proton is given by \n\n2 \n\nmpmN \nmp + mN (cid:19) 4 \nπ (cid:18) \nσ(p) \nSI = f 2 \np , \n(17) \n\nwith the hadronic matrix element \n\nfp \nmp αq \nmq αq \nmq 2 \n27 \nf (p) \nT q f (p) \nT G \n, = + (18) \n\nXq=u,d,s Xc,b,t \n\nand the effective vertex (see Appendix for notations) \n\n∂Φ \n∂h ∂Ψ \n∂h ∂Φ \n∂H ∂Ψ \n∂H (cid:19) \n1 \nM 2 \nh 1 \nM 2 \nH \nαq = \nλN yq (cid:18) \n− \n, + (19)", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is the aim of LLM routers ?", + "target_page": 1, + "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. \n\n3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. \n\nFormalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. \n\nInference flow. Given a set of LLMs M, a control plane Rω, and an input x, an LLM inference flow is the sequence of \nLLM invocations Mij (zj) for 1 ≤ j ≤ m and ij ∈ {w, s} made when executing RM \nω (x). Here m is the total number of \nLLM invocations, and z1, . . . , zm are the queries made to the underlying LLMs. Should R be randomized, the sequence \nand its length are random variables. An inference flow can be written as a transcript \n\nT = (i1, z1), (i2, z2), . . . , (im, zm) \nof pairs of model indexes ij ∈ {w, s} and model inputs zj. Note that for simplicity we ignore the potential for paral- \nlelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ {(w, x), (s, x)}. We write \nsubmitting a sequence of inferences ⃗x = ⃗x1, . . . , ⃗xq to a control plane as \nω (⃗x1), . . . , RM \n\nRM \nω (⃗x) = (RM ω (⃗xq))", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them.", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "We have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details. \n\n5 Open-Source Routers: Experimental Setup \n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with \nseveral LLM routers. This section explains our experimental setup for the open-source routers proposed in the research \nliterature [47]; results of this evaluation appear in Section 6. \nIn Section 7, we discuss experiments with proprietary, \ncommercial routers. Figure 3 shows the summary of our experimental setup. \n\n6", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "LLM classifier: The last method is based on asking an LLM to provide a score in the range 1–5 of how an AI expert \nwould struggle to respond to a given query based on the query’s complexity. For this, Ong et al. fine-tuned a Llama-3-8B \nmodel [4] using their reference set of queries and corresponding scores. We denote this method as RLLM . \n\nUnderlying LLMs. In [47], Ong et al. trained the routers with GPT-4-1106-preview [14] as the strong model and Mixtral \n8x7B [39] as the weak model. They report successful generalization between the underlying LLMs, stating that their \nrouters trained for a particular strong-weak LLM pair can be used with other strong-weak LLM pairs. \n\nTo allow our evaluation to scale, we use as the strong model Ms the open-sourced Llama-3.1-8B [3] and as Mw the \n4-bit quantized version of Mixtral 8x7B (for efficiency reasons). This reduced the cost of our experiments by avoiding \nexpensive GPT API calls and lowering the computational costs of Mixtral. Unless mentioned otherwise, all of our results \n\n7", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak \nmodel. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between \nqueries sent to the strong and weak models. \n\nTo initiate the study of this problem, we show that existing LLM routing algorithms are not adversarially robust. We \ndesign, implement, and evaluate a method that generates query-independent adversarial token sequences we call “con- \nfounder gadgets.” If a gadget is added to any query, this query is routed to the strong model with high probability. Next, \nwe show that this attack is effective even in the transfer setting where the adversary does not have full knowledge of the \ntarget LLM router (it is black-box), but has access to another router (e.g., an internally trained surrogate). We also evaluate \nthe integrity of commercial LLM routers, showing that they can be confounded as well. \n\nThird, we investigate defenses. Our basic method generates gadgets that have anomalously high perplexity. Confounded \nqueries are thus easily distinguished from normal queries and can be filtered out by the routing system. Unfortunately, this \ndefense can be evaded by an adversary who incorporates a low-perplexity objective into the gadget generation algorithm, \nproducing gadgets that have low perplexity—and yet are effective at re-routing queries to the strong model. We also \ndiscuss higher-level defenses, such as identifying users whose queries are routed to the strong model with abnormal \nfrequency. \n\nRouting attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the \nhighest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- \nciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this \nwork will motivate further research on their adversarial robustness. \n\n2 LLM Control Planes and Routing \n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- \nquence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, \nwith API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- \nferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple \nLLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual \nLLMs plateaus [8–10]. \n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer \nqueries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from network- \ning [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to \nunderlying LLMs, combine answers from underlying LLMs, and more. \n\nLLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality \nof responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts. \n\nDetecting anomalous user workloads. Another possible defense requires the router to monitor individual user work- \nloads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The \nrouter can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s \nqueries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For \nexample, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent \nfraction of queries being routed to the strong model. \n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there \nis sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be \ncircumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, \neach query. \n\n9 Related Work \n\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, \n43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of \nmulti-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our \nresults compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity \nattacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion. \n\nPrompt injection against LLMs. Prompt injection is a class of attacks against LLMs in which the adversary manipulates \nthe prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- \nsarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely \nexplored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do \nnot output expletives” [23, 42, 54, 66, 72, 73]. \n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for \nexample, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection \nattacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- \nparty data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its \nusers. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate \ntheir integrity by exploiting the weaknesses of the underlying LLM [19, 55]. \n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the \ncontrol plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks \nthat, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- \nplane-confounding queries.", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + }, + { + "text": "Attacks against MoE. Mixture-of-Experts (MoE) architectures enable using multiple expert modules for processing a \ngiven query with a lower computational cost by including an inner routing mechanism that in every layer routes different \ntokens to a small number of experts [29, 30, 52, 56]. This can be thought of as an internal router within a single LLM, \nrather than an external control plane that orchestrates multiple LLMs. MoE has increased in popularity as it allows to \nbuild larger models at a fixed compute budget—not all parameters are used at the same time. \n\nHayes et al. [34] identified a vulnerability in MoE that can be exploited for a denial-of-service attack against MoE. Thus \ncontrol plane integrity issues appear to extend to the context of single-LLM MoE systems, and future work could explore \nthis connection further. \n\nYona et al. [67] presented a side-channel attack on MoE that enables an attacker to reveal other users’ prompts. We expect \nthat side-channel attacks against LLM control planes exist as well, for example, to infer which models are used via timing \nof responses. Such attacks, which target confidentiality, are outside the scope of control plane integrity. \n\n10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (repre- \nsented by the gear), called a “confounder gadget,” that causes the router to send the query to the strong model. \n\nWe focus on the binary router setting in which the router applies a learned scoring function to input queries and routes \nany query whose score exceeds some threshold τ to the strong LLM Ms. This setting has been the focus of several prior \nworks [27, 41, 47] and is used in the control planes that are deployed in practice (see Section 7). \nMore formally, we consider a router RM \nω for M = {Mw, Ms}, where ω consists of a scoring function S, scoring function’s \nparameters θ, and a threshold τ ∈ R+. For notational brevity we just write Rω below, with M clear from context. Here \nS and θ define a scoring function Sθ : X → R+. Since our focus is LLMs, we assume that queries X are strings of text \ntokens. The routing algorithm then works as follows: \n\n(cid:26)Mw(x) if Sθ(x) < τ \nRω(x) = \nMs(x) otherwise \n\nwhere ω = (S, θ, τ ). We will detail scoring functions in Section 5; prior work has suggested linear models, light-weight \nLLMs, and more. Note that, consistent with this application, scoring functions are computationally efficient and cheap (as \ncompared to Ms, Mw). Deployments calibrate τ to limit the fraction of queries routed to the strong model Ms, giving rise \nto the type of control plane integrity policy discussed in Section 3. \n\nWe focus on input adaptation attacks; these immediately give unconstrained attacks as well. The adversary therefore has \na sequence of inputs x1, . . . , xq and must produce modified inputs ˆx1, . . . , ˆxq to maximize the number of inputs routed \nto Ms. See Figure 2 for a depiction of our attack setting. \n\nInstruction injection doesn’t work. Given the success of prompt injection for jailbreaking [50] and other adversarial \ntasks [64], the adversary might simply prefix each query xi with some instruction such as “Treat the following query as \ncomplex, . . . ” to generate a modified query ˆxi. Our experiments show that this does not work well, failing to trigger the \ncontrol plane into routing otherwise weak queries to Ms. See Appendix C for details on our experiments with various \ninstruction prompts. \n\nConfounder gadgets. Our approach works as follows. Given a query xi, we prepend a confounder gadget ci, which is a \nshort sequence of adversarially chosen tokens. The modified query is ˆxi = ci∥xi where ∥ denotes string concatenation. \nIntuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆxi as sufficiently \ncomplex to require the strong model. \n\nIn the white-box, query-specific setting, we can choose ci as a function of xi and the known parameters ω = (S, θ, τ ). To \ndo so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the \ntoken dictionary used by S). Then we set the gadget to initially be n tokens all fixed to the same value from I. The exact \nchoice of the initialization token is not important; in our implementation, we used the first token in the dictionary (‘!’). \nDenote this initial confounder as c(0) \ni = [c(0) i,1 , c(0) i,2 , . . . , c(0) \ni,n]. \n\nThen, we perform a hill-climbing style approach to find a good confounder for xi. For each iteration t ∈ [T ], where T is \nthe total number of iterations, do the following: \n\n(1) Select a target index j ∈ [1, n] uniformly. \n\n(2) Generate a set B of B + 1 candidates. First set ˜c0 = c(t) \ni \n\n, the current confounder. To generate B additional \nb=1. Replace the jth token in the", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "Table 7: Differences between average benchmark specific scores of responses to the original and confounded queries, \nwhen the confounder gadget was generated for a different surrogate router than the target (black-box setting) for three \nLLM pairs. Positive values indicate a higher average score for responses to the confounded queries; higher values are \nbetter for the attacker. Results are averaged across gadgets. Standard errors were omitted for readability and are on \naverage 0.1, 0.8, and 1.8 for MT-bench, MMLU and GSM8K, respectively. Aligned with the white-box setting, results \nshow almost no decrease in performance, and improvement when there is a performance gap for the LLM pair. \n\nResults for LLM pair 4. As discussed in Section 5, we replace the strong model that was used by Ong et al. [47], GPT-4- \n1106-preview (rank 28 in the Chatbot Arena leaderboard [1, 21]), with the open-sourced Llama-3.1-8B (rank 58) to reduce \nthe costs of our extensive set of evaluations. In this section we perform a smaller-scale evaluation of the quality-enhancing \nattack performance when using GPT as the strong model, i.e., LLM pair 4. We evaluate this setting using three of the \nn = 10 confounder gadgets for each router. \n\nTable 10 shows the results across benchmarks in the white-box setting. Compared to the pair 1 setting (Table 3), the attack \nresults in a higher increase in benchmark performance. This further demonstrates higher attack effect on response quality \nwhen the performance gap between the weak and strong models is higher. \n\n7 Rerouting Commercial Routers \n\nWe evaluate our rerouting attack on several commercial routers: Unify [12], NotDiamond [7], OpenRouter [11], and \nMartian [5]. These routers are available through black-box APIs. Therefore, we use our black-box attack with the \n40 gadgets optimized for the open-sourced routers RSW , RM F , RCLS, and RLLM (10 per router). We perform this \nevaluation using the MT-bench benchmark. \n\nUnify. This router lets users specify a list of models from different providers and a metric configuration for routing \ndecisions. The available metrics are quality, time to first token, inter-token latency, and cost. The user can specify the \nweight for each metric. Time, latency, and cost metrics are static and precomputed. The quality metric is computed for \n\n12", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + }, + { + "text": "Black-box attack results. Next, we consider the black-box attack, where the attacker does not know the algorithm \nused by the target router. We assume that the attacker has access to another, surrogate router that it can use to generate \nconfounder gadgets. In effect, we evaluate transferability of the attack from a known, white-box router to unknown, \nblack-box routers. \nTable 5 shows the results for all combinations of surrogate (denoted by ˆR) and target routers. For conciseness we focus \non the upgrade and downgrade rates for the remainder of this work. Upgrade rates are lower than in the white-box setting \nbut still high, indicating that the attack transfers. The LLM-based routing algorithm RLLM has the lowest rates, perhaps \nbecause it is the most complex of the four. The downgrade rate is 0 in most cases and is 1.2% on average. \n\nTable 6 shows that the black-box attack does not increase the average perplexity of responses as generated by LLM \npair 1. Table 7 shows that the attack does not decrease benchmark-specific scores, other than some small decrease in \nsome cases for the MMLU benchmark. For GSM8K, similar to the behaviour observed in the white-box setting, we see \nan improvement with our attack due to the performance difference between the strong and weak models for this task. This \nindicates that confounding affects only the routing, not the quality of responses. When the weak model is significantly \nweaker than the strong model, i.e., LLM pairs 2 and 3, the attack can improve the quality of responses significantly. \n\nQuery-specific gadgets. By default, our gadget generation method is query-independent and the same gadget can be used \nto reroute any query. An adversary with more resources may instead generate a dedicated gadget for each query (using \nthe same algorithm). \n\nTable 8 and Table 9 show the results for the white-box and black-box settings, respectively. (Here, percentage numbers \nare not averaged and there is no standard error since we used a single gadget per query.) The white-box results are nearly \nperfect; the black-box results are often better but sometimes somewhat worse than those for query-independent gadgets. \nWe conjecture that this is due to some level of overfitting. \n\n11", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is an LLM control plane ?", + "target_page": 3, + "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. \n\n3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. \n\nFormalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. \n\nInference flow. Given a set of LLMs M, a control plane Rω, and an input x, an LLM inference flow is the sequence of \nLLM invocations Mij (zj) for 1 ≤ j ≤ m and ij ∈ {w, s} made when executing RM \nω (x). Here m is the total number of \nLLM invocations, and z1, . . . , zm are the queries made to the underlying LLMs. Should R be randomized, the sequence \nand its length are random variables. An inference flow can be written as a transcript \n\nT = (i1, z1), (i2, z2), . . . , (im, zm) \nof pairs of model indexes ij ∈ {w, s} and model inputs zj. Note that for simplicity we ignore the potential for paral- \nlelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ {(w, x), (s, x)}. We write \nsubmitting a sequence of inferences ⃗x = ⃗x1, . . . , ⃗xq to a control plane as \nω (⃗x1), . . . , RM \n\nRM \nω (⃗x) = (RM ω (⃗xq))", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "Control plane integrity. A control plane integrity adversary is a randomized algorithm A that seeks to maliciously guide \ninference flow. \n\nIn an unconstrained LLM control plane integrity attack, the adversary A seeks to generate inputs ⃗x = ⃗x1, . . . , ⃗xq such \nthat running RM \nω (⃗x) generates a transcript for which P((x1, i1), . . . , (xq, iq)) = 0. This attack could be launched by an \nadversary who wants to maximize inference costs for a victim application using an LLM router. \n\nA harder setting requires input adaptation, where the adversary is given inputs x1, . . . , xq and it must find new inputs \nˆx1, . . . , ˆxq for which the transcript resulting from P((ˆx1, i1), . . . , (ˆxq, iq)) = 0. There will be some competing constraint, \nsuch as that xj and ˆxj are very similar for each j, or that the outputs yj ←$ RM \nω (ˆxj) are close. In the \nrouting context, the adversary’s goal is to increase the fraction of queries that get routed to the strong model, in order to \nimprove the overall quality of responses, drive up the victim application’s inference costs, or both. \n\nω (xj) and ˆyj ←$ RM \n\nRelationship to evasion attacks. Evasion attacks [25, 43, 60] against an inference system (also called adversarial exam- \nples [32, 48, 49]) would, in our setting, seek to find a small modification ∆ to an input x such that RM \nω (x) \nwhere addition is appropriately defined based on input type (e.g., slight changes to text). \nω (x + ∆) ̸= RM \n\nOur attack setting is not the same. The control plane integrity adversary seeks to maliciously control the inference flow, not \nnecessarily the output of inference. In an unconstrained attack, the adversary does not care what outputs are generated. \nIn the input adaptation attack, the adversary seeks to craft inputs that modify the inference flow yet do not change the \nresponses of the strong underlying LLM to the extent possible. Looking ahead, we will use evasion techniques in our \nadaptation attacks against learned control plane routers, but, importantly, not the overall inference. \n\nIn the other direction, undermining LLM control plane integrity could be a stepping stone toward evasion attacks. For \nexample, if RM \nω is used to classify malicious content by combining LLMs each tuned to different types of harm categories, \nthen modifying inputs to force inference flows away from appropriate models could aid evasion. We leave evaluation of \nhow control-plane integrity attacks can enable evasion to future work. \n\nThreat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat \nmodels that differ in terms of the adversary’s goals and their knowledge about the target control plane RM \nω . \n\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. \nAs a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing \nto control costs. Another adversarial goal could be arbitrage: consider an application that charges X dollars per query, \nwhereas directly using Ms costs Y > X. The application’s lower rate X makes economic sense assuming it uses a router \nto route the bulk of queries to a cheaper model Mw. An input adaptation attack in this setting can gain (indirect) access to \nMs, obtaining an arbitrage advantage of Y − X per query. To be effective, this arbitrage adversary would want to ensure \nthat adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to Ms). As before, the victim \nin this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack).", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "RM \nω (⃗x) = (RM ω (⃗xq)) \n\nwhere note that each invocation could result in multiple underlying LLM invocations. In the binary router case, however, \neach invocation results in a single LLM invocation. \n\nAn inference flow policy dictates the control plane designer’s intention regarding use of the underlying models. For \nexample, an application may want to ensure that only a small fraction of queries go to the expensive model Ms. We can \ndefine this as a predicate over a sequence of transcripts. In our binary router example, the policy can be more simply \ndefined as a predicate P over (input, model) pairs (⃗x1, i1), . . . , (⃗xq, iq) since this fully defines the sequence of transcripts. \nFor example, a policy might specify that the strong model is used in at most an ϵ fraction of inferences: \n  \nq \n(cid:88) \n\nI(ij) \nq \nP((⃗x1, i1), . . . , (⃗xq, iq)) = ≤ ϵ \n  \nj=1", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "We now discuss adversarial capabilities. We assume that our victim application’s prompt includes a substring that can be \ncontrolled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, \nand others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have \nvarious levels of knowledge about the victim application’s router. We consider the following knowledge settings: \n\n• White-box setting: The adversary knows the control plane algorithm and its parameters ω. \n\n• Black-box (transfer) setting: The adversary does not know the control plane algorithm R and ω for the target model, \nbut knows instead another control plane algorithm R′ \nω′ as the surrogate. For \nexample, this could arise if an adversary trains their own router using available data. In this setting our attacks are \nalso zero-shot in that they do not require any interaction with the target control plane before the query that is being \nrerouted. \n\nω′ and its parameters. We refer to R′ \n\n4 Confounding Control Planes with Gadgets \n\nWe now turn to our main contribution: a methodology for attacking LLM control plane integrity. The key insight is that \nan adversary can modify queries to mislead or “confound” the routing logic into routing these queries to an LLM of the \nadversary’s choosing. Furthermore, we will demonstrate that these attacks can be black-box and query-independent, i.e., \na single modification works for all queries and does not require advance knowledge of the specific router being attacked. \n\n4", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them.", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality \nof responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts. \n\nDetecting anomalous user workloads. Another possible defense requires the router to monitor individual user work- \nloads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The \nrouter can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s \nqueries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For \nexample, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent \nfraction of queries being routed to the strong model. \n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there \nis sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be \ncircumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, \neach query. \n\n9 Related Work \n\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, \n43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of \nmulti-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our \nresults compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity \nattacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion. \n\nPrompt injection against LLMs. Prompt injection is a class of attacks against LLMs in which the adversary manipulates \nthe prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- \nsarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely \nexplored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do \nnot output expletives” [23, 42, 54, 66, 72, 73]. \n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for \nexample, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection \nattacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- \nparty data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its \nusers. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate \ntheir integrity by exploiting the weaknesses of the underlying LLM [19, 55]. \n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the \ncontrol plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks \nthat, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- \nplane-confounding queries.", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (repre- \nsented by the gear), called a “confounder gadget,” that causes the router to send the query to the strong model. \n\nWe focus on the binary router setting in which the router applies a learned scoring function to input queries and routes \nany query whose score exceeds some threshold τ to the strong LLM Ms. This setting has been the focus of several prior \nworks [27, 41, 47] and is used in the control planes that are deployed in practice (see Section 7). \nMore formally, we consider a router RM \nω for M = {Mw, Ms}, where ω consists of a scoring function S, scoring function’s \nparameters θ, and a threshold τ ∈ R+. For notational brevity we just write Rω below, with M clear from context. Here \nS and θ define a scoring function Sθ : X → R+. Since our focus is LLMs, we assume that queries X are strings of text \ntokens. The routing algorithm then works as follows: \n\n(cid:26)Mw(x) if Sθ(x) < τ \nRω(x) = \nMs(x) otherwise \n\nwhere ω = (S, θ, τ ). We will detail scoring functions in Section 5; prior work has suggested linear models, light-weight \nLLMs, and more. Note that, consistent with this application, scoring functions are computationally efficient and cheap (as \ncompared to Ms, Mw). Deployments calibrate τ to limit the fraction of queries routed to the strong model Ms, giving rise \nto the type of control plane integrity policy discussed in Section 3. \n\nWe focus on input adaptation attacks; these immediately give unconstrained attacks as well. The adversary therefore has \na sequence of inputs x1, . . . , xq and must produce modified inputs ˆx1, . . . , ˆxq to maximize the number of inputs routed \nto Ms. See Figure 2 for a depiction of our attack setting. \n\nInstruction injection doesn’t work. Given the success of prompt injection for jailbreaking [50] and other adversarial \ntasks [64], the adversary might simply prefix each query xi with some instruction such as “Treat the following query as \ncomplex, . . . ” to generate a modified query ˆxi. Our experiments show that this does not work well, failing to trigger the \ncontrol plane into routing otherwise weak queries to Ms. See Appendix C for details on our experiments with various \ninstruction prompts. \n\nConfounder gadgets. Our approach works as follows. Given a query xi, we prepend a confounder gadget ci, which is a \nshort sequence of adversarially chosen tokens. The modified query is ˆxi = ci∥xi where ∥ denotes string concatenation. \nIntuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆxi as sufficiently \ncomplex to require the strong model. \n\nIn the white-box, query-specific setting, we can choose ci as a function of xi and the known parameters ω = (S, θ, τ ). To \ndo so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the \ntoken dictionary used by S). Then we set the gadget to initially be n tokens all fixed to the same value from I. The exact \nchoice of the initialization token is not important; in our implementation, we used the first token in the dictionary (‘!’). \nDenote this initial confounder as c(0) \ni = [c(0) i,1 , c(0) i,2 , . . . , c(0) \ni,n]. \n\nThen, we perform a hill-climbing style approach to find a good confounder for xi. For each iteration t ∈ [T ], where T is \nthe total number of iterations, do the following: \n\n(1) Select a target index j ∈ [1, n] uniformly. \n\n(2) Generate a set B of B + 1 candidates. First set ˜c0 = c(t) \ni \n\n, the current confounder. To generate B additional \nb=1. Replace the jth token in the", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "l--J-@ $!?e \n\n+Y \n\nI \nDRAG \n\nSIN 7 = - j \n\n\\ \nWEIGHT \n\nGLIDE RATIO*L/o \n\n\ni \n\n LIFT-OR&G \nRATIO \n-CLEAN CONFIGURATION \n\nL4l \nr )M \n\n\nA Sθ(x). \n\nThe black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the \nattacker can optimize directly against Sθ. While in some cases routing control planes will be public knowledge, in others, \nincluding the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. \nWhile an attacker might seek to perform model extraction attacks [43, 65] to learn θ, we instead explore attacks that \ntransfer from one router to another. \nIn more detail, we assume the adversary has access to a router R′ \nω′, called the surrogate, that is trained on data similar to \nthat used for the target router. Then the attack is the same as above, except that we use the surrogate’s scoring function \nS′ \nθ′ instead of the target’s Sθ. Again, we will see that this works surprisingly well: the query-independent confounders \nfound for the surrogate transfer to successfully reroute queries against the target router. \n\nPutting it all together. In summary, our methodology for input adaptation attacks is: \n\n(Preprocessing) Develop a single query-independent confounder gadget c, using either the target router or surrogate \nto score the confounder. \n(1) \n\n(Input adaptation) For each query xi, submit ˆxi = c∥xi instead to obtain a response ˆyi. (2) \n\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would \nhave been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in \n“downgrades,” i.e., rerouting of queries from the strong to weak model. \n\nWe have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details.", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "We have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details. \n\n5 Open-Source Routers: Experimental Setup \n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with \nseveral LLM routers. This section explains our experimental setup for the open-source routers proposed in the research \nliterature [47]; results of this evaluation appear in Section 6. \nIn Section 7, we discuss experiments with proprietary, \ncommercial routers. Figure 3 shows the summary of our experimental setup. \n\n6", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "As can be seen, the gadgets reroute almost all weak queries to the strong model. In most cases we see 100% success, or \nclose to it. The worst case still achieves 88% rerouting success, boosting the fraction of queries sent to the strong LLM by \n1.5x. Rerouting fails only for some queries that even after confounding are sent to the weak model: the fixed gadget did \nnot sufficiently increase the router’s estimate of those queries’ complexity. This is the only source of error for the attack: \nno queries in these experiments got “downgraded”, i.e., a query that would otherwise be sent to Ms ends up rerouted to \nMw. This also means that adding the confounder to every single query does not have negative impact on rerouting efficacy. \nWe report standard error values for both the upgrade rates and the total percentage of queries routed to the strong model. \nThe maximal standard error is in the low single digits, indicating similar success rates across gadgets. \n\nQuality of attack responses. We now turn to evaluating the quality of the responses generated by the attack. Note that \nbecause we have calibrated the routers to target ϵ = 0.5, our attacks can improve response quality by rerouting to the \nstronger model. In the other direction, our attacks add confounder gadgets which might degrade response quality. \n\n9", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv1.pdf" + }, + { + "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them.", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "Table 7: Differences between average benchmark specific scores of responses to the original and confounded queries, \nwhen the confounder gadget was generated for a different surrogate router than the target (black-box setting) for three \nLLM pairs. Positive values indicate a higher average score for responses to the confounded queries; higher values are \nbetter for the attacker. Results are averaged across gadgets. Standard errors were omitted for readability and are on \naverage 0.1, 0.8, and 1.8 for MT-bench, MMLU and GSM8K, respectively. Aligned with the white-box setting, results \nshow almost no decrease in performance, and improvement when there is a performance gap for the LLM pair. \n\nResults for LLM pair 4. As discussed in Section 5, we replace the strong model that was used by Ong et al. [47], GPT-4- \n1106-preview (rank 28 in the Chatbot Arena leaderboard [1, 21]), with the open-sourced Llama-3.1-8B (rank 58) to reduce \nthe costs of our extensive set of evaluations. In this section we perform a smaller-scale evaluation of the quality-enhancing \nattack performance when using GPT as the strong model, i.e., LLM pair 4. We evaluate this setting using three of the \nn = 10 confounder gadgets for each router. \n\nTable 10 shows the results across benchmarks in the white-box setting. Compared to the pair 1 setting (Table 3), the attack \nresults in a higher increase in benchmark performance. This further demonstrates higher attack effect on response quality \nwhen the performance gap between the weak and strong models is higher. \n\n7 Rerouting Commercial Routers \n\nWe evaluate our rerouting attack on several commercial routers: Unify [12], NotDiamond [7], OpenRouter [11], and \nMartian [5]. These routers are available through black-box APIs. Therefore, we use our black-box attack with the \n40 gadgets optimized for the open-sourced routers RSW , RM F , RCLS, and RLLM (10 per router). We perform this \nevaluation using the MT-bench benchmark. \n\nUnify. This router lets users specify a list of models from different providers and a metric configuration for routing \ndecisions. The available metrics are quality, time to first token, inter-token latency, and cost. The user can specify the \nweight for each metric. Time, latency, and cost metrics are static and precomputed. The quality metric is computed for \n\n12", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + }, + { + "text": "[71] L. Zheng, W.-L. Chiang, Y. Sheng, S. Zhuang, Z. Wu, Y. Zhuang, Z. Lin, Z. Li, D. Li, E. Xing et al., “Judging LLM- \nas-a-judge with MT-Bench and chatbot arena,” Advances in Neural Information Processing Systems (NeurIPS), \n2023. \n\n[72] S. Zhu, R. Zhang, B. An, G. Wu, J. Barrow, Z. Wang, F. Huang, A. Nenkova, and T. Sun, “AutoDAN: Automatic \nand interpretable adversarial attacks on large language models,” arXiv preprint arXiv:2310.15140, 2023. \n\n[73] A. Zou, Z. Wang, J. Z. Kolter, and M. Fredrikson, “Universal and transferable adversarial attacks on aligned language \nmodels,” arXiv preprint arXiv:2307.15043, 2023. \n\nA Gadget Examples \n\nBelow are a few examples of the optimized confounder gadgets c we got, for the different routing algorithms: \n\nB Ablation Study \n\nIn this section, we evaluate the effect of different hyperparameters and design choices (in the white-box setting). \n\nPrefix vs. suffix. As described in Section 4, we prepend the confounder gadget to the query. An alternative is to append \nit. This is straightforward for MT-bench and GSM8K, but MMLU consists of multi-choice questions followed by a list \nof possible answers, and the term “Answer:”. We insert the gadget at the end of the question text and before the possible \nanswers. If we append it at the very end, after “Answer:”, the LLM assumes the query was answered and in many cases \ndoes not generate any output at all. \n\nTable 12 shows that average upgrade rates are similar regardless of whether the gadget was inserted as a prefix or a suffix. \nFor MMLU, prefix works better. The downgrade rate is 0% in all cases. \n\n22", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv1.pdf" + }, + { + "text": "6 Rerouting Open-Source Routers \n\nWe now empirically evaluate our rerouting attack against the open-source routers described in the previous section. Unless \notherwise specified, our evaluation focuses on the query-independent attack setting where the attacker first finds a fixed \nset of gadgets and then uses them to attack arbitrarily many queries. This is the conservative setting, and query-specific \ngadgets — which carry a higher computational cost — generally work better. \n\nIn Appendix C we evaluate optimization-free alternatives for generating our confounding gadgets, and show they signifi- \ncantly underperform our optimization-based approach. \n\nWhite-box confounder gadget generation. Following our attack framework described in Section 4, we construct a \nquery-independent control-plane gadget designed to confuse each router. We start with the white-box setting, setting the \nbatch size to B = 32 and the number of iterations to T = 100, ignoring thresholds. We generate four sets of n = 10 \ngadgets, i.e., ten for each router. Examples of generated gadgets can be found in Appendix A. \n\nWhen reporting scores below, we therefore report the average over the n gadgets used with all 72 MT-bench queries, 100 \nrandomly selected MMLU queries, and 100 randomly selected GSM8K queries. None of these testing queries were used \nin the training of the routers or their calibration.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv1.pdf" + }, + { + "text": "(a) RSW (b) RM F (c) RCLS (d) RLLM \n\n(e) RSW (f) RM F (g) RCLS (h) RLLM \n\nFigure 6: Perplexity values of the original and confounded queries, and the corresponding ROC curves of the defense that \ndetects confounded queries by checking if they cross a perplexity threshold, when the confounder gadget is optimized for \nlow perplexity, in the GSM8K benchmark and for one gadget sampled uniformly at random. Confounded queries have \nsimilar perplexity values as the original queries, and can no longer be easily distinguished based on perplexity alone. \n\n\n \n \n \n \n [html]Orig.PPL - opt.Orig.FPPL - opt.\n
Orig.PPL - opt.Orig.RLLM PPL - opt.MT - Bench100 ± 0100 ± 0100 ± 0
98 ± 2100 ± 098 ± 173 ± 551 ± 8MMLU90 ± 159 ± 578 ± 4
74 ± 5100 ± 066 ± 1295 ± 189 ± 3GSM8K98 ± 070 ± 7100 ± 0
98 ± 2100 ± 088 ± 694 ± 381 ± 8
\n\nTable 11: Average upgrade rates for gadgets generated without (“Orig.”) and with (“PPL-opt.”) low-perplexity optimiza- \ntion, for the balancing coefficient α = 0.01. In some cases, optimizing for low perplexity has a negative effect on the \nattack success rate, however the attack can still be considered successful. A more careful choice of α can potentially limit \nthe effect on the attack success. \n\nLLM-based filtering. Even though adversarially modified queries cannot be easily detected using perplexity, they may \nstill be “unnatural.” A possible defense is to employ an oracle LLM to determine if the query is natural or not. This defense \nrequires the router to invoke an additional LLM for every processed query, which is computationally expensive in the case \nof a high-quality open-sourced LLM or financially costly in the case of a high-quality commercial LLM. Therefore, this \ndefense is unlikely to be practical. Furthermore, it is possible to optimize gadgets so that they both have low perplexity \nand appear “natural” to LLM evaluators [69]. \n\nParaphrasing. Filtering defenses like those discussed above are passive. An active alternative is to paraphrase queries \nusing an oracle LLM. LLMs are trained to generate natural text and are thus likely to remove unnatural substrings when \nparaphrasing a query. This defense is likely impractical for two reasons. First, and as with LLM-based filtering, it requires \n\n16", + "page_start": 15, + "page_end": 15, + "source_file": "arxiv1.pdf" + }, + { + "text": "performed an outlier check, labeling images as a ‘low-quality outlier’ if \nthe correlation coefficient was >3 s.d. from the absolute mean. None of \nour scans were flagged as outliers. The reconstructed participant files \nwere aggregated into one connectometry database per metric. *Subcortical GMV*. A similar statistical approach was taken for subcorti- \ncal volume estimates. We ran a multivariate regression analysis predict- \ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by \ngestation week (FDR-corrected at*q*< 0.05). \n\nTo evaluate the relationship between gestation week and MTL \nsubregion volume over pregnancy (*n*= 7 bilateral subregions and \n*n*= 18 MTL scans), we used a combination of linear and nonlinear \nmodels based on individual subregion data patterns. Models were \ncompared for best fit with each subregion via AIC from the GLM output \n(as described in ‘Summary brain metrics’). A linear regression model \nwas most appropriate for PHC (AICdiff < 3), whereas a quadratic model \nperformed best for CA1 and CA2/CA3. As a control, we repeated the \nanalyses with MTL subregion volumes after proportional volume cor- \nrection of total GMV calculated by ASHS. Finally, we evaluated the \nrelationship between endogenous sex hormones (estrogen and proges- \nterone) and subregion volumes using linear regression. Relationships \nwere considered significant only if they met FDR correction at*q*< 0.05. \n\n*Day2Day control dataset*. To compare our findings against a control \ngroup of nonpregnant densely-sampled individuals, we used the Day- \n2Day dataset23 which offered comparable whole-brain T1 and T2 MTL \nscans for eight participants (two male) scanned 12–50 times over 2–7 \nmonths. Each participant was run through the ANTs CT and ASHS pro- \ncessing pipelines as outlined above (‘Cortical volume and thickness’ \nand ‘Hippocampal segmentation’). To note, for each participant, we \ncreated an SST based on their first two sessions for consistency with \nthe primary dataset; subfield volumes for the T2 MTL scans did not \nundergo manual retouching. Due to missing header information on \nthe publicly available diffusion scans, we were unable to benchmark \nour white matter changes with the Day2Day dataset. \n\n**Statistical analysis.**Statistical analyses were conducted using R (sMRI; \nversion 3.4.4) and DSI Studio (dMRI; Chen-2022-07-31).", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + }, + { + "text": "Black-box attack results. Next, we consider the black-box attack, where the attacker does not know the algorithm \nused by the target router. We assume that the attacker has access to another, surrogate router that it can use to generate \nconfounder gadgets. In effect, we evaluate transferability of the attack from a known, white-box router to unknown, \nblack-box routers. \nTable 5 shows the results for all combinations of surrogate (denoted by ˆR) and target routers. For conciseness we focus \non the upgrade and downgrade rates for the remainder of this work. Upgrade rates are lower than in the white-box setting \nbut still high, indicating that the attack transfers. The LLM-based routing algorithm RLLM has the lowest rates, perhaps \nbecause it is the most complex of the four. The downgrade rate is 0 in most cases and is 1.2% on average. \n\nTable 6 shows that the black-box attack does not increase the average perplexity of responses as generated by LLM \npair 1. Table 7 shows that the attack does not decrease benchmark-specific scores, other than some small decrease in \nsome cases for the MMLU benchmark. For GSM8K, similar to the behaviour observed in the white-box setting, we see \nan improvement with our attack due to the performance difference between the strong and weak models for this task. This \nindicates that confounding affects only the routing, not the quality of responses. When the weak model is significantly \nweaker than the strong model, i.e., LLM pairs 2 and 3, the attack can improve the quality of responses significantly. \n\nQuery-specific gadgets. By default, our gadget generation method is query-independent and the same gadget can be used \nto reroute any query. An adversary with more resources may instead generate a dedicated gadget for each query (using \nthe same algorithm). \n\nTable 8 and Table 9 show the results for the white-box and black-box settings, respectively. (Here, percentage numbers \nare not averaged and there is no standard error since we used a single gadget per query.) The white-box results are nearly \nperfect; the black-box results are often better but sometimes somewhat worse than those for query-independent gadgets. \nWe conjecture that this is due to some level of overfitting. \n\n11", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What is called bad-cavity Ramsey laser ?", + "target_page": 1, + "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\n*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "Lett.**48**, 871 (1982). \n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and \nP. R. Rice, Phys. Rev. A**40**, 5516 (1989). \n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics**34**, \n297 (1995) \n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett,**93**, 250602 \n(2004). \n\n[12] A. D. Ludlow*et al.*, Opt. Lett.**32**, 641 (2007). \n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett.**101**, 260602 \n(2008). \n\n[14] J. Chen, and X.Chen, In*Proceedings of the 2005 IEEE Inter-*\n*national Frequency Control Symposium and Exposition*, (IEEE, \n2005), p.608. \n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- \n\nIn summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. \n\nletin**54**, 348 (2009). \n\n[16] D. Yu and J. Chen, Phys. Rev. A**78**, 013846 (2008). \n[17] J. Chen, In*Frequency Standards and Metrology: Proceedings*\n*of the 7th Symposium*, edited by Maleki Lute (World Scientific \nPublishing Company, 2009). \n\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful \ndiscussions. This work is supported by MOST of China \n(grant 2005CB724500, National Natural Science Foundation \nof China (grant 60837004, 10874009), National Hi-Tech Re- \nsearch and Development (863) Program. \n\nLett.**102**, 163601 (2009) \n\n[20] F. Strumia, Metrologia**8**, 85 (1972). \n[21] G. Kramer, J. Opt. Soc. Am.**68**, 1634 (1978). \n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR**32**, 455 \n(1972). \n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. \n\nPhys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. \n\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*\n\nThough, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- \n\nwhere ˆ*a*, ˆ*a*† are the annihilation and creation operators of the \nfield mode inside the cavity, with the frequency ω, σ*j*\n*a*= \n)*j*are the projection operators for the \n( \n*a*\n| \n| \njth atom corresponding to the upper and lower lasing levels, \n)*j*and σ*j*\n| \n*b*= ( \n*a*\ni h \n*b*\n*b*\ni h |", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "Ω*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 − \n\nOur method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ \n\n*C*∗0)2 = 0, (*C*1 − \n*C*∗2)2 = \n\n*C*∗1)2 = \nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n− \n\nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n(*C*2 − − \n\nwe get \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { (κ/2 + γ*ab*)2 \nω2[(κ/2 + γ*ab*)2 + ω2)] \n(δϕ2)ω = *DS T*\n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] +*DRam*[2 \n, \n} \n(10) \n−", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "τ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, \n\nσ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− \n\n*A*0 +*A*1 − \nκ *B*1 +*B*2) \nκ \n\n*R*(1 *A*2) \n*R*(*B*0 − \n\n2 = \n(cid:12)(cid:12)(cid:12) \n\n˜*Ass*\n= \n− \n\n(cid:12)(cid:12)(cid:12) \n\n*C*1 +*C*2 \n*g*τ *R*τ \n2 \" \n*R*(*B*0 − \nr", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2866 \n\nimage \nand 640-nm diode lasers. Full thickness, tiled, confocal \nstacks with a 2- to 3-mm interval \nin the Z-axis were obtained \nthrough a 203 dry lens (0.8 NA) with the confocal aperture set to 1 \nAiry unit or less. All image capture was performed using Zen Blue \nEdition software (Carl Zeiss Microscopy GmbH, Jena, Germany), \nand analyses were performed using Zen Blue or FIJI.45 \n\n2.5. Image analysis \n\n\n \n \n \n \n [html]\n
Stateal areaWasTablefromgeriesTableSpecificationParametersTableSectionIllumeTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTabledifferentGeneTablestateSpecificTableParametersPatientsTabledataBurnTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "with frequency ω*j*\n)*j*is the “spin- \n| \nflip” operator for the jth atom, with its adjoint σ*j*\n)*j*. \n*a*\n| \n| \nThe coupling constant*g*is given by*g*= µ √ω/2~ǫ0*V*, where \nµ is the magnitude of the atomic dipole moment, and*V*is the \neffective volume of the cavity. \n\n*a*and ω*j*\n*b*, and σ*j*\n= ( *b*\n*a*\ni h | − \n+ = ( \n*b*\ni h \n\nIn order to denote the finite-time interaction between the \natoms and Ramsey separated field, we introduce the function \n\nΓ*j*(*t*) = Θ(*t* Θ(*t* τ)+Θ(*t* Θ(*t*\n\n*T*), \n(2) \nwhere Θ(*t*) is the Heaviside step function [Θ(*t*) = 1 for*t*> 0, \nΘ(*t*) = 1/2 for*t*= 0, and Θ(*t*) = 0 for*t*< 0].*T*is the free \ndrift time of the atoms, and τ is the interacting time between \nthe atom and one cavity. \n\nτ 2τ *t j*) \n*t j*− *t j*− \n*T*) \n*t j*− − − − − − − − − \n\n*Fk*(*t*)*Fl*(*t*′) \n(cid:11) \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*t*′) +*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) +*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) +*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) +*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n\nτ) *t*′ \n− \nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(7) \n− \n\nwhere*D*(*i*) \nfusion coefficients. \n\nBy the standard way [25], we can get the Heisenberg- \nLangevin equations of the motion for the single-atom and \nfiled operators. By introducing the macroscopic atomic oper- \nator,*M*(*t*) = \n*aa*(*t*),*Nb*(*t*) = \n*j*Γ*j*(*t*)σ*j*\n*bb*(*t*), the dynamic equations for the field and macro- \n\n*c-number correlation functions:*By choosing some partic- \nular ordering for products of atomic and field operators, one \ncould derive the c-number stochastic Langevin equations from \nthe quantum Langevin equations derived above, and all of the \ndynamic equations for c-number stochastic variables are the \nsame as in [26]. The differences are from the correlation func- \ntions. On the other hand, we convert the quantum noise oper- \nators into the c-number noise variables ˜*Fk*(*t*)(*k*=*a*,*b*,*M*,*M*†), \nwhose correlation functions are expressed as \n\n˙*a*(*t*) = *a*(*t*) +*gM*(*t*) +*F*κ(*t*), (3) \n\n*A*0 +*A*1 − \n(γ*a*+ γ′*a*)*Na*(*t*) \n\n*R*(1 \n*g*[*M*†(*t*)*a*(*t*) +*a*†(*t*)*M*(*t*)] +*Fa*(*t*), \n\n*A*2) \n− \n\n˜*Fk*(*t*) ˜*Fk*(*t*′) \nE \n\n(4) \n− \nτ) *t*′ \n− − \n˙*Nb*(*t*) = *B*1 +*B*2) \n*R*(*B*0 − \n\nγ*bNb*(*t*) + γ′*aNa*(*t*) \n\n− \n+*g*[*a*†(*t*)*M*(*t*) +*M*†(*t*)*a*(*t*)] +*Fb*(*t*), \n− \n(5) \n\n=*D*(0) \n(cid:10) \n+*D*(2) \n+*D*(4) \n+*D*(6) \n+*D*(8) \n\n− \n\n− \n\n− \n\n− \n\n*kl*(*k*,*l*=*a*,*b*,*M*,*M*†;*i*= 0, 1, 2) are the quantum dif- \n\n*j*Γ*j*(*t*)σ*j* *j*Γ*j*(*t*)σ*j* (*t*),*Na*(*t*) = *i*\n− − \nP P \n\nscopic atomic operators yield \nP \n\nκ \n2 − \n\n˙*Na*(*t*) = \n− \n\nD \n= ˜*D*(0) \n+ ˜*D*(2) \n+ ˜*D*(4) \n+ ˜*D*(6) \n+ ˜*D*(8) \n\n− \n\n− \n\n− \n˙*M*(*t*) = *C*1 +*C*2) γ*ab M*(*t*) \n\n*R*(*C*0 − \n− \n+*g*[*Na*(*t*) − \n*Nb*(*t*)]*a*(*t*) +*FM*(*t*), (6) \n− \n\nwhere the macroscopic noise operators are defined as \n\n*kl*are the c-number Langevin diffusion coefficients, \n*kl*as in \n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fa*(*t*) = \n*A*0 +*A*1 − \n*A*2) + *a*(*t*) \n*R*(1 \n− − \nX*j* X*j*\n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fb*(*t*) = \n*b*(*t*) +*R*(*B*0 − \n*B*1 +*B*2) + \n*b*(*t*), \nX*j* X*j*\n\n1 \n*T*− \n\n˙Γ*j*(*t*) ˜σ*j*\n− \nΓ*j*(*t*)*f j* *FM*(*t*) = \n(*t*) +*R*(*C*0 − \n*C*1 +*C*2) σ(*t*), \n*i* *i* 1 \n− − \n≪ X*j* X*j*\n\n*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*),", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", + "target_page": 2, + "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "τ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, \n\nσ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− \n\n*A*0 +*A*1 − \nκ *B*1 +*B*2) \nκ \n\n*R*(1 *A*2) \n*R*(*B*0 − \n\n2 = \n(cid:12)(cid:12)(cid:12) \n\n˜*Ass*\n= \n− \n\n(cid:12)(cid:12)(cid:12) \n\n*C*1 +*C*2 \n*g*τ *R*τ \n2 \" \n*R*(*B*0 − \nr", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "2.5 \n2.6 \n\n*cv,*max \n2.5 \n2 \n2.4 \n\n2.3 \n1.5 \n*B*\n*k*\n2.2 \n*L*\n*/*\n*v*\n2.1 *c*\n1 20 30 40 70 50 60 \n\n*L*= 24 \n*L*= 32 \n*L*= 48 \n*L*= 64 \n0.5 \n\n0 \n0 20 40 60 \n\n80 \n*T*(K) \n\n100 120 140 \n\nFIG. 2: (color online) Specific heat cv per spin vs. temper- \nature for thickness n = 16 (for lateral dimension, see the \nlegend inside the figure). Inset: Maximum of cv vs. L ob- \ntained through MH technique. The continuum red line is a \npower law fit. \n\ndependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. \n\nl )2 + (my \n(mx \nl )2 , \nml = (2) \nq \n\nwhich is related to the SO(2) symmetry breaking. At the \nsame time, it turns out to be significant also the average \norder parameter of the film, defined as \n\nn \n\nThe thermodynamic observables we have investigated \n\nentering the definition of κ in Eq. (4)), we remind that \nsuch quantity has generally to be managed with particu- \nlar care, as discussed in details in Refs.14,15, where it was \nshown that the presence of block structures prevents us \nto unambiguously relate the evolution of S(~q) with the \nonset of helical order. However, for the specific case of \nthe model under investigation such integrated quantity \ncan still be considered a fairly significant order parame- \nter, as no block structures emerge from the simulations \n(see below). \n\ninclude the FM order parameter for each plane l: \n\n1 \nn \nM = ml . (3) \nXl=1 \n\nIn order to get a clear picture of the critical region and \nto give an accurate estimate of the critical temperature, \nwe look also at the following quantities \n\nTurning to the helical order, which is the relevant \nquantity for the Z2 × SO(2) symmetry, we can explore \nit along two different directions. The first one is by the \nintroduction of the chirality order parameter1,2 \n(6) \n\n(7) \n\n(8) \n\nu4(o) = 1 − (9) \n\ncv = nL2β2 \nhe2i − hei2 \n(cid:0) \n(cid:1) \nχo = nL2β \nho2i − hoi2 \n, \n(cid:0) \n∂βo = nL2 (hoei − hoihei) , \nho4i \n3ho2i2 , \n\n, \n\n(cid:1) \n\nwhere the sum refers to spins belonging to NN layers \ni and j, respectively, while Qz is the bulk helical pitch \nvector along the z direction. The second possibility is \nthat of looking at the integral of the structure factor: \n\nwhere β = 1/kBT , and o is one of the relevant observ- \nables, i.e. ml, M, κ, MHM . In this paper, we shall mainly \nlocate the critical temperature by looking at the intersec- \ntion of the graphs of the Binder cumulant25, Eq. (9), as a \nfunction of T obtained at different L. For clarity reasons, \nwe introduce also the following symbols: by TN (n) we \nwill denote the helical/fan phase transition temperature \nfor thickness n, TC(n) will instead indicate the order- \ning temperature of the sample as deduced by looking at \nthe behaviour of the average order parameter (3), while \nT l \nC(n) will be the l-th plane transition temperature re- \nlated to the order parameter defined in Eq. (2). \n\nπ \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "Ω*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 − \n\nOur method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ \n\n*C*∗0)2 = 0, (*C*1 − \n*C*∗2)2 = \n\n*C*∗1)2 = \nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n− \n\nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n(*C*2 − − \n\nwe get \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { (κ/2 + γ*ab*)2 \nω2[(κ/2 + γ*ab*)2 + ω2)] \n(δϕ2)ω = *DS T*\n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] +*DRam*[2 \n, \n} \n(10) \n−", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ε~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "-0.1 \n\n(a) Fe TEY \n-0.2 \n\ny \nr \nt \ne \nm \nm \ny \ns \na \nD \nC \nM \nX \n\n0.004 \n\n0.000 \n\n(b) Mn TEY \n-0.004 \n\nFIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2449.pdf" + }, + { + "text": "Lett.**48**, 871 (1982). \n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and \nP. R. Rice, Phys. Rev. A**40**, 5516 (1989). \n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics**34**, \n297 (1995) \n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett,**93**, 250602 \n(2004). \n\n[12] A. D. Ludlow*et al.*, Opt. Lett.**32**, 641 (2007). \n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett.**101**, 260602 \n(2008). \n\n[14] J. Chen, and X.Chen, In*Proceedings of the 2005 IEEE Inter-*\n*national Frequency Control Symposium and Exposition*, (IEEE, \n2005), p.608. \n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- \n\nIn summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. \n\nletin**54**, 348 (2009). \n\n[16] D. Yu and J. Chen, Phys. Rev. A**78**, 013846 (2008). \n[17] J. Chen, In*Frequency Standards and Metrology: Proceedings*\n*of the 7th Symposium*, edited by Maleki Lute (World Scientific \nPublishing Company, 2009). \n\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful \ndiscussions. This work is supported by MOST of China \n(grant 2005CB724500, National Natural Science Foundation \nof China (grant 60837004, 10874009), National Hi-Tech Re- \nsearch and Development (863) Program. \n\nLett.**102**, 163601 (2009) \n\n[20] F. Strumia, Metrologia**8**, 85 (1972). \n[21] G. Kramer, J. Opt. Soc. Am.**68**, 1634 (1978). \n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR**32**, 455 \n(1972). \n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. \n\nPhys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. \n\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "0 \n0 \n0.5 \nω in eV \n\nConductivities (CB model λ =10) \n1 \n\nNS \nSC \n\n0.6 \n\nω \n( \nσ \n2∆ + ω \no \n\n0.2 \n\n0 \n0.5 \nω in eV \n\n1 2 3 \nλ (coupling) \n\nFIG. 18: The behavior of Kubo sums in the CB model. Note \nthat the spectral weight in the NS is always larger than in the \nSCS. We set ωsf = 26 meV ,λ = 1, and ∆ = 30 meV . \n\nFIG. 19: The evolution of the optical integrals in the NS \nand the SCS in the CB model. Note that about \n75% of \nthe spectral weight is recovered up to 1 eV . We set ωsf = \n26 meV ,λ = 1, and ∆ = 30 meV . \n\n∼ \n\nFIG. 17: Conductivities and ∆W for a fixed λωsf . Top – \nωsf = 26 meV ,λ = 1,ωo = 40 meV ,Zo = 0.77 Bottom – \nωsf = 2.6 meV ,λ = 10,ωo = 13.5 meV ,Zo = 1.22. The zero \ncrossing for ∆W is not affected by a change in λ because it \nis determined only by λωsf . We set ∆ = 30 meV . \n∆ W (CB model λ=1) \n20 \n\nwith lattice \nwithout lattice \n\n) \nc \nCB model (Ω \n=40 meV) \no \nω \n( \n\nS \nN \nW \n− \n) \n0 200 \n\nSCS \nNS \nc \nω \n( \n\nC \nS \nW \n) \n−20 \nV \ne \nm \n160 \n( \n\nK \nW \n0 \n0.5 \n in eV \n1 \nω \nc \n120 \n∆ W (CB model λ=10) \n\nwith lattice \nwithout lattice \n20 \n) \nc \nω \n( \n\nS \nN \nW \n− \n) 0 \nc \nω \n( \n\nC \nS \nW \n−20 \n\nWe performed the same calculations of conductivities \nand optical integrals as in the previous three cases. The \nresults are summarized in Figs. 17 - 22. Fig 17 shows con- \nductivities in the NS and the SCS for two couplings λ = 1 \nand λ = 10 (keeping λωsf constant). Other parameters \nZo and ωo are calculated according to the discussion after \nEq 21. for ωsf = 26 meV , λ = 1, we find ωo = 40 meV , \nZo = 0.77. And for ωsf = 2.6 meV , λ = 10, we find \nωo = 13.5 meV , Zo = 1.22. Note that the conductivity \nin the SCS starts at 2∆ + ωo (i.e. the resonance energy \n\n1 \n\nFIG. 20: ∆W (in meV) for λ = 1(top) and λ = 10(bottom). \nWe used ωsf = 26 meV /λ and ∆ = 30meV . The zero crossing \nis not affected because we keep λωsf constant. The notable \ndifference is the widening of the dip at a larger λ.", + "page_start": 11, + "page_end": 11, + "source_file": "1001.0764.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", + "target_page": 3, + "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "κ \n*B*1 +*B*2) # \n˜*Nbss*= . \n\n*R*(*B*0 − \n\nA detailed analysis about the stability of the steady-state can \nbe found such as in [28]. In this paper, we assume the steady- \nstate solution is stable. \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] *D*= *DS T*+*DRam*[2 \n− \n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)]. *D* [2 (12) \n\nwhere Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − \n\nFrom the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*\n\n(δϕ2)ω \n\n(κ/2 + γ*ab*)2 \n*I*0ω2[(κ/2 + γ*ab*)2 + ω2] \n≈ \n+ 2*R*[(*A*0 +*B*0) + (*A*2 +*B*2)] \n+*Rp*[(*C*0 − *C*∗0)2 + (*C*1 − *C*∗1)2 + (*C*2 − \n*C*∗2)2] \n. \n} \n(9) \n\nSince the time τ and*T*is much shorter than the time scale \nof the atomic dampings, we can neglect the dampings when \ncalculate*Ai*,*Bi*,*Ci*. By using \n\nΩ*R*\n2 Ω*R*\n2 τ \n! ! \n\n∆2 \n2 Ω*R*\n2 \nsin2 (Ω*R*τ) cos2 ,*B*0 = sin2 \nτ \n! \n, *T*\n− ! \n\nΩ*R*\n2 \n\n∆2*T*\n,*B*2 = sin2 (Ω*R*τ) cos2 \nτ \n! \n, \n2 ! \n\n(*C*0 −", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "τ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, \n\nσ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− \n\n*A*0 +*A*1 − \nκ *B*1 +*B*2) \nκ \n\n*R*(1 *A*2) \n*R*(*B*0 − \n\n2 = \n(cid:12)(cid:12)(cid:12) \n\n˜*Ass*\n= \n− \n\n(cid:12)(cid:12)(cid:12) \n\n*C*1 +*C*2 \n*g*τ *R*τ \n2 \" \n*R*(*B*0 − \nr", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "ports 61, 129 (2006). \n\n13 E. Weschke, et al., Phys. Rev. Lett. 93, 157204 (2004). \n14 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 78, \n020402(R) (2008). \n15 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 79,", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*\n\nThough, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- \n\nwhere ˆ*a*, ˆ*a*† are the annihilation and creation operators of the \nfield mode inside the cavity, with the frequency ω, σ*j*\n*a*= \n)*j*are the projection operators for the \n( \n*a*\n| \n| \njth atom corresponding to the upper and lower lasing levels, \n)*j*and σ*j*\n| \n*b*= ( \n*a*\ni h \n*b*\n*b*\ni h |", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "(2009). \n21 A. B. Harris, A. J. Berlinsky, C. Bruder, J. Appl. Phys. \n69, 5200 (1991). \n22 K. A. Chao, J. Spa lek, A. M. Ole´s, Phys. Rev. B 18, 3453 \n\n(1978). \n23 A. H. MacDonald, S. M. Girvin, D. Yoshioka, Phys. Rev. (2007). \n11 S. Yang, D. L. Zhou, C. P. Sun, Phys. Rev. B 76, B 37, 9753 (1988). \n24 J. T. Chayes, L. Chayes, S. A. Kivelson, Commun. Math. 180404(R) (2007). \n12 Hong Yao, Shou-Cheng Zhang, Steven A. Kivelson, Phys. Phys. 123, 53 (1989). \n25 C. D. Batista, S. A. Trugman, Phys. Rev. Lett. 93, 217202 Rev. Lett. 102, 217202 (2009). \n13 Zohar Nussinov, Gerardo Ortiz, Phys. Rev. B 79, 214440 (2004).", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0266.pdf" + }, + { + "text": "N \nQ \nA \nM \n3 \nd \nS \n\na \nv \nm \n\n~ \nv \n3 \nl \nt \n\nO \na \nA \nN \nv \nW \n3 \nS \n0 \n0 \n- \n8 \n0 \n1 \n- \n8 \n0 \nl", + "page_start": 61, + "page_end": 61, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\n*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
the ‘ bow ’’ wave forms at the leading edge andthis typical flow pattern is illustrated infigure 3.9 by the drawing for M = 1.05. If the
\n\n218", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "Give me the advantages of Ferromagnetic semiconductors", + "target_page": 1, + "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "K. Olejnik,1, 2 P. Wadley,3 J. Haigh,3 K. W. Edmonds,3 R. P. Campion,3 A. W. Rushforth,3 B. L. Gallagher,3 \nC. T. Foxon,3 T. Jungwirth,2, 3 J. Wunderlich,1, 2 S. S. Dhesi,4 S. Cavill,4 G. van der Laan,4 and E. Arenholz5 \n1Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom \n2Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic \n3School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom \n4Diamond Light Source, Harwell Science and Innovation Campus, \nDidcot, Oxfordshire, OX11 0DE, United Kingdom \n5Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA \n(Dated: August 24, 2018) \n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin \noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic \ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface \nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized \nat room temperature. \n\nwhich may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. \n\n] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "4 \n\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. \nCampion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van \nder Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B \n73, 165205 (2006). \n\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. \nWang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. \nvan der Laan, and E. Arenholz, J. Appl. Phys. 102, 023902 \n(2007). \n\n4 \n\n) \nu \nm \ne \n\nH = 0 \n2 \n4 \n5 \n- 0 \n\n0 \n1 \n( \nT (K) \n0 \nt \n\nn \ne \nm \no \nM \n\n300 \n\n) \ne \nO \n200 \n( \nE \nH \n100 \n\n0 \n0 20 40 \nd (nm) \n\n1000 \n\n Applied field (Oe) \n\nFIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. \n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. \n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. \n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, \n“Real-space grid implementation of the projector augmented \nPhys. Rev. B 71(3), 035109 (Jan. 2005), \nwave method”, \ndoi:10.1103/PhysRevB.71.035109. [7] A. R. Rocha, M. Rossi, A. Fazzio, \n\nJ. R. \n“Designing real nanotube-based gas \nsen- \nPhys. Rev. Lett. 100(17), 176803 (May 2008), \n\nand A. \n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi- \nent approximation made simple”, Phys. Rev. Lett. 77(18), 3865 \n(Oct. 1996), doi:10.1103/PhysRevLett.77.3865. da Silva, \nsors”, \ndoi:10.1103/PhysRevLett.100.176803. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", + "target_page": 2, + "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "4 \n\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. \nCampion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van \nder Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B \n73, 165205 (2006). \n\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. \nWang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. \nvan der Laan, and E. Arenholz, J. Appl. Phys. 102, 023902 \n(2007). \n\n4 \n\n) \nu \nm \ne \n\nH = 0 \n2 \n4 \n5 \n- 0 \n\n0 \n1 \n( \nT (K) \n0 \nt \n\nn \ne \nm \no \nM \n\n300 \n\n) \ne \nO \n200 \n( \nE \nH \n100 \n\n0 \n0 20 40 \nd (nm) \n\n1000 \n\n Applied field (Oe) \n\nFIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "8 \n\nBCSI model. However, before that, we show in Figs 10- \n12 the conductivities and the optical integrals for the \noriginal MFLI model. \n\nConductivities (Original MFLI) \n\nNS \n0.2 \nSC \n\n∆+ω \n1 \n) \n\nω \n( \nσ 0.1 \n\n0.2 \n0.4 \nω \nc \n0.6 \n in eV \n0.8 \n\nFIG. 9: ∆W vs the cut-off for the EB model. It remains neg- \native for larger cut-offs. Parameters are the same as before. \nThe dot indicates the value of ∆W ( ) = ∆WK \n∞ \n\nof the lattice (the dashed line in Fig. 9). \n\nFor their analysis of the optical integral, Norman and \nP´epin30 introduced a phenomenological model for the self \nenergy which fits normal state scattering rate measure- \nments by ARPES41. \n(ω) out \nof two contributions - impurity scattering and electron- \nelectron scattering which they approximated phenomeno- \nlogically by the marginal Fermi liquid form of αω at small \nfrequencies6 (MFLI model). The total Σ \n\n120 \n0 ′′ \nIt constructs the NS Σ \n\nFIG. 10: Top –the conductivities in the NS and SCS in the \noriginal MFLI model of Ref.30. We set Γ = 70 meV , α = 0.75, \n∆ = 32 meV , ω1 = 71 meV . Note that σ \n(ω) in the SCS \nbegins at Ω = ∆ + ω1. Bottom – the behavior of WK with Γ. \nis \n\nω \nωsat (cid:19) \nwhere ωsat is about ∼ 1 \n2 of the bandwidth, and f (x) ≈ 1 \nfor x < 1 and decreases for x > 1. In Ref 30 f (x) was \nassumed to scale as 1/x at large x such that Σ′′ is flat at \nlarge ω. The real part of Σ(ω) is obtained from Kramers- \nKr¨onig relations. For the superconducting state, they \nobtained Σ \nby cutting off the NS expression on the lower \nend at some frequency ω1 (the analog of ω0 + ∆ that we \nhad for EB model): \n\nIn Fig 10 we plot the conductivities in the NS and the \nSCS and Kubo sums WK vs Γ at α = 0.75 showing that \nthe spectral weight in the SCS is indeed larger than in the \nNS. In Fig 11 we show the behavior of the optical sums \nW (ωc) in NS and SCS. The observation here is that only \n∼ 75−80% of the Kubo sum is recovered up to the scale of \nthe bandwidth implying that there is indeed a significant \nspectral weight well beyond the bandwidth. And in Fig \n12 we show the behavior of ∆W (wc). We see that it does \nnot change sign and remain positive at all ωc, very much \nunlike the BCS case. Comparing the behavior of W (wc) \nwith and without a lattice (solid and dashed lines in Fig. \n12) we see that the ‘finite bandwidth effect’ just shifts the \ncurve in the positive direction. We also see that the solid \nline flattens above roughly half of the bandwidth, i.e., at \nthese frequencies ∆W (ωc) ≈ ∆WK. Still, we found that \n∆W continues going down even above the bandwidth \nand truly saturates only at about 2 eV (not shown in the \nfigure) supporting the idea that there is ‘more’ left to \nrecover from higher frequencies. \n\n′′ \n\nwhich fits \nwhere Θ(x) is the step function. In reality, Σ \nARPES in the NS has some angular dependence along the \nFermi surface42, but this was ignored for simplicity. This \nmodel had gained a lot of attention as it predicted the \noptical sum in the SCS to be larger than in the NS, i.e., \n∆W > 0 at large frequencies. This would be consistent \nwith the experimental findings in Refs. 8,9 if, indeed, one \nidentifies ∆W measured up to 1eV with ∆WK . \n\nThe rationale for ∆WK > 0 in the original MFLI \nmodel has been provided in Ref. 30. They argued that \nthis is closely linked to the absence of quasiparticle peaks \nin the NS and their restoration in the SCS state because \nthe phase space for quasiparticle scattering at low ener- \ngies is smaller in a superconductor than in a normal state. We will show below that the sign of ∆W in the MFLI \nmodel actually depends on how the normal state results \nare extended to the superconducting state and, moreover, \nwill argue that ∆WK is actually negative if the extension \nis done such that at α = 0 the results are consistent with", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0764.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "ports 61, 129 (2006). \n\n13 E. Weschke, et al., Phys. Rev. Lett. 93, 157204 (2004). \n14 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 78, \n020402(R) (2008). \n15 F. Cinti, A. Cuccoli, and A. Rettori, Phys. Rev. B 79,", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "The scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation \n\nThe observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", + "target_page": 2, + "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "4 \n\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. \nCampion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van \nder Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B \n73, 165205 (2006). \n\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. \nWang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. \nvan der Laan, and E. Arenholz, J. Appl. Phys. 102, 023902 \n(2007). \n\n4 \n\n) \nu \nm \ne \n\nH = 0 \n2 \n4 \n5 \n- 0 \n\n0 \n1 \n( \nT (K) \n0 \nt \n\nn \ne \nm \no \nM \n\n300 \n\n) \ne \nO \n200 \n( \nE \nH \n100 \n\n0 \n0 20 40 \nd (nm) \n\n1000 \n\n Applied field (Oe) \n\nFIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. \n\nmeasurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. \n\nThe interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 \n\nIn summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe \n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac- \nDonald, Phys. Rev. B 59, 9818 (1999); P. Sankowski and \nP. Kacman, Phys. Rev. B 71, 201303(R) (2005); A. D. \nGiddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. \nB 78, 165312 (2008); K. Szalowski and T. Balcerzak, Phys. \nRev. B 79, 214430 (2009).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "K. Olejnik,1, 2 P. Wadley,3 J. Haigh,3 K. W. Edmonds,3 R. P. Campion,3 A. W. Rushforth,3 B. L. Gallagher,3 \nC. T. Foxon,3 T. Jungwirth,2, 3 J. Wunderlich,1, 2 S. S. Dhesi,4 S. Cavill,4 G. van der Laan,4 and E. Arenholz5 \n1Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom \n2Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic \n3School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom \n4Diamond Light Source, Harwell Science and Innovation Campus, \nDidcot, Oxfordshire, OX11 0DE, United Kingdom \n5Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA \n(Dated: August 24, 2018) \n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin \noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic \ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface \nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized \nat room temperature. \n\nwhich may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. \n\n] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nThe development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, \n\nThe Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "-0.1 \n\n(a) Fe TEY \n-0.2 \n\ny \nr \nt \ne \nm \nm \ny \ns \na \nD \nC \nM \nX \n\n0.004 \n\n0.000 \n\n(b) Mn TEY \n-0.004 \n\nFIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2449.pdf" + }, + { + "text": "The paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. \n\nIn the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94, B 68, 024504 (2003). \n\n41 T. Valla et al., Phys. Rev. Lett 85, 828(2000). \n42 Kaminski et al., Phys. Rev. B 71, 014517 (2005). \n43 Robert Haslinger and Andrey V. Chubukov, Phys. Rev. B \n\n067002 (2005). \n\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, \nPhys. Rev. B 70, 134504(2004), A. F. Santander-Syro, R. \nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li \nand H. Raffy, Europhys. Lett. 62, 568 (2003). \n67, 140504(2003). \n44 C. Castellani, C. DiCastro, and M. Grilli, Phys. Rev. Lett. \n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, \n\n75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, \n\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. \nKuzmenko, and D. van der Marel, Phys. Rev. B 76, 220509 \n(2007). 174505(2004). \n23 J. E. Hirsch and F. Marsiglio, Physica C 331, 150 (2000) 50 In this respect, our results are consistent with the analysis", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is Kingsgate ?", + "target_page": 2, + "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "***Kingsgate is a highly successful gold***\n***mining, development and exploration***\n***company with two operating gold mines***\n***and two advanced development projects.***\n***Shareholders can look forward to the***\n***benefits of this strong operating and***\n***development platform, where Kingsgate***\n***aims to build value though operating,***\n***earnings and dividend growth for***\n***the benefit of all stakeholders.***", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Independent auditor’s report to the members \nof Kingsgate Consolidated Limited \n\nReport on the financial report \n\nWe have audited the accompanying financial report of Kingsgate Consolidated Limited (the company), \nwhich comprises the statement of financial position as at 30 June 2013, the statement of comprehen- \nsive income, statement of changes in equity and statement of cash flows for the year ended on that \ndate, a summary of significant accounting policies, other explanatory notes and the directors’ declara- \ntion for Kingsgate Group (the consolidated entity). The consolidated entity comprises the company \nand the entities it controlled at year’s end or from time to time during the financial year. \n\nDirectors’ responsibility for the financial report \nThe directors of the company are responsible for the preparation of the financial report that gives a \ntrue and fair view in accordance with Australian Accounting Standards and the*Corporations Act 2001*\nand for such internal control as the directors determine is necessary to enable the preparation of the \nfinancial report that is free from material misstatement, whether due to fraud or error. In Note 1, the \ndirectors also state, in accordance with Accounting Standard AASB 101 Presentation of Financial \nStatements, that the financial statements comply with International Financial Reporting Standards. \n\nAuditor’s responsibility \nOur responsibility is to express an opinion on the financial report based on our audit. We conducted \nour audit in accordance with Australian Auditing Standards. Those standards require that we comply \nwith relevant ethical requirements relating to audit engagements and plan and perform the audit to \nobtain reasonable assurance whether the financial report is free from material misstatement. \n\nAn audit involves performing procedures to obtain audit evidence about the amounts and disclosures \nin the financial report. The procedures selected depend on the auditor’s judgement, including the \nassessment of the risks of material misstatement of the financial report, whether due to fraud or error. \nIn making those risk assessments, the auditor considers internal control relevant to the consolidated \nentity’s preparation and fair presentation of the financial report in order to design audit procedures \nthat are appropriate in the circumstances, but not for the purpose of expressing an opinion on the \neffectiveness of the entity’s internal control. An audit also includes evaluating the appropriateness of \naccounting policies used and the reasonableness of accounting estimates made by the directors, as \nwell as evaluating the overall presentation of the financial report. \n\nWe believe that the audit evidence we have obtained is sufficient and appropriate to provide a basis for \nour audit opinion.", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Your Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of, \nor during, the year ended 30 June 2013. \n\nDirectors \n\nReview of operations \nand results \n\nThe following persons were Directors of \nKingsgate Consolidated Limited during the \nwhole of the financial year and up to the date of \nthis report. \n\nOperational performance \nKingsgate is a gold mining, development and \nexploration company based in Sydney, Australia. \nKingsgate owns and operates two gold mines, \nthe world class Chatree Mine in Thailand and the \nunderground Challenger Mine in South Australia. \nIn addition, the Company has two advanced \ndevelopment projects, the Nueva Esperanza \nSilver / Gold Project, in the highly prospective \nMaricunga Gold / Silver Belt in Chile, and the \nBowdens Silver Project in New South Wales, \nAustralia. From this operating and development \nplatform, Kingsgate aims to build value for all \nshareholders. \n\n〉〉 Ross Smyth-Kirk Chairman \n〉〉 Peter Alexander Non-Executive Director \n〉〉 Craig Carracher Non-Executive Director \n〉〉 Peter McAleer Non-Executive Director \n〉〉 Gavin Thomas Executive Director \n\nThe principal activities of Kingsgate \nConsolidated Limited are mining and mineral \nexploration in Australia, South East Asia and \nSouth America. \n\nGroup gold production was 199,897 ounces, a \ndecrease of 4% on the previous corresponding \nyear. The contribution from Chatree was \n133,681 ounces with 66,216 ounces from \nChallenger. \nDividends \n\nDividends paid to members during the financial \nyear were as follows: \n\nChatree gold production was 10% higher than \nthe previous corresponding period as a result of \nan increase in throughput from the expanded \nChatree process plant and access to higher \ngrade oxide ore from Q Prospect. \n\nChallenger gold production was 24% lower than \nthe previous corresponding year given additional \ndilution and depletion at Challenger Deeps and a \nshortfall in planned development. This resulted \nin lower ore tonnes from the mine that was \nsupplemented by low grade stockpiled ore. \nFollowing the fall in the gold price a strategic \nreview of Challenger was implemented that has \nresulted in a new mine plan to focus primarily on \nthe higher grade Challenger West orebody. The \nnew mine plan will be implemented during the \nfirst three months of the 2014 financial year. \n\nA lower gold price and industry wide cost pres- \nsures had a negative impact on the underlying \nearnings of the Group which contributed to a \nmajor impairment to the carrying value of a \nnumber of Group assets, particularly assets \nrelating to the Challenger Gold Operations. \nImpairments totalling $332,808,000 were the \nmajor contributor to the after tax loss of \n$323,726,000 for the year. \n\nFinal dividend declared for the year ended 30 June 2012 of \n10 cents per fully paid share paid on 1 October 2012 \n\nInterim dividend declared for the year ended 30 June 2013 of \n5 cents per fully paid share paid on 12 April 2013 \n\nTotal dividends \n\nThe development projects continued to advance \nduring the year. At Nueva Esperanza, the feasi- \nbility work shifted to focus on identifying the \nlowest cost and lowest power consumption \ndevelopment alternatives. This included \nreviewing a heap leach process option with \non-site power generation. Further work is \nexpected to be completed in the December \nquarter 2013. At Bowdens, the feasibility work \nhas confirmed the optimum process route. \nCompletion of the technical feasibility study \nincluding mine planning, infrastructure and \nmetallurgy, and lodging of the Environmental \nImpact Statement (“EIS”) are scheduled for \n2014.", + "page_start": 42, + "page_end": 42, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "General Manager – Human Resources \nBrett Dunstone joined Kingsgate in December \n2012 and has over 25 years experience in senior \nhuman resource management roles across a \ndiverse industry portfolio. Brett was formerly \nhead of Human Resources for Crown Casino, \nMelbourne, the Myer group, key Village \nRoadshow entities and head of Employee \nRelations for the Coles Myer group. Brett has \nexperience in supporting both large and \nemerging resource company development \nprojects locally and overseas (BHP Billiton, \nWoodside, Equinox Minerals and Chalice Gold). \n\nChief Executive Officer – \nAkara Resources PCL \nPakorn Sukhum joined the management team of \nAkara Resources PCL as Chief Executive Officer \nat the end of 2009. He brings to Akara over 24 \nyears of industrial commercial managerial experi- \nence in various industries such as metallurgy, \nchemicals and ceramics in international and \ndomestic markets of Thailand, having held \nsenior management positions in both Thai and \nMultinational joint venture companies such as \nBasell Poyolefins, Bayer AG as well as Padeang \nIndustry of Thailand. His major contributions \nand responsibilities have ranged from project \nmanagement, commercial marketing and sales \nto business development. \n\nMichael Monaghan \nDip Eng (Mining) Dip Business MAusIMM MAICD \nSME \n\nChief Operating Officer and General Manager \n– Akara Resources PCL \nMike Monaghan joined Kingsgate as the General \nManager of Chatree Gold Mine in October 2012. \nHe is a mining engineer with 28 years of manage- \nment experience in both underground and open \ncut opeartions across a number of commodities \nas well as commissioning, mine management, \nturnaround management and environmental and \nsafety compliance in Australia, Africa and \nEurope. Mike was most recently Mining Manager \nat Geita Gold mine in Tanzania for AngloGold \nAshanti Limited. Prior to that he held General \nManager and Mining Manager positions at \nEtruscan Resources Youga Gold Mine in Burkina \nFaso and Red back Mining’s Chirano Gold Mine \nin Ghana.", + "page_start": 40, + "page_end": 40, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "29. Key management personnel disclosures \n\n(a) Directors \nThe following persons were Directors of Kingsgate during the financial year. \n\n〉〉 Ross Smyth-Kirk \n〉〉 Peter Alexander \n〉〉 Craig Carracher \n〉〉 Peter McAleer \n〉〉 Gavin Thomas \n\nChairman \n\nNon-Executive Director \n\nNon-Executive Director \n\nNon-Executive Director \n\nManaging Director \n\n(b) Other key management personnel \n\n〉〉 Duane Woodbury \n〉〉 \n\nChief Financial Officer \n\nTim Benfield \n〉〉 Phil MacIntyre \n〉〉 Ron James \n〉〉 Ross Coyle \n〉〉 \n\nChief Operating Officer \n\nChief Operating Officer and General Manager – Akara Mining Limited (retired 30 June 2013) \n\nGeneral Manager Exploration and Resources Development \n\nGeneral Manager Finance and Administration and Company Secretary \n\nJoel Forwood \n〉〉 Brett Dunstone \n\nGeneral Manager Corporate and Markets \n\nGeneral Manager Human Resources \n\n\n \n \n \n \n [html]\n
Level 1 $’ 000Level 2 $ UCOLevel 3 $ 000Total $- 000
30 June 2013
Available - for - sale financial asset* 767767
Derivatives held for trading( 1.271 )( 1.271 )
Total as at 30 June 2013767( 1.271 )( 504 )
30 June 2012
Available - for - sale financial asset1.7511.751
Derivatives held for trading( 2.685 )( 2.685 )
Total as at 30 June 20121.751( 2.685 )( 934 )
", + "page_start": 104, + "page_end": 104, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "During 2013, the process design and engi- \nneering work for the Definitive Feasibility Study \n(“DFS”) progressed to a point where the study \nwas close to draft completion as at 30 June \n2013. The study encompassed detailed process \ndesign based on using the most recent metal- \nlurgical test results, capital and operating cost \nestimates, project water and power supply, \ninfrastructure requirements and mine \noptimisation. \n\nDuring the year Kingsgate sold its exploration \nassets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. (Kingsgate received \na 35.54% interest in Caravel and 20,000,000 \nunlisted options to acquire Caravel shares \nexercisable at 10 cents on or before three years \nfrom the date of issue. Kingsgate’s holding was \nreduced to 27.04% following a rights issue by \nCaravel post year-end). \n\n(Challenger Deeps) and depletion on those levels \ndue to the additional displacement of the ore \nhorizons following the identification of the “215 \nShear”, contributed to the lower than expected \nproduction from the lower levels. A shortfall in \nunderground development also limited access to \nore sources. \n\nDevelopment and mining commenced at the \nhigher grade Challenger West orebody during \nthe year but was insufficient to offset the short- \nfall from Challenger Deeps. \n\nThe preparation for lodgement of an EIS to the \nNSW Department of Planning continues. It is \nenvisaged that the EIS will be completed and \nlodged in 2014. Data for flora and fauna, surface \nwater, groundwater, meteorology, ambient \nnoise and dust levels are collected routinely. \nFurther investigations of cultural heritage, \nsocial-economic impact, traffic impact, soil \ntype and agricultural suitability have also been \nundertaken. \n\nWith the completion of the current mining \ncontract scheduled for the end of July 2013, \na tender was completed and a new upgraded \ncontract was awarded to Byrnecut which \ncommenced on 1 August 2013. \n\nChatree \nChatree continued as Kingsgate’s primary \nproduction asset throughout the year, \nproducing 133,681 ounces of gold and \n1,000,569 ounces of silver. The strong produc- \ntion performance was achieved despite some \noperational hurdles with slower than anticipated \nGovernment approvals, to allow full utilisation of \nthe expanded plant. \n\nFollowing the fall in the gold price a strategic \nreview of the Challenger Mine was completed. \nThis resulted in the decision to implement a new \nmine plan to focus primarily on the higher grade \nChallenger West orebody. This plan will be \nimplemented over the first quarter of the 2014 \nfinancial year. \n\nWith the fall in metal prices in late 2013, work \nand expenditure on the DFS and EIS have been \nphased to coordinate the two programs with \ncompletion and submission now not expected \nbefore mid-2014. \n\nThe delay of 63 days in approval of the Plant #2 \nMetallurgical License and lower than expected \navailability of some of the mining contractor’s \nmajor mining equipment negatively impacted \nthe production targets. However, near surface \nhigher grades in Q Prospect mitigated these \ndifficulties resulting in a strong final quarter for \nthe year.", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Looking Ahead \n\nOver the current financial year and beyond, \nKingsgate remains focused on optimising \nproduction within an uncertain metal price \nenvironment, continuing to build resources \nand reserves and advancing the development \nproject pipeline of Nueva Esperanza and \nBowdens. These initiatives are designed to \ngrow earnings per share for the benefit of all \nshareholders. \n\nExploration \n\nWith the approvals of the Special Prospecting \nLicence (“SPL”) applications in Thailand still \nawaiting the Minister of Industry’s consent, \nexploration attention over the past 12 months \nhas focused on new exploration opportunities \nand Mineral Resource enhancement targets \nwithin the Mining Leases. This exploration \nformed part of a strategic exploration program \nwithin the mining leases at Chatree that \ncommenced in late 2012. The program has \nsuccessfully defined several new areas of miner- \nalisation within the Mining Lease, most notably \nat Q and A North Prospects, and has also \nupgraded several larger areas of Inferred \nResources to the Measured and Indicated \nMineral Resource category. \nIn late September, Kingsgate’s Thai subsidiary, \nAkara Resources Public Company Limited \n(“Akara”) has submitted its listing application \nand draft Prospectus to the Thai Securities \nExchange Commission (SEC) and the Stock \nExchange of Thailand (SET) for an initial public \noffering of its shares on the SET. \n\nThe SEC and SET will review the draft Prospectus \nin the coming months in order to approve the \nlisting of Akara. The decision to list Akara will \ndepend on market conditions and other factors \nat the time of approval. \n\nGroup gold production for the full year to \n30 June 2014 is expected to be in the range \nof 190,000 to 210,000 ounces. This includes \n120,000 to 130,000 ounces from Chatree and \n70,000 to 80,000 ounces from Challenger. \n\n\n\nt \nr \no \np \ne \nR \ns \n’ \nO \nE \nC \nd \nn \na \nD \nM", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "[html]The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabledKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimatesAcquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTINGThe acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financinThe accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Nueva Esperanza Silver / Gold Project \nThe Nueva Esperanza Silver / Gold Project \nadvanced during the year with an initial scoping \nstudy for a decision to mine the Arqueros and \nTeterita portions of Nueva Esperanza completed \nin late 2012. The study demonstrated that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible although high \ncapital and power costs negatively impacted \nproject economic returns. \nExploration \nThe Group has a portfolio of exploration tene- \nments and applications in Thailand, Chile and \nLao PDR. Following the sale of exploration \ntenements to Caravel (refer below), exploration \nin Australia is currently only conducted in the \nvicinity of the Challenger Mine in South Australia \nand the Bowdens Silver Project in New South \nWales. \n\nTotal mill throughput for the year was 5.7 million \ntonnes, 11.4% higher than 2012, despite the \nimpact of the 63 day delay during which Plant #2 \nwas not operating. The overall plant availability \nof 98.1% was slightly lower than the previous \nyear’s 98.4%. The expanded plant is operating \naround 24% above the annual “nameplate” \nthroughput rate at 6.2 million tonnes per annum \nand this is expected to continue. \n\nAs a consequence, feasibility work has transi- \ntioned to assess a lower capital cost and lower \npower requirement option, namely the potential \nfor heap leach processing. Recently completed \nmetallurgical testwork demonstrated that \nprocessing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and, as \na consequence, may become the preferred \nalternative for development. \n\nSale of Exploration Assets \nOn 28 March 2013, the Group sold its explora- \ntion assets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. \n\nKingsgate received 135,000,000 fully paid \nordinary shares in the issued capital of Caravel \nand 20,000,000 unlisted options to acquire \nCaravel shares exercisable at 10 cents on or \nbefore three years from the date of issue. \nSubsequent to the sale, Kingsgate became the \nlargest shareholder in Caravel with 35.54% held \nat 30 June 2013. Kingsgate’s holding in Caravel \nreduced to 27.04% post 30 June 2013 following \na rights issue by Caravel that Kingsgate did not \nparticipate in. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. \n\nTotal cash costs for the year were US$767 per \nounce (US$620 per ounce exclusive of Thai \nroyalties). The average royalty paid to the Thai \nGovernment was $US147 per ounce of gold. \nTotal production costs after depreciation and \namortisation were US$952 per ounce of gold \nproduced. \n\nAt year end, 9.7 million tonnes of ore was stock- \npiled with an average contained gold grade of \n0.57 g/t representing 178,086 ounces of gold. \n\nBowdens Silver Project \nThe Bowdens Project continued to advance \nduring the year with field programs supporting \nthe feasibility and environmental studies \nongoing. Sterilisation drilling and additional \nmetallurgical sampling were undertaken with \nthe resource evaluation drilling completed in \nOctober 2012. \n\nChallenger \nThe Challenger Mine produced 66,216 ounces of \ngold for the year with an average milled grade of \n3.91 g/t and a total cash cost of US$1,135/oz. \nThe grade was lower than expected due to a \nshortfall in ore supply from the mine that was \nsupplemented by low grade ore from stockpiles. \nHigher dilution in stopes at the base of the mine", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "CHATREE SUSTAINABILITY \nChatree adheres to Kingsgate’s Sustainability \nPolicy, a copy of which may be obtained from \nthe Company’s website www.kingsgate.com.au. \nThe primary aim is to manage the Chatree asset \nethically, so the people of Thailand and the \nCompany prosper together, enjoying safe, fair \nand rewarding working relationships and a \nhealthy living environment. \n\nCommunity Funds \n\nCorporate social responsibility at Chatree is \na continual commitment by our business to \nbehave ethically and contribute to economic \ndevelopment in the local area improving the \nquality of life of our workforce and their families \nas well as the local communities in which we \noperate. There are four funds which have been \nestablished. These are made up of an EIA Fund \nfor any environmental impact, an Or Bor Tor \nFund (sub-district Fund), a Village Fund and an \nAkara for Communities Fund. Committees have \nbeen formed to manage each fund which is \nmade up of government officials, village leaders, \nand employees from Chatree to ensure transpar- \nency and diligent project management. \n\nThe following sustainability section is a summary \nof a separate detailed document termed ‘The \n2013 Akara Resources Public Company Limited \nSustainability Report’, which is published in both \nEnglish and Thai language. \n\nCommunity \n\nChatree Gold Mine is located 280 kilometres \nnorth of Bangkok on the provincial border \nbetween Phichit and Phetchabun provinces. \nThe many villages around Chatree still lead a \npredominantly agrarian lifestyle, with rice \ngrowing as the main activity. It is important, \ntherefore, that Chatree is a good corporate \ncitizen for our immediate neighbours and in \nThailand generally. Chatree has as a primary \ngoal to minimise the impact of mining opera- \ntions to those living and working nearby. We \nseek to achieve this through regular meetings \nand consultation with local government and \nvillage groups and through assisting the \ncommunity in times of need. \n\n\n\nEmployees \n\nChatree has been free of lost time injuries for the \ntenth year in a row. This exemplary safety record \nwould be difficult to achieve without manage- \nment support. It is however, the employees and \ncontractors who have made a safe workplace a \nreality by ensuring a safe environment for them- \nselves and their workmates. Chatree employees \nand contractors have excelled in this regard and \nKingsgate congratulates and thanks them for \ntheir sustained efforts. \n\nThe Chatree workforce totalled 1,326 at the \nend of the financial year comprising 381 Akara \nemployees, 740 with our mining contractor \nLotusHall and 4 expatriates. Turnover for Akara \npermanent employees during the financial year \nwas 5.9%. \n\nChatree has received its fourth Welfare and \nRelations Award from the Department of Labour \nProtection and Welfare, as well as the Ministry \nof Labour and Best Employer Award from Aon \nHewitt and Sasin University in 2012. Chatree \nhas also maintained its certificate of TLS/ \nSA8000 since 2009. \n\nOur business is really all about people. As a first \nrate workforce is essential to our success, we \ncontinue to ensure we have the right people in \nthe right role doing the right work at the right \ntime. Akara Mining Limited offers comprehensive \ntraining in relevant safety and job-related areas \nto all our people. We also assist our employees \nto obtain tertiary education qualifications. Thus \nfar, 33 employees have been sponsored for \nMasters level degrees, 10 employees for Bachelor \nlevel degrees and eight employees for Diploma \nCertificates.", + "page_start": 19, + "page_end": 19, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", + "target_page": 6, + "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Nueva Esperanza \nThe Nueva Esperanza Project was advanced \nduring the year with the completion of a draft \nfeasibility study. This study included a decision \nto mine the Arqueros and Teterita portions of \nNueva Esperanza. The study demonstrated that \nopen pit mining at two million tonnes per year \nand processing by milling and agitation leaching \nin cyanide was technically feasible, although \nhigh capital and power costs negatively \nimpacted project economic returns. \n\nBowdens \nThe Bowdens Project continued to advance \nduring the year with field programs supporting \nthe ongoing feasibility and environmental \nstudies. Sterilisation drilling and additional \nmetallurgical sampling were undertaken with \nthe resource evaluation drilling completed in \nOctober 2012. \n\nDuring 2013, the process design and engineering \nwork for the Definitive Feasibility Study (“DFS”) \nprogressed to a point where the draft study was \nclose to completion as at 30 June 2013. The study \nencompassed detailed process design based on \nusing the most recent metallurgical test results, \ncapital and operating cost estimates, project \nwater and power supply, infrastructure require- \nments and mine optimisation. \n\nAs a consequence, feasibility work has tran- \nsitioned to assess a lower capital cost and lower \npower requirement options, namely the poten- \ntial for heap leach processing. Metallurgical \ntestwork recently completed demonstrated \nthat processing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and as \na consequence may become the preferred \nalternative for development. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. \n\nThe preparation for lodgement of an Environ- \nmental Impact Statement (“EIS”) to the NSW \nDepartment of Planning continues. It is envis- \naged that the EIS will be completed and lodged \nin 2014. Data for flora and fauna, surface water, \ngroundwater, meteorology, ambient noise and \ndust levels are collected routinely. Further inves- \ntigations of cultural heritage, social-economic \nimpact, traffic impact, soil type and agricultural \nsuitability have also been undertaken. \nFinancials \n\nKingsgate made an after tax loss of $323.7 \nmillion for the full year to 30 June 2013 compared \nto an after tax profit of $75.0 million for the \nprevious corresponding year. The result for the \nyear reflected an impairment of $311.9 million \npre-tax ($291.3 million post-tax) against the \nChallenger Mine and associated assets and an \nimpairment of $20.4 million against greenfield \nexploration projects in Australia and Thailand. \n\nWith the fall in metal prices in late 2013, work \nand expenditure on the DFS and EIS have been \nphased to coordinate and synchronise the \ntiming of the two programs with completion \nand lodgement now not expected before \nmid-2014. \n\n\n \n \n \n \n [html]\n
Financial Summary2013 SOOO2012 $ 000
Total sales revenue329.282357.372
EBITDA before significant items115.845168.583
( Loss ) / profit before tax( 339.615 )91.277
Income tax benefit / ( expense )15.889( 16.271 )
( Loss ) / profit after income after tax( 323.726 )75.006
Dividend declared ( c / share )520
", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "CHATREE CHATREE \n\nKhon Kaen KhKh \n\nT H A I L A N D \n\nBangkok \n\nA MC A M B O D I A C A M B O D I A \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nChiang \nMai \n\n10° 10° \n\n\n\n\n\nN SW \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSummary \n\nThe Nueva Esperanza Project is 100% owned \nby Kingsgate since February 2012. Nueva \nEsperanza is located in the Maricunga Gold Belt \nnear Copiapó, a regional mining centre in \nNorthern Chile. The silver-rich mineralisation is \nhosted by the Esperanza high-sulphidation \nepithermal alteration system associated with \nthe Cerros Bravos volcanic complex. \n\nThe project consists of three well-defined miner- \nalised deposits and a number of undeveloped \nexploration targets. The main deposits are \nArqueros, Chimberos and Teterita. Arqueros was \npreviously mined on a limited scale by under- \nground methods and Chimberos was exploited \nas an open pit mine, delivering about 40 million \nounces of silver in 1998/99. All three deposits \ncurrently have a combined Mineral Resources of \nabout 93 million ounces of silver equivalent or \n1.6 million ounces of gold equivalent (EQ60)1. \n\nA feasibility study for a decision to mine the \nArqueros portion of Nueva Esperanza was \ncompleted in late 2012, demonstrating that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible. Work remained \nto integrate the Teterita and Chimberos deposits \ninto the project, as well as to test lower cost \noptions for processing. Continued metallurgical \ntestwork has shown that mineralisation from all \nthree deposits by heap leaching is technically and \neconomically feasible and the preferred alterna- \ntive for development. \n\n\n\n\n\n\n\n\n\n\n\n\n\nEnvironmental approvals to commence \nconstruction and mining at Nueva Esperanza \nwere granted in July 2013 for the original \nArqueros project. Work is underway to modify \nand update the environmental assessment to \nincorporate the heap leach process. \n\n\n\n\n\n\n\n1 \n\n Equivalence is based on gold/silver price ratio \nof 60. Gold equivalence = gold content plus \n(silver content*divided*by 60), whereas Silver \nequivalent silver content plus (gold content \nmultiplied by 60).", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Nueva Esperanza Silver / Gold Project \nThe Nueva Esperanza Silver / Gold Project \nadvanced during the year with an initial scoping \nstudy for a decision to mine the Arqueros and \nTeterita portions of Nueva Esperanza completed \nin late 2012. The study demonstrated that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible although high \ncapital and power costs negatively impacted \nproject economic returns. \nExploration \nThe Group has a portfolio of exploration tene- \nments and applications in Thailand, Chile and \nLao PDR. Following the sale of exploration \ntenements to Caravel (refer below), exploration \nin Australia is currently only conducted in the \nvicinity of the Challenger Mine in South Australia \nand the Bowdens Silver Project in New South \nWales. \n\nTotal mill throughput for the year was 5.7 million \ntonnes, 11.4% higher than 2012, despite the \nimpact of the 63 day delay during which Plant #2 \nwas not operating. The overall plant availability \nof 98.1% was slightly lower than the previous \nyear’s 98.4%. The expanded plant is operating \naround 24% above the annual “nameplate” \nthroughput rate at 6.2 million tonnes per annum \nand this is expected to continue. \n\nAs a consequence, feasibility work has transi- \ntioned to assess a lower capital cost and lower \npower requirement option, namely the potential \nfor heap leach processing. Recently completed \nmetallurgical testwork demonstrated that \nprocessing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and, as \na consequence, may become the preferred \nalternative for development. \n\nSale of Exploration Assets \nOn 28 March 2013, the Group sold its explora- \ntion assets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. \n\nKingsgate received 135,000,000 fully paid \nordinary shares in the issued capital of Caravel \nand 20,000,000 unlisted options to acquire \nCaravel shares exercisable at 10 cents on or \nbefore three years from the date of issue. \nSubsequent to the sale, Kingsgate became the \nlargest shareholder in Caravel with 35.54% held \nat 30 June 2013. Kingsgate’s holding in Caravel \nreduced to 27.04% post 30 June 2013 following \na rights issue by Caravel that Kingsgate did not \nparticipate in. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. \n\nTotal cash costs for the year were US$767 per \nounce (US$620 per ounce exclusive of Thai \nroyalties). The average royalty paid to the Thai \nGovernment was $US147 per ounce of gold. \nTotal production costs after depreciation and \namortisation were US$952 per ounce of gold \nproduced. \n\nAt year end, 9.7 million tonnes of ore was stock- \npiled with an average contained gold grade of \n0.57 g/t representing 178,086 ounces of gold. \n\nBowdens Silver Project \nThe Bowdens Project continued to advance \nduring the year with field programs supporting \nthe feasibility and environmental studies \nongoing. Sterilisation drilling and additional \nmetallurgical sampling were undertaken with \nthe resource evaluation drilling completed in \nOctober 2012. \n\nChallenger \nThe Challenger Mine produced 66,216 ounces of \ngold for the year with an average milled grade of \n3.91 g/t and a total cash cost of US$1,135/oz. \nThe grade was lower than expected due to a \nshortfall in ore supply from the mine that was \nsupplemented by low grade ore from stockpiles. \nHigher dilution in stopes at the base of the mine", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "70° \n\nP E R U \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nB O L I V IA \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKhon Kaen KhKh \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nNUEVA NUEVA \nAntofagasta \n\nESPERANZA ESPERANZA \nChañaral \n\nCOPIAPO COPIAPO \n\nLa Serena \n3 30° \n\n\n\n\n\n\n\n\nCHATREE CHATREE \n\nT H A I L A N D \n\nBangkok \n\nA MC A M B O D I A C A M B O D I A \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nChiang \nMai \n\n10° 10° \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
IS W
The Elularing a relevant professed to 218 numers of goid for the year with an average inflaed grade controlled to the controlled to the controlled to the controlled to the controlled to the controlled to the controlled to the controlled tolC
Development and mining commenced at the higher grade Challenger West orebody during the year but was insufficient to offset the short - fall from the base of the mine.
", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "70° \n\nP E R U \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nB O L I V IA \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nNUEVA NUEVA \n\nESPERANZA ESPERANZA \n\n\n\n\n\n\n\n\n\n\n\nKhKh \nKhon Kaen \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nCHATREE \nCHATREE \n\nT H A I L A N D \n\nBangkok \n\nA MC A M B O D I A \nC A M B O D I A \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nChiang \nMai \n\n10° \n10° \n\n\n\n\n\nN SW \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
Chatree continued as Kingsgate ’ s primary production asset throughout the year, producting, L13.665 survices of good and over the production of the production performance was achieved despite some sperational difficulties with oler
The delay of 63 days in approval of our Metallurgical License negatively impacted on our production targets which were also compounded by the Mining Contractor ' s poor equipment availability. Near surface higher grades in Q Prospect min
Chatree continues to demonstrate world ' s best practice for safety. The mine has now operated for 23.6 million man hours ( 10.5 years ) without a lost time injury (\" LIT \").
\n\nHighway \n\nFreeway", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "**Regulatory approval to develop or expand our landÑlls and transfer stations may be delayed or denied.**\n\nOur plans include developing new landÑlls and transfer stations, as well as expanding the disposal and \ntransfer capacities of certain of our landÑlls and transfer stations, respectively. Various parties, including \ncitizens' groups and local politicians, sometimes challenge these projects. Responding to these challenges has, \nat times, increased our costs and extended the time associated with establishing new facilities and expanding \nexisting facilities. In addition, failure to receive regulatory and zoning approval may prohibit us from \nestablishing new facilities and expanding existing facilities. \n\n\n \n \n \n \n [html]\n
16
", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "〉〉 Silver equivalent ounces (AgEQ60): 93.5 \n\n\n\nThese project parameters are based on prelimi- \nnary results only and are insufficient to provide \nassurance as to the economic development of \nthe project at this stage and these parameters \nmay also change following completion of the \nDefinitive Feasibility Study. \n\nWith the technical and economical feasibility of \nheap leaching being established, the project will \nnow move into the final feasibility and design \nstage with results expected to be available \nduring the March quarter 2014.", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "**ACQUIRING NEW ACREAGE**\nFuture exploration success depends \non quality exploration acreage. \nSantos acquired five exploration \nblocks in three hydrocarbon \nprovinces during 2004. The most \nsignificant of these were in Egypt \nand Indonesia. \n\n• the addition of three new \n\n**2004 EXPLORATION**\n**EXPENDITURE BY CATEGORY** **2004 EXPLORATION**\n**EXPENDITURE BY REGION**\n\nventure areas in the shallow \nwaters of the Gulf of Mexico \nand onshore Montana and \nTexas, which significantly \nexpands and diversifies the \nUS exploration acreage and \nprospect inventory \n\nDrilling \n$63.6 million Offshore Australia \n$32.6 million \n\nGeoscience and other \n$37.5 million Onshore Australia \n$23.4 million \n\n• the farm-out of a 60% interest \nand operatorship of the NT/P61 \npermit in the Bonaparte Basin, \noffshore northern Australia to \nConocoPhillips \n\nSeismic \n$17.2 million South East Asia \n$41.4 million \n\nNew ventures \n$7.3 million United States \n$28.2 million \n\nEgypt and surrounding countries \nare a focus area for Santos. The \nCompany has farmed in to three \nexploration blocks in Egypt with \nUS petroleum group, Devon \nEnergy, committing approximately \n$70 million to an eight-well \nexploration joint venture over \nthe next three years in the Gulf \nof Suez. This is Santos’ first move \ninto the North Africa–Middle East \nregion, which is considered the \nworld’s premier hydrocarbon \nprovince. \n\n• the farm-out of a 16.67% \ninterest in the WA-264-P \npermit offshore Western \nAustralia to Beach Petroleum \n\n• the farm-out of a 70% interest \nin the deep water exploration \nblock, Nth Bali 1 PSC, offshore \nEast Java Basin to Total \nand Mitsui \n\nAn example of this is the strong \nposition Santos has created in \nthe Kutei Basin, with interests in \nthree neighbouring production \nsharing contracts: Popodi, \nDonggala and Papalang. 2004 also marked the year that \nSantos drilled its first operated \ndeep water wells – a significant \nachievement for a company that \nhad its beginnings in a desert \nenvironment. \n\nSantos continues to seek other \nexploration opportunities in this \narea, concentrating on the Gulf \nof Suez and the onshore Desert \nBasins. \n**KUTEI BASIN**\n\nSantos has acquired six \nexploration permits in Indonesia \nover the past three years, \nincluding an interest in the \nDonggala PSC in the Kutei Basin \nduring late 2004. This block lies \nbetween Santos’ other Kutei \nacreage: the Papalang and \nPopodi PSCs. \n\n• the farm-out of a 25% \n\ninterest in the VIC P/51 \nblock containing the Callister \nprospect to Mitsui & Co \nsubsidiary Mitwell Energy \nResources. \n\nThese farm-outs continued the \ntrend of risk-sharing with quality \npartners. \n\n**ADDING MATERIAL PROSPECTS**\nSantos is now in a position that \nexploration success in 2004 and \ngood acreage management has \ncreated future options that will \nultimately translate into greater \nvalue for the business in 2005 \nand beyond. \n\nThe addition of the Donggala PSC \ngives Santos a particularly strong \npresence in the Kutei Basin and \ncovers a highly prospective trend, \nwhile adding to the Company’s \ngrowing Indonesian operations. \n\nThis has been achieved by \nfocusing on ‘basin excellence’. \nThis means becoming a technical \nleader in basins, within our focus \nareas, entering early where \npossible to keep entry costs \ndown, balancing the commercial \nand the technical risks and \nselecting the right co-venturers. \n\nOther exploration acreage \nportfolio management and \nactivities during 2004 included: \n\n• the award of exploration permit \n\nT/36P in the Sorell Basin, \noffshore Tasmania \n\nAnnual Report 2004", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "officially lobbying Public Administrations to get the PSI they could use for the same purposes. As \n\nother suggestions made here, these are activities that should start at the city and regional level, first \n\nwith custom-made education initiatives, then with specific data-based services. Engaging all these \n\nactors in the adoption of (local) Open Data will be one of the big challenges of the next years. \n\n**5. Bibliography**\nBesides those explicitly linked from the text, this report has drawn inspiration by many other \n\nresources. The most important ones are listed here, but the complete list should be much longer. We \n\nwish to thank first the authors of the works listed below and, immediately after, to all the activists, \n\ninside and outside governments worldwide, who are working on this topic. \n\n1. Are you prepared for the pitfalls of Gov 2.0? \n\n\n \n \n \n \n [html]\n
3. Canada launches data. gc. ca.- what works and what is hroken
4. Creative Commons and data bases : huge in 2011, what you can do
5. Defining. Gox. 2.0. and Open. Goxsernment
6. How. Government. Data Can. Improve Lives
7. If you like solar, tell your utility to publish this map
8. Indian. corruption. backlanh. builds. after... year_of. the. treasure. hunters.”
9. Informacion. Cisica... Just. What. in. Civic. Information?
10. Is open government just about information?
11 - LSDL : Jn. un. click. la mappa del. crimine
12. La. casta. e. online :. dategli. la. caccial
13. Linee guida UK sullopendata
14. MSc dissertation on Open Government Data in the UK
15 - Open. Data.( 2 ): Effective. Data. Use.
16. Open. Data :. quali. prospettive. per. la. pianificazione?
IT - Open Knowledge Foundation Blog * Blog Archive * Keeping Open Government Data
Open2
18. Open. data,. democracy. and. public. sector. reform
", + "page_start": 32, + "page_end": 32, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
GeologyThe silver and gold mineralisation is hosted within tertiary aged volcanic units at Argueras and Seterita, and in Paleozoic sedenerate at Chimberos. The alteration and mineralisation are all Mocene in age and associated with the Cerros
Mineralisation comprises have main components with the strategies and there interventions. There interventions : ( Bipanish for blanket ) and a senses of marrier - wellical, coss - cost - coalting goild - rich structures. Mineral managetented by vugpy silica, is well - developed at Arqueros. It has been interpreted as feeders for mineralising fluids. Nonetheless, this style of mineralisation has not yet been observed at Teterita and is poorly preserved at Chimberos.
A Definitive Feasibility Stud progect at the end of May 2 on Anqueroi, and open pit : response to accountable and address the Teterietic and Chimberos an expansion of the feasibil rate their resources.Resource
Kingsgane has updated the progest resource and supports with any the programmes. Chemberss program and using the current gold? Chemberss program and using the current gold? Chemotherapy within the experiences of the experiences of theIn later 30 % II, a decision and alternated with the lateral the lateral the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lack of the lac
This represents about 250.000 ounces of gold and 78.5 million ounces of silver.The Measured, Indicated and Inferred resource may be expressed in gold or silver equivalent ounces as :
>Cold equivalent ounces ( AuEQ60 ): 1.6 million ounces at 1.7 g / l g g / ld equivalent ; and Silver equivalent ounces ( AgEQ60 ); 93.5 million ounces at 100 g / l : silver equivalent.
These project parameters a nary nesults only and are inn assurance as to the econom the project at this stage an may also change following : Definitive Feasibility Study. Definitive Feasibility Study.
", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", + "target_page": 11, + "target_passage": " Net cash outflows from financing activities was $1.7 million", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Summary \n\nKingsgate has recorded the following financial \nperformance for the year to 30 June 2013: \n\n〉〉 Revenue of $329.3 million. \n〉〉 \nEBITDA (before significant items) of $115.8 \nmillion. \n\n〉〉 Profit before tax and significant items of \n$17.2 million. \n\n〉〉 \n\nLoss after tax and significant items of $323.7 \nmillion. This includes a net tax benefit of \n$20.6 million, relating to the Challenger Gold \nOperations (“Challenger”) impairment. \n〉〉 Non-cash asset impairments and other \n\nsignificant items of $356.8 million pre-tax, \nwith $311.9 million principally relating to \nChallenger ($291.3 million post-tax). \n〉〉 No final dividend has been declared. An \n\ninterim dividend of 5 cents per share was \ndeclared for the half year to 31 December \n2012. \n\n\n\n\n \n \n \n \n [html]\n
ce of US $ 1.588 per ounce ), lower goldb012 : 204.145 ounces )Depreciation and amortisation
The increase in depreciation and amortisation to $ 85.6 million ( 2012 : 567.6 million ) reflects amortisation of the higher capitalised developmenthanges to mine opena major impairment sumber of Group allenger Mine. The
of Plant # 2 at Chatree and commencement of amortising the capital cost of the Chatree Tailings Storage Facility # 2.or contributor to the llion for the year.
Impairment and write - downsted a 24 % decrease in compared to the prior ad volume of ore
Following a strategic review of Challenger, a new mine plan focusing mainly on the Challenger West orebody was implemented effective 1 July 2013.on at Challenger wasn gold production at hatree *), reflecting : n the expandedand higher grade ore
Based on the revised plan Challenger is expected to generate positive cash flows though, as a there was and therefore therapy. If therefore the supported the full the full the full the full the full the full the full that are cash flows no longciation increased by spared to last year and hroughput and due to the first full
tax ) related to the carrying value of the prop - erty, plant and equipment and mine properties at Challenger so that the carrying value reflects recoverable value.# 2. The total unit cash ear were US $ 767 / 62 were US $ 700 mg quality to the uS $ 1.135 / or re US $ 1.135 / or ( 2012 ; ease mainly due to the total unit cost basis, total vere US $ 8888 / or, up
A review of the carrying value of all regional greenfield exploration projects was also conducted which resulted in the write down of bic. I missin, primarily against the starton week to the started with any the started the started with antThe impairment and write - downs are non - cash items and therefore have no impact on the Company ’ s cash position. The written down asset values do not create any concern with regard to conditions around the Company ’ s debt facilities.
", + "page_start": 9, + "page_end": 9, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2013 \n$’000 \n\n 329,282 \n\n(280,452) \n\n 48,830 \n\n(675) \n\n(21,152) \n\n(15,490) \n\n(745) \n\n – \n\n(1,353) \n\n(311,850) \n\n(20,421) \n\n(537) \n\n(323,393) \n\n 2,587 \n\n(18,809) \n\n(16,222) \n\n(339,615) \n\n 15,889 \n\n(323,726) \n\n2012 \n$’000 \n\n 357,372 \n\n(238,825) \n\n 118,547 \n\n(1,933) \n\n(19,304) \n\n 1,565 \n\n 1,268 \n\n(964) \n\n – \n\n – \n\n – \n\n – \n\n 99,179 \n\n 1,469 \n\n(9,371) \n\n(7,902) \n\n 91,277 \n\n(16,271) \n\n 75,006 \n\nSales revenue \n\nCost of sales \n\nGross profit \n\nExploration expenses \n\nCorporate and administration expenses \n\nOther income and expenses \n\nForeign exchange (loss) / gain \n\nBusiness acquisition costs \n\nShare of loss in associate \n\nImpairment losses – Challenger Gold Project \n\nImpairment losses – exploration assets \n\nImpairment of investment in associate \n\n(Loss) / profit before finance costs and income tax \n\nFinance income \n\nFinance costs \n\nNet finance costs \n\n(Loss) / profit before income tax \n\nIncome tax benefit / (expense) \n\n(Loss) / profit after income tax \n\nOther comprehensive income: \n\nItems that may be reclassified to profit and loss \n\nExchange differences on translation of foreign operations (net of tax) \n\nChange in fair value of available-for-sale financial assets (net of tax) \n\nTotal other comprehensive income for the year, net of tax \n\nTotal comprehensive (loss) / income for the year \n\n(Loss) / profit attributable to: \n\nOwners of Kingsgate Consolidated Limited \n\nNon-controlling interests \n\n(Loss) / profit after tax for the year \n\nTotal comprehensive (loss) / income attributable to: \n\nOwners of Kingsgate Consolidated Limited \n\nNon-controlling interests \n\nTotal comprehensive (loss) / income for the year", + "page_start": 64, + "page_end": 64, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "[html]The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabledKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimatesAcquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTINGThe acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financinThe accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Financial Position \n\nShareholders’ equity at 30 June 2013 was $474 \nmillion (2012: $776 million). The decrease of \n$302 million reflects the year’s loss together \nwith dividends paid. \n\nDividends \n\nNo final dividend has been declared for the year \nended 30 June 2013. \n\nAn interim dividend declared for the half-year \nended 31 December 2012 of 5 cents per fully \npaid share was paid on 12 April 2013. \n\nA final dividend declared for the year ended 30 \nJune 2012 of 10 cents per fully paid share was \npaid on 1 October 2012. \n\n\n \n \n \n \n [html]Financing ArrangementsCorporate loan facility\n
Convertible revolving creeKingsgate has a three year secured loan facility with Investec which was amended during the year. The amended facility has a lent of β40 million ( 90 June 2012 : $ 50 million ), of which S20 million has been drawn down as at 30 ( 40 ) ( 30 ) ( une 2012 :
The Elong allochas a Shear area of their linear area of their linear are and their lines. There is and their lines are and their lines are and their lines. There is and their lines that their lines are and their limited to their limited to the in tConvertible loan facility
Kingogate has a five year AB35 million convert : ible ban facility with linvestec entered into in a prior period to provide funding for the Blowdens acquisition. Kingogate has the option to make a preparyment against the facility with an inHestructure of corporate loan and
convertible loan facilitiesAs indicated previously in the the breathinary final associated with the provide therapy. There with their their their their their their their that their their their that their their their that their their their that the potential for cou
Multi - currency and syndrome for the forested to for the foresteronal to the for the foresteronal to the forest to the for the formats to the formats to the formats to the formats to the formats to the formats to the formation formation to thesSubsequent to the end of the financial year, the provided by the provided by the provided by the provided by the approved technical support support to their consumption. Increased to the nexts shorts under to formal discuss mentalizing fo
>Tranche one will be a 525 million Abara Pre IPO 80nd with a maturity date of 31, luly 2015. The current intention is for this tranche to be repaid as part of the Abara IPO, although at Kingspate ’ s election repayment can be made by either cash ori
>Tranche two is an amortising facility with $ 5 million to be repaid during the 2014 financial year and the balance of $ 10 million repaid during the 2015 financial year.
", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Independent auditor’s report to the members \nof Kingsgate Consolidated Limited \n\nReport on the financial report \n\nWe have audited the accompanying financial report of Kingsgate Consolidated Limited (the company), \nwhich comprises the statement of financial position as at 30 June 2013, the statement of comprehen- \nsive income, statement of changes in equity and statement of cash flows for the year ended on that \ndate, a summary of significant accounting policies, other explanatory notes and the directors’ declara- \ntion for Kingsgate Group (the consolidated entity). The consolidated entity comprises the company \nand the entities it controlled at year’s end or from time to time during the financial year. \n\nDirectors’ responsibility for the financial report \nThe directors of the company are responsible for the preparation of the financial report that gives a \ntrue and fair view in accordance with Australian Accounting Standards and the*Corporations Act 2001*\nand for such internal control as the directors determine is necessary to enable the preparation of the \nfinancial report that is free from material misstatement, whether due to fraud or error. In Note 1, the \ndirectors also state, in accordance with Accounting Standard AASB 101 Presentation of Financial \nStatements, that the financial statements comply with International Financial Reporting Standards. \n\nAuditor’s responsibility \nOur responsibility is to express an opinion on the financial report based on our audit. We conducted \nour audit in accordance with Australian Auditing Standards. Those standards require that we comply \nwith relevant ethical requirements relating to audit engagements and plan and perform the audit to \nobtain reasonable assurance whether the financial report is free from material misstatement. \n\nAn audit involves performing procedures to obtain audit evidence about the amounts and disclosures \nin the financial report. The procedures selected depend on the auditor’s judgement, including the \nassessment of the risks of material misstatement of the financial report, whether due to fraud or error. \nIn making those risk assessments, the auditor considers internal control relevant to the consolidated \nentity’s preparation and fair presentation of the financial report in order to design audit procedures \nthat are appropriate in the circumstances, but not for the purpose of expressing an opinion on the \neffectiveness of the entity’s internal control. An audit also includes evaluating the appropriateness of \naccounting policies used and the reasonableness of accounting estimates made by the directors, as \nwell as evaluating the overall presentation of the financial report. \n\nWe believe that the audit evidence we have obtained is sufficient and appropriate to provide a basis for \nour audit opinion.", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Your Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of, \nor during, the year ended 30 June 2013. \n\nDirectors \n\nReview of operations \nand results \n\nThe following persons were Directors of \nKingsgate Consolidated Limited during the \nwhole of the financial year and up to the date of \nthis report. \n\nOperational performance \nKingsgate is a gold mining, development and \nexploration company based in Sydney, Australia. \nKingsgate owns and operates two gold mines, \nthe world class Chatree Mine in Thailand and the \nunderground Challenger Mine in South Australia. \nIn addition, the Company has two advanced \ndevelopment projects, the Nueva Esperanza \nSilver / Gold Project, in the highly prospective \nMaricunga Gold / Silver Belt in Chile, and the \nBowdens Silver Project in New South Wales, \nAustralia. From this operating and development \nplatform, Kingsgate aims to build value for all \nshareholders. \n\n〉〉 Ross Smyth-Kirk Chairman \n〉〉 Peter Alexander Non-Executive Director \n〉〉 Craig Carracher Non-Executive Director \n〉〉 Peter McAleer Non-Executive Director \n〉〉 Gavin Thomas Executive Director \n\nThe principal activities of Kingsgate \nConsolidated Limited are mining and mineral \nexploration in Australia, South East Asia and \nSouth America. \n\nGroup gold production was 199,897 ounces, a \ndecrease of 4% on the previous corresponding \nyear. The contribution from Chatree was \n133,681 ounces with 66,216 ounces from \nChallenger. \nDividends \n\nDividends paid to members during the financial \nyear were as follows: \n\nChatree gold production was 10% higher than \nthe previous corresponding period as a result of \nan increase in throughput from the expanded \nChatree process plant and access to higher \ngrade oxide ore from Q Prospect. \n\nChallenger gold production was 24% lower than \nthe previous corresponding year given additional \ndilution and depletion at Challenger Deeps and a \nshortfall in planned development. This resulted \nin lower ore tonnes from the mine that was \nsupplemented by low grade stockpiled ore. \nFollowing the fall in the gold price a strategic \nreview of Challenger was implemented that has \nresulted in a new mine plan to focus primarily on \nthe higher grade Challenger West orebody. The \nnew mine plan will be implemented during the \nfirst three months of the 2014 financial year. \n\nA lower gold price and industry wide cost pres- \nsures had a negative impact on the underlying \nearnings of the Group which contributed to a \nmajor impairment to the carrying value of a \nnumber of Group assets, particularly assets \nrelating to the Challenger Gold Operations. \nImpairments totalling $332,808,000 were the \nmajor contributor to the after tax loss of \n$323,726,000 for the year. \n\nFinal dividend declared for the year ended 30 June 2012 of \n10 cents per fully paid share paid on 1 October 2012 \n\nInterim dividend declared for the year ended 30 June 2013 of \n5 cents per fully paid share paid on 12 April 2013 \n\nTotal dividends \n\nThe development projects continued to advance \nduring the year. At Nueva Esperanza, the feasi- \nbility work shifted to focus on identifying the \nlowest cost and lowest power consumption \ndevelopment alternatives. This included \nreviewing a heap leach process option with \non-site power generation. Further work is \nexpected to be completed in the December \nquarter 2013. At Bowdens, the feasibility work \nhas confirmed the optimum process route. \nCompletion of the technical feasibility study \nincluding mine planning, infrastructure and \nmetallurgy, and lodging of the Environmental \nImpact Statement (“EIS”) are scheduled for \n2014.", + "page_start": 42, + "page_end": 42, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "s \nt \nn \ne \nm \ne \nt \na \nt \nS \n\n\n \n \n \n \n [html]100 bps increase100 bps decrease\n
Profit $- 000Equity $ CCOProfit $ 1000Equity $* 000
Variable rate instrument – 20131.920( 1.920 )
Variable rate instrument − 2012481
\n\nl \n\na \nc \nn \na \nn \nF \ne \nh \nt \no \nt \ns \ne \nt \no \nN \n\ni \n\ni \n\nThe Group also has a three year $25,000,000 Convertible Revolving Credit Facility available. At the date of this report the facility is undrawn. Under the \nterms of this facility, Kingsgate has the option of repaying any funds drawn down under the facility through either cash or by issuing ordinary shares. It is \nintended that this facility will be utilised during the 2014 financial year for corporate and working capital purposes. It is the current intention of the Company \nto repay any cash drawdown under the facility by issuance of fully paid ordinary shares which would rank parri pasu with all existing ordinary shares, although \nthis position will be reviewed at the appropriate time. The number of shares has not yet been determined and they will be issued at a 2.5% discount to VWAP \nover a period by reference to the draw down date. Shareholder approval is not required. \n\nAs indicated in Note 16, Kingsgate’s Thai operating subsidiary, Akara, established a six year amortising multi-currency loan facility equivalent to \nUS$125,000,000 (fully drawn as at year end) and an additional Thai Baht denominated working capital facility equivalent to US$15,000,000 (undrawn as at \nyear end) during the period. The proceeds from these borrowings were used to fully repay the outstanding balance on the US$100,000,000 Baht denomi- \nnated syndicated loan facility in existence at the beginning of the period as well as to repay part of the corporate loan facility noted above. \n\n(d) Fair value measurements \nThe carrying values of financial assets and liabilities of the Group approximate their fair values. Fair values of financial assets and liabilities have been deter- \nmined for measurement and / or disclosure purposes. \n\nFair value hierarchy \n\nThe Group classifies assets and liabilities carried at fair value using a fair value hierarchy that reflects the significance of the inputs used in determining that \nvalue. The table following analyses financial instruments carried at fair value, by the valuation method. The different levels in the hierarchy have been defined \nas follows: \n\n〉〉 Level 1: quoted prices (unadjusted) in active markets for identical assets or liabilities; \n\n〉〉 Level 2: \n inputs other than quoted prices included within Level 1 that are observable for the asset or liability, either directly (as prices) or indirectly \n(derived from prices); and \n\n〉〉 Level 3: inputs for the asset or liability that are not based on observable market data (unobservable inputs).", + "page_start": 103, + "page_end": 103, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Cash flows from operating activities \nReceipts from customers (net of goods and services tax) \n\nPayments to suppliers and employees (net of goods and services tax) \n\nInterest received \n\nFinance costs paid \n\nIncome tax paid \n\nNet cash inflow from operating activities \n\nCash flows from investing activities \nPayments for property, plant and equipment \n\nPayments for exploration, evaluation and development \n\nPayments for acquisition of Bowdens Silver Project \n\nCash acquired on acquisition of subsidiaries, net of cash paid \n\nInterest capitalised to expansion and development projects \n\nDeposits and debt service reserve account \n\nPayments for other assets \n\nNet cash outflow from investing activities \n\nCash flows from financing activities \nProceeds from borrowings, net of transaction costs \n\nRepayment of borrowings \n\nProceeds from the issue of shares \n\nPayments for acquisition of non-controlling interests \n\nDividends paid \n\nNet cash (outflow) / inflow from financing activities \n\n\n \n \n \n \n [html]Balance at 1 July 2012775.813( Loss ) / Profit after income tax( 323.726 )Total other comprehensive income for the year40.364( 283.362 )Transaction with owners in their capacity as owners :4.3741.512( 22.739 )( 1.638 )Total transactions with owners( 18.491 )Balance at 30 June 2013473.960\n
599.618( 20.407 )196.602-775.813
( 323.726 )-( 323.726 )
40.364-40.364
Total comprehensive income for the year19b40.364( 323.726 )-( 283.362 )
Contributions of equity, net of transaction costs184.374-4.374
Issue of ordinary shares as part consideration for the settlement of a legal dispute181.512-1.512
Dividends provided for or paid22( 22.739 )-( 22.739 )
Movement in share - based payment reserve19a( 1.638 )-( 1.638 )
5.886( 1.638 )( 22.739 )-( 18.491 )
605.50418.319( 149.863 )-473.960
", + "page_start": 67, + "page_end": 67, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "**CONSOLIDATED STATEMENT OF CASH FLOWS**\n\n\n \n \n \n \n [html]\n
For the year ended 31 DecemberNote2014 US $’ 0002013 US $‘ 000
CASH FLOWS FROM OPERATING ACTIVITIES
Receipts from sales170.44284.703
Payments to suppliers and employees( 29.967 )( 21.765 )
Interest received201126
Derivative proceeds, net( 3 )253
Income taxes paid, net.( 12.586 )( 671 )
NET CASH PROVIDED BY OPERATING ACTIVITIES30128.08762.646
CASH FLOWS FROM INVESTING ACTIVITIES
Payments for development expenditure( 361.950 )( 154.700 )
Payments for exploration expenditure( 39.616 )( 20.006 )
Payments for acquisition of oil and gas properties( 35.606 )( 141.963 )
Sale of non - current assets115.28437.848
Transaction costs related to sale of non - current assets( 278 )( 161 )
Cash acquired from merger-114.690
Cash ( paid ) received from escrow and deposit accounts, net( 102 )837
Payments for plant and equipment( 967 )( 900 )
NET CASH USED IN INVESTING ACTIVITIES_ ( 323.235 )__ ( 164.355 )
CASH FLOWS FROM FINANCING ACTIVITIES
Proceeds from the issuance of shares72.43848.211
Payments for costs of capital raisings( 3.778 )( 2.654 )
Payments for acquisition related costs-( 533 )
Borrowing costs paid( 1.065 )( 569 )
Proceeds from borrowings165.00015.000
Repayments from borrowings___ ( 65.000 )___ ( 15.000 )
NET CASH PROVIDED BY FINANCING ACTIVITIES__167.595___44.455
Net decrease in cash held( 27.553 )( 57.254 )
Cash at beginning of period96.871154.110
Effect of exchange rates on cash( 101 )________________________________________________________________________________________________________________________________________________________________________________________________________
CASH AT END OF PERIOD11. 69.217.____96.871
", + "page_start": 59, + "page_end": 59, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "During 2013, the process design and engi- \nneering work for the Definitive Feasibility Study \n(“DFS”) progressed to a point where the study \nwas close to draft completion as at 30 June \n2013. The study encompassed detailed process \ndesign based on using the most recent metal- \nlurgical test results, capital and operating cost \nestimates, project water and power supply, \ninfrastructure requirements and mine \noptimisation. \n\nDuring the year Kingsgate sold its exploration \nassets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. (Kingsgate received \na 35.54% interest in Caravel and 20,000,000 \nunlisted options to acquire Caravel shares \nexercisable at 10 cents on or before three years \nfrom the date of issue. Kingsgate’s holding was \nreduced to 27.04% following a rights issue by \nCaravel post year-end). \n\n(Challenger Deeps) and depletion on those levels \ndue to the additional displacement of the ore \nhorizons following the identification of the “215 \nShear”, contributed to the lower than expected \nproduction from the lower levels. A shortfall in \nunderground development also limited access to \nore sources. \n\nDevelopment and mining commenced at the \nhigher grade Challenger West orebody during \nthe year but was insufficient to offset the short- \nfall from Challenger Deeps. \n\nThe preparation for lodgement of an EIS to the \nNSW Department of Planning continues. It is \nenvisaged that the EIS will be completed and \nlodged in 2014. Data for flora and fauna, surface \nwater, groundwater, meteorology, ambient \nnoise and dust levels are collected routinely. \nFurther investigations of cultural heritage, \nsocial-economic impact, traffic impact, soil \ntype and agricultural suitability have also been \nundertaken. \n\nWith the completion of the current mining \ncontract scheduled for the end of July 2013, \na tender was completed and a new upgraded \ncontract was awarded to Byrnecut which \ncommenced on 1 August 2013. \n\nChatree \nChatree continued as Kingsgate’s primary \nproduction asset throughout the year, \nproducing 133,681 ounces of gold and \n1,000,569 ounces of silver. The strong produc- \ntion performance was achieved despite some \noperational hurdles with slower than anticipated \nGovernment approvals, to allow full utilisation of \nthe expanded plant. \n\nFollowing the fall in the gold price a strategic \nreview of the Challenger Mine was completed. \nThis resulted in the decision to implement a new \nmine plan to focus primarily on the higher grade \nChallenger West orebody. This plan will be \nimplemented over the first quarter of the 2014 \nfinancial year. \n\nWith the fall in metal prices in late 2013, work \nand expenditure on the DFS and EIS have been \nphased to coordinate the two programs with \ncompletion and submission now not expected \nbefore mid-2014. \n\nThe delay of 63 days in approval of the Plant #2 \nMetallurgical License and lower than expected \navailability of some of the mining contractor’s \nmajor mining equipment negatively impacted \nthe production targets. However, near surface \nhigher grades in Q Prospect mitigated these \ndifficulties resulting in a strong final quarter for \nthe year.", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "To which countries extend the marriage regulations ?", + "target_page": 1, + "target_passage": "These Regulations extend to England and Wales. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]SCHEDULESPortugal, including the Azores and MadeiraSaint Helena, Ascension and Tristan da CunhaSingaporeCategory 2 countries and territories\n
SCHEDULE 1Regulation 2 ( 1 )
Category 1 countries and territories
Australia
Brunei
Falkland Islands
Faroe Islands
Gibraltar
Iceland
Israel
New Zealand
South Georgia and the South Sandwich IslandsSCHEDULE 2
Regulation 2 ( 1 )
Any country or territory outside the common travel area not listed in Schedule 1 or Schedule 3.SCHEDULE 3
Regulation 2 ( 1 )
Category 3 countries and territories
Angola
Argentina
Bangladesh
Bolivia
Botswana
Brazil
Burundi
Cape Verde
", + "page_start": 31, + "page_end": 31, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]2019TotalFemalesGEO ( Labels )20.218.3bep\n
TIME
SEX ( Labels )Males
European Union - 27 countries ( from 2020 )bep
21.8bepBelgium20.618.922.1Bulgaria16.3
14.218.1Czechia18.416.420.1Denmark19.8
18.421Germany19.918.321.4Estonia19
15.821.1Ireland20.8e19.4e22.1
eGreece20.41921.7Spain2219.8
23.9France22p19.8p23.9p
Croatia17.915.919.5Italy21.4b19.7
b22.9bCyprus20.318.921.5Latvia
17.414.419.4Lithuania17.914.820Luxembourg
20.919.222.4Hungary16.914.818.6Malta
21.119.422.5Netherlands20.31921.4Austria
20.318.721.7Poland18.516.120.4Portugal
20.618.522.3Romania16.9e14.9e
18.6eSlovenia20.118.121.8Slovakia17.9
15.719.7Finland20.618.822.3Sweden20.9
19.622.1
\n\nThe development of life expectancy and causes of lower mortality in the EU are summarised each year \nby the OECD/EU in their joint overview ‘Health at a glance’.190 \n\n*‘Steady and substantial reductions in mortality rates from IHD (Ischaemic heart diseases), strokes and*\n*other circulatory diseases were the main driver of increases in life expectancy in previous decades, but*\n*these reductions have slowed down over the past five to ten years in several Western European*\n*countries (e.g. France, Germany and the United Kingdom). This has contributed to the slowdown in life*\n*expectancy improvements.’*(OECD/The King’s Fund, 2020) 191 \n\nThe overview includes the**life expectancy of persons at birth and being 65 years old**, in the EU plus \nneighbouring countries that report to the EU. The geographical disparities of the life expectancy repeats; \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n78", + "page_start": 77, + "page_end": 77, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Annex 1 :Non - Annex INAI )
1AfghanistanAFG
2AlbaniaALB
3AlgeriaDZA
4AndorraAND
5AngolaAGO
6Antigua and BarbudaATG
7ArgentinaARG
8ArmeniaARM
9AzerbaijanAZE
10BahamasBHS
11BahrainBHR
12BangladeshBGD
13BarbadosBRB
14BelizeBLZ
15BeninBEN
16BhutanBTN
17BoliviaBOL
18Bosnia and HerzegovinaBIH
19BotswanaBWA
20BrazilBRA
21Brunei DarussalamBRN
22Burkina FasoBFA
23BurundiBDI
24CambodiaKHM
25CameroonCMR
26Cape VerdeCPV
27Central African RepublicCAF
28ChadTCD
29ChileCHL
30ChinaCHN
31ColombiaCOL
32ComorosCOM
33CongoCOG
34Cook IslandsCOK
35Costa RicaCRI
36Cote d ’ IvoireCIV
37CubaCUB
38Democratic People ’ s Republic of KoreaPRK
39Democratic Republic of the CongoCOD
40DjiboutiDJI
41DominicaDMA
", + "page_start": 44, + "page_end": 44, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "S T A T U T O R Y I N S T R U M E N T S \n\n\n \n \n \n \n [html]\n
Thenternational
ax ComDevelopment ( Accuracy expensions )ndmen
RegTableMade
.-20th Apri
0Laid beforee House of
Comm21st Apri0
\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— \n\n(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**)", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Colombia
Democratic Republic of the Congo
Ecuador
Eswatini
Ethiopia
French Guiana
Guyana
India
Kenya
Lesotho
Malawi
The Maldives
Mozambique
Namibia
Nepal
Oman
Pakistan
Panama
Paraguay
Peru
Philippines
Qatar
Rwanda
Seychelles
Somalia
South Africa
Suriname
Tanzania
Turkey
United Arab Emirates
Uruguay
Venezuela
Zambia
Zimbabwe
", + "page_start": 32, + "page_end": 32, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
126South AfricaZAF
127South SudanSSD
128Sri LankaLKA
129SudanSDN
130SurinameSUR
131SwazilandSWZ
132Syrian Arab RepublicSYR
133TajikistanTJK
134ThailandTHA
135The former Yugoslav Republic of MacedoniaMKD
136Timor - LesteTLS
137TogoTGO
138TongaTON
139Trinidad and TobagoTTO
140TunisiaTUN
141TurkmenistanTKM
142TuvaluTUV
143UgandaUGA
144United Arab EmiratesARE
145United Republic of TanzaniaTZA
146UruguayURY
147UzbekistanUZB
148VanuatuVUT
149VenezuelaVEN
150Viet NamVNM
151YemenYEM
152ZambiaZMB
153ZimbabweZWE
\n\nMRT \n\nMUS \n\nMEX \n\nFSM \n\nMNG \n\nMNE \n\nMAR \n\nMOZ \n\nMMR \n\nNAM \n\nNRU \n\nNPL \n\nNIC \n\nNER \n\nNGA \n\nNIU \n\nOMN \n\nPAK \n\nPLW \n\nPAN \n\nPNG \n\nPRY \n\nPER \n\nPHL \n\nQAT \n\nKOR \n\nMDA \n\nRWA \n\nKNA \n\nLCA \n\nVCT \n\nWSM \n\nSMR \n\nSTP \n\nSAU \n\nSEN \n\nSRB \n\nSYC \n\nSLE \n\nSGP \n\nSLB \n\nSOM \n\n84 Mauritania \n\n85 Mauritius \n\n86 Mexico \n\n87 Micronesia (Federated \n\nStates of) \n\n88 Mongolia \n\n89 Montenegro \n\n90 Morocco \n\n91 Mozambique \n\n92 Myanmar \n\n93 Namibia \n\n94 Nauru \n\n95 Nepal \n\n96 Nicaragua \n\n97 Niger \n\n98 Nigeria \n\n99 Niue \n\n100 Oman \n\n101 Pakistan \n\n102 Palau \n\n103 Panama \n\n104 Papua New Guinea \n\n105 Paraguay \n\n106 Peru \n\n107 Philippines \n\n108 Qatar \n\n109 Republic of Korea \n\n110 Republic of Moldova \n\n111 Rwanda \n\n112 Saint Kitts and Nevis \n\n113 Saint Lucia \n\n114 Saint Vincent and the \n\nGrenadines \n\n115 Samoa \n\n116 San Marino \n\n117 Sao Tome and Principe \n\n118 Saudi Arabia \n\n119 Senegal \n\n120 Serbia \n\n121 Seychelles \n\n122 Sierra Leone \n\n123 Singapore \n\n124 Solomon Islands \n\n125 Somalia", + "page_start": 45, + "page_end": 45, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**Figure 32: Age classes and work-related health problems in 2007, 2013, 2020 – LFS ad hoc module**\n\nWhen looking at the**differences between countries**in 2020, the countries with the highest values are: \nPoland (36.6%), Finland (25.7%) and Sweden (20.3%); all three are far above the average. Austria, \nLuxembourg and Germany have figures close to the EU27 average of 10.3%. In most other countries \nthe response values are under or close to 6%, like in Estonia, Romania, Ireland, Latvia, Lithuania, \nHungary, Malta, Bulgaria, Greece, Croatia, Cyprus, Czechia and Slovenia.257", + "page_start": 92, + "page_end": 92, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "What the parochial church council must provide to make marriage records ?", + "target_page": 1, + "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Louis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
14.1. 1 What documents are needed318
14.1. 2 Who receives the documents318
14.1. 3 When the documents are retrieved and delivered318
14.1. 4 Where are they delivered319
14.1. 5 Cross - platform access319
14.2 Defining the objects with the Administrator Client319
14.2. 1 Adding a recipient320
14.2. 2 Adding a recipient list321
14.2. 3 Adding a report ID322
14.2. 4 Adding a distribution323
14.2. 5 Adding a report bundle325
14.3 Defining the objects by using batch administration327
14.3. 1 Recipient327
14.3. 2 Report ID328
14.3. 3.3 Distribution and report bundle328
14.4 Customizable user exits329
14.1 arsodfxa : Spool file dataset allocation attributes exit329
14.4. 2 arsodfxb : Banner, header, and trailer exit329
14.4. 3 arsodfxm : Bundle manifest exit330
14.4 ODFProcessDist, java : Processed distribution exit330
14.5 Status and monitor tool331
Chapter 15. Full text search335
15.1 Introduction to full text search in Content Manager OnDemand336
15.2 Full text search architecture in Content Manager OnDemand336
15.2. 1 Full Text Search Server337
15.2. 2 Index structure337
15.2. 3 Indexing document through FTS Exporter338
15.2. 4 Searching338
15.3 Planning and installing FTS338
15.3. 1 Component overview339
15.3. 2 Installing the FTS Server339
15.3. 3 Operating system resources340
15.3. 4 Workload340
15.3. 5 Memory heap size.340
15.3. 6 Index consideratio341
15.4 Configuring and operating full text search.342
15.4. 1 Base configuration in Content Manager OnDemand342
15.4. 2 Configuration of the Full Text Search Exporter344
15.5 Running the full text indexing process346
15.5. 1 Automatically indexing new data during the load346
15.5. 2 Indexing existing data through the arsdoc command346
15.5. 3 Indexing existing data through ODWEK347
15.5. 4 Running the FTS Exporter347
15.6 Using full text search in Content Manager OnDemand clients347
15.6. 1 Syntax348
15.6. 2 Boolean searches348
15.6. 3 Wildcard searches and optional terms348
15.6. 4 Fuzzy and proximity searches.349
15.6. 5 Weighted searches ( boosting terms )349
15.7 Troubleshooting tips349
15.7. 1 Content Manager OnDemand server log349
15.7. 2 Full Text Search Server log.350
", + "page_start": 9, + "page_end": 9, + "source_file": "sg246915.pdf" + }, + { + "text": "**1.**—(1) A person (“P”), other than a person described in sub-paragraph (2), who is— \n\n(a) a member of a diplomatic mission in the United Kingdom; \n(b) a member of a consular post in the United Kingdom; \n(c) an officer or servant of an international organisation; \n(d) employed by an international organisation as an expert or on a mission; \n(e) a representative to an international organisation; \n(f) a representative at an international or United Kingdom conference who is granted \nprivileges and immunities in the United Kingdom; \n\n(g) a member of the official staff of a representative to an international organisation, or of a \n\nperson falling within paragraph (f); \n\n(h) described in paragraph (a) or (b) who is passing through the United Kingdom to \ncommence or continue their functions at a diplomatic mission or consular post in another \ncountry or territory, or to return to the country of their nationality; \n\n(i) a representative of a foreign country or territory travelling to the United Kingdom to \n\nconduct official business with the United Kingdom; \n\n(j) a representative of the government of a British overseas territory; \n(k) a diplomatic courier or a consular courier; \n(l) a member of the family forming part of the household of a person falling within any of \n\nparagraphs (a) to (k). \n(2) A person (“P”) where— \n\n(a) P either— \n\n(i) travelled to the United Kingdom for the purpose of attending or facilitating a G7 \nevent, and P is in England for the purpose of attending or facilitating a G7 event or \nof travelling in order to leave England, or \n\n(ii) travelled to the United Kingdom for another purpose, and after their arrival in \n\nEngland is attending, facilitating, or travelling to or from a G7 event; \n(b) P has been invited by Her Majesty’s Government to attend or facilitate the event; \n(c) the relevant person has provided written confirmation to the relevant Department that P \nwill comply with the health protocols for the event; and \n\n(d) the relevant Department has provided written confirmation to the relevant person that P is \n\na person described in this sub-paragraph. \n\n(3) The conditions referred to in regulation 9(15)(a)(i) (persons who are not required to comply \n\nwith regulation 9) are that— \n\n(a) the relevant head of the mission, consular post, international organisation, or conference, \noffice representing a foreign territory in the United Kingdom or a Governor of a British \noverseas territory (as the case may be), or a person acting on their authority, confirms in \nwriting to the Foreign, Commonwealth and Development Office that— \n(i) P is required to undertake work which is essential to the functioning of the mission, \nconsular post, international organisation, conference, or office, or to undertake work \nwhich is essential to the foreign country represented by the mission or consular post, \nthe foreign territory represented by the office or the British overseas territory, and \n\n(ii) that work cannot be undertaken whilst P is complying with regulation 9; and", + "page_start": 33, + "page_end": 33, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "sports event specified in sub-paragraph (3). \n\n(2) The conditions specified in this sub-paragraph are that, prior to P’s departure to the United \n\nKingdom— \n\n(a) the relevant head of the mission, consular post, or office representing a foreign territory in \nthe United Kingdom, or a Governor of a British overseas territory (as the case may be), or \na person acting on their authority, confirms in writing to the Foreign, Commonwealth and \nDevelopment Office that P is required to undertake work in the United Kingdom which is \nessential to the foreign country represented by the mission or consular post, the foreign \nterritory represented by the office or the British overseas territory; and \n\n(b) the Foreign, Commonwealth and Development Office has then confirmed in writing to \n\nthe person giving the confirmation referred to in paragraph (a) that— \n(i) it has received that confirmation, and", + "page_start": 74, + "page_end": 74, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(1) The High Court shall have jurisdiction to hear and determine any question \n\nwhether- \n(a) \n\nany person has been validly elected as an Elected Member of the National \nAssembly or the seat of any such Member has become vacant; \nany person has been validly elected as Speaker of the Assembly or, having \nbeen so elected, has vacated the office of Speaker. \n\n(2) Any question whether any person has been validly elected as a Specially \n\nElected Member of the National Assembly or whether the seat of any such Member has \nbecome vacant shall be determined by the Speaker. \n\n(3) Parliament may make provision with respect to- \n\nthe persons who may apply to the High Court for the determination of any \nquestion under this section; \nthe circumstances and manner in which the conditions upon which any such \napplication may be made; and \nthe powers, practice and procedure of the High Court in relation to any such \napplication. \n**70. Clerk of the Assembly**\n\n(a) \n\n(b) \n\n(c) \n\n(1) There shall be a Clerk of the National Assembly and an Assistant Clerk of the \n\nNational Assembly and their offices shall be offices in the public service. \n\n(2) There shall be such other offices in the department of the Clerk of the \nAssembly as may be prescribed by resolution of the National Assembly and such offices \nshall be offices in the public service. \n\n**PART II**\n**General Provisions Relating to Procedure in National Assembly (ss 71-76)**\n\n**71. Oaths to be taken by Speaker and Members**\n\nThe Speaker, before assuming the duties of his or her office, and every Member \nof the National Assembly before taking his or her seat therein, shall take and subscribe \nbefore the Assembly the oath of allegiance. \n**72. Presiding in Assembly**\n\nThere shall preside at any sitting of the National Assembly- \n\n(a) \n(b) \n(c) \n\nthe Speaker; \nin the absence of the Speaker, the Deputy Speaker; or \nin the absence of the Speaker and the Deputy Speaker, such Member of the \nAssembly (not being the President or Vice-President or a Minister or Assistant \nMinister) as the Assembly may elect for that sitting. \n\n**73. Quorum in Assembly**\n\nIf objection is taken by any Member of the National Assembly present that there \n\nare present in the Assembly (besides the person presiding) less than one third of the \nMembers of the Assembly and, after such interval as may be prescribed in the rules of \nprocedure of the Assembly, the person presiding ascertains that the number of Members \npresent is less than one third, he or she shall thereupon adjourn the Assembly. \n**74. Voting in Assembly**\n\n(1) Save as otherwise provided in this Constitution, any question proposed for \ndecision in the National Assembly shall be determined by a majority of the votes of the \nMembers present and voting. \n\n(2) ... \n(3) The person presiding in the National Assembly shall have neither an original \n\nvote nor a casting vote and if upon any question before the Assembly the votes are \nequally divided the motion shall be lost. \n**75. Unqualified persons sitting or voting**\n\nAny person who sits or votes in the National Assembly knowing or having", + "page_start": 33, + "page_end": 33, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of \nD’s household or a close family member or friend of D; \n\n(e) to attend the funeral of a member of P’s household or a close family member; \n(f) \n\nin other exceptional circumstances such as— \n(i) to seek medical assistance where this is required urgently or on the advice of a \nregistered medical practitioner including to access services from dentists, opticians, \naudiologists, chiropodists, chiropractors, osteopaths and other medical and health \npractitioners, including services relating to mental health, \n\n(ii) to access critical public services including social services or services provided to \nvictims (such as victims of crime), \n\n(iii) to avoid injury or illness or to escape risk of harm, \n(iv) to access veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon. \n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the \n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)— \n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for \n\nthis purpose; \n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in \n\nrelation to the exercise, the visit to the person or attendance at the funeral. \n\n**Meaning of “place”**\n\n**14.**For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room \nin the designated accommodation where P is staying and, if connected to the room where P is \nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including \nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, \nouthouse or appurtenance of the accommodation in which the place is situated. \n\n**Designations**\n\n**15.**The Secretary of State must designate for the purposes of this Schedule— \n\n(a) accommodation; \n(b) transportation to the designated accommodation, \n\nand must publish details of the designations in such manner as appears to the Secretary of State to \nbe appropriate. \n\n**Duties where P is a child**\n\n**16.**If P is a child— \n\n(a) any person who has custody or charge of P when P is travelling to England must ensure, \nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5 \nand 6; \n\n(b) any person who has custody or charge of P during P’s period of self-isolation must \nensure, so far as is reasonably practicable, that P self-isolates in accordance with this \nSchedule. \n\n**Person caring for P**\n\n\n \n \n \n \n [html]\n
1 /. A person may reside in the place withere P 18 assistance P reasonably requires by reason of —Fesight purposed pressure to mis scientification
( a ) P beirPercentage
( b ) any disability of P ’ s,
TableTable
", + "page_start": 77, + "page_end": 77, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Select one of the following types of relationships that you want to create or add, as shown \nin Figure 11-126, and click**Next**: \n\n– Metro Mirror \n– Global Mirror (with or without Consistency Protection) \n– Global Mirror with Change Volumes", + "page_start": 603, + "page_end": 603, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the prison population grew in average by year between 1993 and 2008 ?", + "target_page": 8, + "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what \nhappened to the prison population between 1993 and 2012 and the major \nfactors contributing to the changes.4 \n\nThe prison population grew rapidly between 1993 to 2008, at an average of \n4% a year. This rapid rise was driven by: \n\n \n\nincreased numbers of people sentenced to immediate custody from \n1993 to 2002; \n\n \n\nincreases in the average custodial sentence length and increased use \nof indeterminate sentences; and \n\n an increase in numbers recalled to prison following breaches of the \nconditions of licence and these offenders spending longer in prison \nonce recalled. \n\nThe rise in the prison population slowed considerably from the summer of \n2008, in part due to the introduction of the Criminal Justice and Immigration \nAct (CJIA) 20085 which changed sentencing and offender management in \nways which helped to reduce growth in the prison population. \n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to \n9 August 2011 which had an immediate but temporary impact on the prison \npopulation. \n\nDuring 2012 and into 2013, the prison population began to fall due to a falling \nremand population and a continued decline in the number of under 18s in \ncustody. The falling remand population during 2012 reflected falling volumes \ngoing through the courts plus the introduction, in December 2012, of \nmeasures restricting the use of remand for all offenders who would be unlikely \nto receive a custodial sentence.6 \n\nFrom the end of August 2013 to the end of October 2013, the remand \npopulation rose sharply, driving an overall increase in the prison population. \nThis was being driven by an increase in demand in the Crown Courts, \nespecially among more serious tri-able either way cases. The total population \nhas continued to rise since the beginning of 2014 and reached 85,9257 on the \n\n4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prison- \npopulation-1993-2012 \n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html \n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html \n7 www.gov.uk/government/statistics/prison-population-figures-2014 \n\n6", + "page_start": 7, + "page_end": 7, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nCentral Scenario \n\nThe Central Scenario has been modelled assuming custodial convictions are \nbroadly in line with recent trends and average length of sentence to be flat \nbased on recent trends. \n\nThe projections do not attempt to estimate the impact of any future \nGovernment policy that is yet to achieve Royal Assent, and therefore become \nless certain over time.", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
\n\n**Table A11: Projected male 18-20 years old prison population (end of June**\n**figures)**", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Contents
Key points2
1.Central Scenario
42.
Recent trends in the population6
3.Modelling methodology and projection scenarios
84.
Results11
5.Previous Projections
136.
Caveats on prison population projections14
", + "page_start": 2, + "page_end": 2, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\nThe assumptions used are based on consultation with policy and operational \nexperts at the Ministry of Justice and the National Offender Management \nService. They also take into account observed data trends: \n\n These projections represent a change from last year where the 2013 \nScenario 2 (central) saw the population gradually falling over the six \nyear lifetime of the projection. The Central Scenario in the projections \nthis year shows the population rising over the next six years. This \nchange arises from the fact that the latest projections capture a recent \nupward trend in prosecutions of more serious offences. \n\n Despite the fact that overall crime is falling there has been an increase \n\nin recorded crime for certain offence types: \n\no Prosecutions for sexual offences are the highest in the decade \nand increased by 19% in the 12 months ending June 2014, in \nline with a 21% increase in recorded crime. Offenders \nsentenced for sexual offences had an Average Custodial \nSentence Length (ASCL) of 59.7 months, a rise of 2.4 months, \ncompared with year ending June 2013. \n\no Violence against the person proceedings for indictable offences \nhave increased by 7% in the 12 months ending June 2014. This \nis in line with an 11% increase in recorded crime. \n\nFurther statistics and commentary on the changes seen in Court proceedings \nand sentencing over the last year is presented in the Criminal Justice System \nStatistics Quarterly publication. This is available online on GOV.UK at: \nwww.gov.uk/government/collections/criminal-justice-statistics-quarterly", + "page_start": 4, + "page_end": 4, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**3a) Producing prison population projections**\n\nPrison population projections are produced using the Prison Population Stock- \nFlow Model. The principal sub-populations in prison – determinate sentence, \nlife sentence, imprisonment for public protection (IPP) and remand – are \nmodelled using stock-flow structures based on the generic structure shown in \nFigure B2. The stock-flow structures model the flow of offenders into and out \nof prison and count the resulting prison population at the end of each month. \n\n**Figure B2: Generic stock-flow structure in the Prison Population Stock-Flow**\n**Model**\n\nPrison Population \nPrison Population \n\nDischarges \nDischarges \nReceptions / Pre-tariff ends \nReceptions / Pre-tariff ends \n\nAverage Time Served \nAverage Time Served \n\nFor the determinate population, the monthly inflows to prison are based on the \ncustodial convictions projections described above. These custodial convictions \ninclude offenders that may already be serving a sentence for a previous crime \nor those who would serve their whole custodial sentence on remand, meaning \nthat they would not be a new reception to prison. To convert from custodial \nconvictions to prison receptions we apply a conversion ratio derived from the \nhistorical proportions of custodial convictions to prison receptions for each \nsub-population averaged over the last twelve months of historical data (April \n2013 to March 2014 inclusive). \n\nMonthly outflows for the determinate population are based on observed \ncustodial sentence lengths and the observed percentage of sentence length \nserved taken from October 2013 to April 2014. Each projected offender that \nenters the model is given a custodial sentence length that is randomly \nselected from the relevant distribution. These distributions are populated with \ncustodial sentence lengths from actual offender receptions who share the \nsame characteristics of offence, gender and age group in the observed time \nperiod. The percent of custodial sentence length served is derived in the same \nmanner, except that the observed distribution is made up of discharged \noffenders further disaggregated by custodial sentence length band. \n\nFor offenders who receive the new EDS sentence an adjustment is made to \nthe percent of custodial length served to reflect that these offenders will spend \na greater proportion of their sentence in custody than standard determinate \nsentenced offenders discharged to date. \n\nProjected prison receptions are sub-divided by age category (Juvenile, Young \nAdult, Adult) with the exact age of the offender attributed in the same manner \nas the custodial sentence lengths. This allows the model to explicitly age the \noffenders whilst in prison (e.g. move from Juvenile to Young Adult categories).", + "page_start": 26, + "page_end": 26, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nScenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**5. Previous Projections**\n\nAt the end of September 2014 the published prison population was within 1.8 \n% of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 \nScenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does \nnot indicate which scenario the actual prison population will track going \nforward. \n\nDifferences between the 2013 projections and the actual population could be \nexplained by changes, different to those projected, in overall demand, offence \nmix, age and gender of defendants, court routes, custody rates or sentence \nlengths. \n\nChart 3 plots the 2014 Central Scenario projection against the three 2013 \nprison population projections. The 2014-2020 Central Scenario projection is \nabove all three scenarios from last year. The higher level of the new \nprojections can be attributed to a more serious case mix coming into the \ncourts with a resulting increase in average custodial sentence lengths. The \nprojection for June 2019 in the Central Scenario this year is 10.2 % above the \nequivalent scenario (Scenario 2) last year. \n\n**Chart 3: Comparing 2013 and 2014 projections (November 2014 – December**\n**2020)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n85,000 \n\n80,000 \n\nM \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\n2013 Scenario 1 2013 Scenario 2", + "page_start": 14, + "page_end": 14, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Eduction of the Extended Determinate Santence EDSS ) as part of the Legal Sentencing and Purishment of Offendersa1 ( ASPC ) Act which mannocate in December 2012. Some of the growth in the determinate ultation has been offset by a decline intA contains tables for annual projected end of June populations, rape francial year populations and total monthly populations for eachnarge along with detailed breakdown of the projections for our sub - ulations.
TableTable
", + "page_start": 13, + "page_end": 13, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
ListodiavictionTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 6, + "page_end": 6, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "Do you know the prison population estimation for the and of June 2020 ?", + "target_page": 13, + "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**Prison Population Projections**\n**2014 – 2020**\n**England and Wales**\n\nMinistry of Justice \nStatistics Bulletin", + "page_start": 0, + "page_end": 0, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nCentral Scenario \n\nThe Central Scenario has been modelled assuming custodial convictions are \nbroadly in line with recent trends and average length of sentence to be flat \nbased on recent trends. \n\nThe projections do not attempt to estimate the impact of any future \nGovernment policy that is yet to achieve Royal Assent, and therefore become \nless certain over time.", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**\n\nScenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Eduction of the Extended Determinate Santence EDSS ) as part of the Legal Sentencing and Purishment of Offendersa1 ( ASPC ) Act which mannocate in December 2012. Some of the growth in the determinate ultation has been offset by a decline intA contains tables for annual projected end of June populations, rape francial year populations and total monthly populations for eachnarge along with detailed breakdown of the projections for our sub - ulations.
TableTable
", + "page_start": 13, + "page_end": 13, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
\n\n**Table A11: Projected male 18-20 years old prison population (end of June**\n**figures)**", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Contents
Key points2
1.Central Scenario
42.
Recent trends in the population6
3.Modelling methodology and projection scenarios
84.
Results11
5.Previous Projections
136.
Caveats on prison population projections14
", + "page_start": 2, + "page_end": 2, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Table A4: Projected determinate sentence prison population (end of June**\n**figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
ScenarioCentralScenario 2
Jun - 1554.60055.50056.600
Jun - 1654.40057.00060.000
Jun - 1753.50057.90062.300
Jun - 1852.60058.80064.900
Jun - 1951.80059.60067.200
Jun - 2051.00060.20068.900
\n\n**Table A5: Projected indeterminate sentence prison population (end of June**\n**figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 1512.20012.20012.200
Jun ‐ 1611.70011.70011.700
Jun ‐ 1711.00011.00011.000
Jun - 1810.50010.50010.500
Jun - 1910.10010.10010.100
Jun - 209.6009.6009.600
\n\n**Table A6: Projected remand prison population (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 1512.90012.30011.700
Jun - 1613.00012.30011.600
Jun - 1712.90012.30011.600
Jun - 1813.00012.30011.600
Jun - 1913.00012.30011.700
Jun - 2013.00012.30011.700
\n\n**Table A7: Projected recall prison population (end of June figures)**\n\n\n \n \n \n \n [html]Sentencing Scenarios\n
Scenario 1CentralScenario 2
Jun - 155.4005.7006.300
Jun - 165.7006.1006.700
Jun ‐ 175.8006.1006.800
Jun - 185.8006.1006.800
Jun - 195.8006.1006.800
Jun - 205.8006.1006.800
", + "page_start": 17, + "page_end": 17, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
. Caveats on prison population projectionshe projections presented reflect the impact of three possible trinds in the placebo of contentions, coordinated with trends in the age, gender and othercoors of elevated and onthering the eystem and in the fibe of delendants through thel
he projections do not reflect the impact of legislative, policy, operational orcosedural change or guidance for which there is no definite time / table for employeration. The projections therefore provide a set of “ baseline ”verselfous these possible changes, the actual future prior population may not mainting of the projected somanosis. Changes to criminal judgestion may not may be computers, and the project and therapy. The project and therapy. The posin
sourplisons for modelling and socionaris development were captured through onsultation with policy and operational experts at the Ministry of Justice and le National Offender Management Samplicat. The assumptions are based on malys
", + "page_start": 15, + "page_end": 15, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\nThe assumptions used are based on consultation with policy and operational \nexperts at the Ministry of Justice and the National Offender Management \nService. They also take into account observed data trends: \n\n These projections represent a change from last year where the 2013 \nScenario 2 (central) saw the population gradually falling over the six \nyear lifetime of the projection. The Central Scenario in the projections \nthis year shows the population rising over the next six years. This \nchange arises from the fact that the latest projections capture a recent \nupward trend in prosecutions of more serious offences. \n\n Despite the fact that overall crime is falling there has been an increase \n\nin recorded crime for certain offence types: \n\no Prosecutions for sexual offences are the highest in the decade \nand increased by 19% in the 12 months ending June 2014, in \nline with a 21% increase in recorded crime. Offenders \nsentenced for sexual offences had an Average Custodial \nSentence Length (ASCL) of 59.7 months, a rise of 2.4 months, \ncompared with year ending June 2013. \n\no Violence against the person proceedings for indictable offences \nhave increased by 7% in the 12 months ending June 2014. This \nis in line with an 11% increase in recorded crime. \n\nFurther statistics and commentary on the changes seen in Court proceedings \nand sentencing over the last year is presented in the Criminal Justice System \nStatistics Quarterly publication. This is available online on GOV.UK at: \nwww.gov.uk/government/collections/criminal-justice-statistics-quarterly", + "page_start": 4, + "page_end": 4, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\nThe approach for the other sub-populations is similar and has not been \nsubstantially revised since the 2013 publication. The methodology applied to \neach is briefly outlined below. \n\nThe recall population is projected going forward based on time-series data \navailable to October 2014. \n\nFor remand prisoners the average time served on remand is calculated from \nthe ratio of the remand population to remand receptions. The modelled stock \nof prisoners is calibrated to historical actuals by varying levels of receptions. \nThe remand population is generated in two parts both using this approach – \nuntried remand and unsentenced remand populations being treated \nseparately. \n\nIPP and life sentence prisoners have an extra section in the stock-flow \nstructure which models the indeterminate nature of their sentence lengths. \nOutflows for IPP and life sentence prisoners depend on the tariff lengths they \nreceive and on the frequency and outcome of Parole Board hearings. The \nvalues of these parameters are set and calibrated to reflect the most recent \ndata on Parole Board outcomes. \n\nNOMS have made an agreement with the Home Office to hold an increased \nnumber of immigration detainees, which are only seen in the final two periods \nof historical data. The projected size of the non-criminal population is therefore \nset equal to the average size of the non-criminal population over the last two \nmonths of available data. This ensures that the non-criminal projections reflect \nthe latest and most accurate count of the non-criminal population. \n\n**3b) Accounting for the impacts of circumstance, legislation, and for**\n**seasonal effects**\n\nThe raw, unadjusted prison population projections are subject to model \nadjustments to show the impact of certain provisions in the Offender \nRehabilitation Act 2014, changes at the Verne and the ROTL review. Model \nadjustments are also used to account for seasonal variation in the population. \nModel adjustments have been applied equally to all the scenarios modelled. \n\nThe Home Office is to gain access to all 580 places at the Verne IRC by \nJanuary 2015. The estimated impacts have been applied to the non-criminal \nprojection in the model. \n\nProvisions in the Offender Rehabilitation Act 2014 will mean that offenders \nsentenced to custodial sentences of less than 12 months will be released \nsubject to licence (in the same way as offenders currently released from", + "page_start": 27, + "page_end": 27, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the phone number of the Ministry of Justice press office ?", + "target_page": 30, + "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Contact Points for further information**\n\nCurrent and previous editions of this publication are available for download \nfrom www.justice.gov.uk/publications/statistics-and-data/index.htm \n\nPress enquiries should be directed to the Ministry of Justice press office, \ntelephone: 020 3334 3536 \n\nOther enquiries about these statistics should be directed to: \n\nJustice Statistics Analytical Services \nMinistry of Justice \n7th Floor \n102 Petty France \nLondon \nSW1H 9AJ \n\nGeneral enquiries about the statistical work of the Ministry of Justice can be e- \nmailed to: statistics.enquiries@justice.gsi.gov.uk \n\nGeneral information about the official statistics system of the UK is available \nfrom www.statistics.gov.uk", + "page_start": 29, + "page_end": 29, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
© Crown copyright
Produced by the Ministry of Justice
\n\n29", + "page_start": 30, + "page_end": 30, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp", + "page_start": 111, + "page_end": 111, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**GETTING IN TOUCH WITH THE EU**\n\n**In person**\n\nAll over the European Union there are hundreds of Europe Direct centres. You can find the address of the centre nearest you online \n(european-union.europa.eu/contact-eu/meet-us_en). \n\nOn the phone or in writing \n\nEurope Direct is a service that answers your questions about the European Union. You can contact this service: \n\n• by freephone: 00 800 6 7 8 9 10 11 (certain operators may charge for these calls), \n\n• at the following standard number: +32 22999696, \n\n• via the following form: european-union.europa.eu/contact-eu/write-us_en. \n\n**FINDING INFORMATION ABOUT THE EU**\n\n**Online**\n\nInformation about the European Union in all the official languages of the EU is available on the Europa website \n(european-union.europa.eu). \n\n**EU publications**\n\nYou can view or order EU publications at op.europa.eu/en/publications. Multiple copies of free publications can be obtained by \ncontacting Europe Direct or your local documentation centre (european-union.europa.eu/contact-eu/meet-us_en). \n\n**EU law and related documents**\n\nFor access to legal information from the EU, including all EU law since 1951 in all the official language versions, go to EUR-Lex \n(eur-lex.europa.eu). \n\n**EU open data**\n\nThe portal data.europa.eu provides access to open datasets from the EU institutions, bodies and agencies. These can be downloaded \nand reused for free, for both commercial and non-commercial purposes. The portal also provides access to a wealth of datasets from \nEuropean countries.", + "page_start": 162, + "page_end": 162, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, \n\nto the**special conditions,**the**general conditions for framework contracts**for \nservices and the following annexes: \n\n\n \n \n \n \n [html]\n
AnnTender specifications ( reference No [( digniplete ] of [ illigirt / β8 ( e )])
AnneContractor ' s tender ( reference No [ complete ] of [ insert \\ date ])
Ann[ Model for order forms ] [ and ] ( model for specific contracts )
", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**3.5 Help Desk**\n\n**3.5.1 How to contact the Portal’s Help Desk**\n\nThe European Data Portal Help Desk can be contacted: \n\n•**By email**: help@europeandataportal.eu \n\n•**By phone**: the Portal’s Help Desk is staffed by a multilingual team of experts, who can be \n\ncontacted from Monday to Friday from 09:30 to 17:30 (CET). \n\no EN: (+352) 31 44 01-448 \n\no FR: (+352) 31 44 01-449 \n\n• By providing comments and suggestions via the**online contact/feedback form**available from \n\nthe Portal’s home page. \n\nFrom the header:", + "page_start": 47, + "page_end": 47, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**FRAMEWORK CONTRACT**\n\n**ORDER FORM**\n\nDirectorate \nand unit: Order number: (Name and address of contractor) \n\n Currency of payment: \n\nEUR \nTender (date and \nreference): \n\nE-mail: \n\n\n \n \n \n \n [html]LISTING OF THE SUPPLIES / SERVICESUNITQUANTITYPRICE in €TOTAL--YATPlace of delivery or performance and / or Incoterm :Contractor ’ s signature\n
UNIT________________________________________________________________________________________________________________________________________________________________________________________________________
PRICE
In accordance with Articles 3 and 4 of the Protocol on the Priviloges and Immunities of the European Union, the Commission 6 exempt. If the European Union, the Commission 6 exempt. If then as taxes and dues, the community, the this contracta
< underline > 1
", + "page_start": 45, + "page_end": 45, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**Item 3. Legal Proceedings.**\n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
\n\n\n \n \n \n \n [html]\n
Item 4. Mine Safety Disclosures.None.
TableTable
TableTable
TableTable
TableTable
TableTable
TableTable
Table
", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Assistant Minister. \n\n**43. Tenure of office of Ministers and Assistant Ministers**\n\nThe office of any Minister or Assistant Minister shall become vacant- \n\n(a) \n\nin the case of a Minister or Assistant Minister appointed from among the \nMembers of the National Assembly, or in the case of a Minister or Assistant \nMinister appointed from among persons who are not Members of the Assembly \nwho becomes a Member of the Assembly before the expiration of four months \nfrom the date of his or her appointment- \n\n(i) \n\nif he or she ceases to be a Member of the National Assembly otherwise \nthan by reason of a dissolution of the National Assembly; or \nif, at the first sitting of the Assembly after a general election, he or she is \nnot a Member of the Assembly; \n\n(b) \n\nin the case of a Minister or Assistant Minister appointed from among persons \nwho are not Members of the Assembly, if before the expiration of four months \nfrom the date of his or her appointment- \n\n(i) \n\ncircumstances arise (other than a dissolution of the Assembly) that, if he or \nshe were such a Member, would cause him or her to vacate his or her seat \nin the Assembly; or \nhe or she does not become a Member of the Assembly; \nif the holder of the office is removed from office by the President; \nupon the assumption by any person of the office of President. \n\n(ii) \n\n(c) \n(d) \n\n**44. Cabinet**\n\n(1) There shall be a Cabinet which shall consist of the President, Vice-President \n\nand the Ministers. \n\n(2) There shall preside at meetings of the Cabinet- \n\n(a) \n(b) \n(c) \n\nthe President; \nin the absence of the President, the Vice-President; or \nin the absence of the President and the Vice-President, such Minister as the \nPresident may designate. \n\n(3) The Cabinet may act notwithstanding any vacancy in its membership. \n\n**45. Oaths to be taken by Ministers and Assistant Ministers**\n\nThe Vice-President, a Minister or an Assistant Minister shall not enter upon the \n\nduties of his or her office unless he or she has taken and subscribed the oath of \nallegiance and such oath for the due execution of his or her office as may be prescribed \nby Parliament. \n**46. Secretary to the Cabinet**\n\n(1) There shall be a Secretary to the Cabinet whose office shall be a public office. \n(2) The Secretary to the Cabinet shall have charge of the Cabinet Office and \n\nshall be responsible, in accordance with such instructions as may be given to him or her \nby the President, for arranging the business for, and keeping the minutes of, the \nCabinet, for conveying decisions of the Cabinet to the appropriate person or authority, \nand shall have such other functions as the President may from time to time direct. \n\n**PART III**\n**Executive Functions (ss 47-56)**\n\n**47. Functions of President**\n\n(1) The executive power of Botswana shall vest in the President and, subject to \n\nthe provisions of this Constitution, shall be exercised by him or her either directly or \nthrough officers subordinate to him or her. \n\n(2) In the exercise of any function conferred upon him or her by this Constitution \nor any other law the President shall, unless it is otherwise provided, act in his or her own \ndeliberate judgment and shall not be obliged to follow the advice tendered by any other", + "page_start": 22, + "page_end": 22, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": ": 07index - 1 -16297515769781.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.10. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters24576Nov1012 : 07index - 1 -74444872708301.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is SOLR ?", + "target_page": 4, + "target_passage": "Search engine used for portal content search and dataset search ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "9.2 SPARQL Queries \nSPARQL is a powerful language, and one could write a whole book about it. In fact, there are books \nwritten about it. The best one I have seen is the O’Reilly book Learning SPARQL by Bob DuCharme. \nThis is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how \ntriples are used to represent all information in OWL. I will only touch on those issues here, there is much \nmore to say about them and DuCharme’s book is a great place to learn more. If some of the following is a \nbit hard to understand don’t be discouraged. This is just an attempt to give a very high level introduction \nto something that requires significant study to really understand. \n\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. \nJust as SQL can do more than just query, it can also assert new information into a database, so SPARQL \ncan as well. The current SPARQL plugins for Protégé are somewhat limited and don’t support the \nstatements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a \nquery language but keep in mind there is a lot more to it than what we briefly cover here. \n\n9.21 Some SPARQL Pizza Queries \nTo start with go to the SPARQL Query tab. If it isn’t already there you can as always add it using \nWindow>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the \nbottom which holds the results. There should be some text already there. It may look confusing, but we’ll \nexplain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of \nclasses and class expressions returned.", + "page_start": 67, + "page_end": 67, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**3.7 SPARQL Manager**\n\nThe SPARQL Manager provides a graphical user interface (GUI) for sending user defined queries to \nthe Virtuoso SPARQL query engine. \n\nThe powerful SPARQL Protocol and RDF Query Language are primarily aimed at professionals for \nquerying metadata as Linked Data. A basic knowledge of the DCAT-AP specification is highly \nrecommended. \n\nIn the future, users of the SPARQL Manager will be able to save their queries for scheduled \nexecution. Additionally a notification will be send to the user when a result has changed. \n\nClicking the info icon in the upper right corner will display a step-by-step walkthrough of all \ncomponents with a short info about their function. \n\nThis is possible in both of modes of the SPARQL Manager, the search and the assistant mode, which \nwill be described in the following sections. \n\n**3.7.1 SPARQL Search**\n\n\n\nIn this mode you can load some predefined example queries from the right side into the editable text \narea to introduce yourself with the very basic SPARQL syntax. Limiting the number of returned \nresults is possible by selecting a value from the Limit-dropdown or by editing the query directly. \nFurthermore the format for the result can be selected. After clicking the Search-Button the result is \ndisplayed in Result data preview area below. The preview may be truncated depending on the size of \nthe result. The complete result could always be downloaded as a file by clicking the Download-link on \nthe right side.", + "page_start": 53, + "page_end": 53, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**Document indexing**\n*Document indexing*is used for reports that contain logical items, such as customer name or \nnumber. Each of the items in a report can be individually indexed on values, such as account \nnumber, customer name, and balance. Content Manager OnDemand supports up to 128 \nindex values per item. With document indexing, the user is not necessarily required to know \nabout reports or report cycles to retrieve a document from Content Manager OnDemand. \n\n**Report indexing**\n*Report indexing*is used for reports that contain many pages of the same type of data, such as \na transaction log. Each line in the report usually identifies a specific transaction, and it is not \ncost-effective to index each line. Content Manager OnDemand stores the report as groups of \npages and indexes each group. \n\nWhen reports include a sorted transaction value (for example, transaction date and number), \nContent Manager OnDemand can index the data on the transaction value. This indexing is \ndone by extracting the beginning and ending transaction values for each group of pages and \nstoring the values in the database. This type of indexing lets users retrieve a specific \ntransaction value directly. \n\n**1.3 Content Manager OnDemand server and its components**\n\nOn IBM z/OS® and Multiplatforms (MP) systems, the Content Manager OnDemand server \ncan be implemented as a library server and one or more object servers that are on one or \nmore nodes that are connected to a Internet Protocol network. For the Content Manager \nOnDemand system overview, see Figure 1-1 on page 5. \n\n**1.3.1 Library server and object server**\n\nA Content Manager OnDemand*library server*maintains two sets of database tables: \n\n(cid:2) The first set of database tables contains indexes about the reports that are stored in the \nContent Manager OnDemand Archive. \n\n(cid:2) The second set of database tables contains information about the objects that are defined \nto the system, such as users, groups, printers, application groups, applications, folders, \ncabinets, and storage sets. \n\nThe database manager provides the database engine and utilities to administer the database. \nThe library server processes client logons, queries, and print requests and updates to the \ndatabase. The major functions that run on the library server are the request manager, the \ndatabase manager, and the server print manager. \n\nA Content Manager OnDemand*object server*maintains documents on cache storage \nvolumes and an ASM. ASMs, such as Tivoli Storage Manager on Multiplatform systems, OAM \non z/OS systems, or ASM on IBM i systems, allow hierarchical storage management \ntechniques to be applied to the stored documents. An object server loads data, retrieves \ndocuments, and expires documents. The major functions that run on an object server are the \ncache storage manager, data loading and maintenance programs, and optionally, the ASM. \n\nThe basic Content Manager OnDemand configuration is a library server and an object server \non the same physical system or node. This single library or object server configuration \nsupports the database functions and cache storage on one system. You can add an ASM to \nthe single library or object server configuration to maintain documents on archive media.", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "**10.1 Introduction**\n\nFor this chapter, unless explicitly stated otherwise, the term “data” is used to refer to the \nreport data, the extracted documents or segments, and their related indexes and the \nextracted resources. \n\nA Content Manager OnDemand system logically stores data in*application groups*. An \napplication group is defined by the Content Manager OnDemand administrator. It consists of \ndata that has the same indexing, data storage, and expiration requirements. The application \ngroup definition also specifies where the report and document data are stored, how long the \ndata is stored, and how the data expires. The method or methods that can be used to expire \nthe data are a function of the application group parameters that are defined before the data is \nloaded into Content Manager OnDemand. In a Content Manager OnDemand system, data \ntypically goes through a lifecycle of loading, storing, migration, and an expiration process. \n\n**10.2 Loading and storing the data**\n\nThe Content Manager OnDemand architecture allows the control and management of the \ndata throughout its lifecycle. The data lifecycle begins with running an efficient load process. \nEach load process invocation ingests report data for a specified application group. \n\nDuring a load process, Content Manager OnDemand stores report (document) data, its \nresources, and index data, as shown in Figure 10-1. \n\n\n\n**Load**\n**Process**\n\n**Indexes**\nSeg ment-1 \ntabl e \n\nAg Data \nTab le \nD ataba se \nMa nag er \n\nSeg ment-n \ntabl e \n\n*Figure 10-1 Data and index storage locations*\n\nThe Content Manager OnDemand load process identifies, segments, and compresses \ngroups of documents into storage objects that are then stored in the Content Manager \nOnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage \nprocess, Content Manager OnDemand aggregates the stored documents (typically a few \nkilobytes in size) into storage objects. This aggregation provides efficient, high-volume \nstorage, retrieval, and expiration performance.", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "**Important:**Folder queries that use filter fields alone result in a sequential scan through \ndatabase tables. An index field must always be included in folder queries. For more \ninformation about folders, see 3.1.4, “Folders” on page 54. \n\nA thorough understanding of the way that users search for documents in the system is \nrequired before you determine the fields that will be indexes and the fields that will be filters. \nOnly fields that will be heavily used when users are searching for and retrieving documents \nneed a type of index. An index field will always be included in a folder query. \n\n**Note:**Date fields are almost always defined as filters, not indexes. \n\n**Segment**\n*Segment*is the date or date and time field that is used to limit the number of tables that are \nsearched during a folder query. By using a segment date to limit folder queries to a single \ntable or a limited set of tables, performance is improved. The segment date is especially \nimportant for application groups that contain a large amount of data. \n\nIf the expiration type is segment, Content Manager OnDemand also uses the segment field to \ndetermine when to delete data from the application group. You might specify only one \nsegment field for each application group. \n\n**Note:**The date field that is used for the segment date must always have a type of*filter*. By \ndefault, an index is created for the segment date, and setting the segment date to a type of \nindex creates unnecessary processing. \n\n**Application ID field**\nThe application ID field is used to identify an application within an application group when you \ncreate an application group that contains more than one application. The database mapping \nfields are used to map the value to be stored in the database as the label that is displayed for \nfolder queries and in the subsequent query hit list. A query can be made against a specific \napplication in an application group or against all of the applications in an application group. \n\n**3.1.3 Applications**\n\nAn application defines the data to index and load. An application associates the data with an \napplication group and specifies the type of indexing process to perform on the data. It also \ndefines any logical views to be put in place for users and determines any special print options \nto use with the data. In this section, we consider several of the load information attributes that \nare defined for an application. \n\n**Load Information tab**\nThe Load Information tab specifies the processing and resource information that the Content \nManager OnDemand loader uses to load the input data onto storage volumes and to load the \nassociated index data into the database.", + "page_start": 74, + "page_end": 74, + "source_file": "sg246915.pdf" + }, + { + "text": "**7.1 Introduction**\n\n\n \n \n \n \n [html]( ACPT ), OS - 400, XML, and Portable Document Format ( IFS ) indexers ), or before the load process ( Lainer ): mber ): When the indexs ore not crossele as part of the load process, flow are stored in an usual, cifia, The index file contains the intThe index values are text strings that occur in the dorsuments, for example, “ alshn Doe ”, or “ Account 1234 ”. One or more index values identify a unique document in Content Manager OnDemand.An isolutics - or extracts the index values and optionally observates them in the index file by examining the documents and cooring the index values into the index Nia according to criteria that are spacified by the user. Despending on then• Dutput file (. out file extension ), which contains the documents to load • Index file (. ind file extension ), which contains the index values for the docum• Connecting to the wrong index value frcFor information about investigating and resolving common load failures, see 18.1. 2, “ Indexing and loading issues ” on page 373.\n
The indexer might also create a resource file with a. res extension, which contains the resources that are extracted from the documents.Operationally, the loading process arralealls the indexer that is specified on the Indexer Information tab for the specified application. Depending on the indexer type, are lead performs one of the following tasks :
• Creates a set of files that is then loaded by the ars lead program into the Content Manager OnDemand System• Directly passes the indexing and document information to the ars ’ oud program so that they can be loaded into the Content Manager OnDemand System
Content Manager OnCemand for i, ars1aed is embedded within the ( ABPT080 ) user interface. Therefore, run the Add Report to Content Manager OnDemand ( ABPRPI00 ) command instead of ARSLIM2It is possible for the indexing to complete successfully but for the load to fail. The following reasons are the most common reasons for a loading failure :
", + "page_start": 185, + "page_end": 185, + "source_file": "sg246915.pdf" + }, + { + "text": "Documents are identified (indexed) by date, with one or more other fields, such as customer \nname, customer number, or invoice number. A date is optional but highly recommended for \noptimizing document search performance. \n\nOur example fictitious company, AFinancial Co, prints customer credit card statements \nmonthly. This report, the customer credit card statements (Customer Statements), consists of \nthousands of individual customer statements. The company also prints transaction logs \nmonthly. This second report, the transaction log (Transaction Report), contains thousands of \ncustomer transactions per month. The company must load these two reports into Content \nManager OnDemand so that their data can be stored, then easily searched, retrieved, and \nviewed later. Let us look at how these two large reports might be broken up into individual \nContent Manager OnDemand documents. \n\nReports are “loaded” into the Content Manager OnDemand system. A Content Manager \nOnDemand application describes how the report will be divided into documents. Figure 1-2 \non page 8 illustrates two reports, their associated Content Manager OnDemand applications, \nand documents. Let us look at how the associated applications divide the reports into Content \nManager OnDemand documents. \n\nThe first report that we look at is the Customer Statements report. For this example, the \nreport consists of 63,097 individual customer statements. An administrator can define a \n“*Statement application*” for this report that breaks up the report into logical documents. The \nStatement application uses the document indexing method to divide the report into \ndocuments that are based on customer name or customer number. Each statement in the \nreport becomes a document in Content Manager OnDemand. Users can retrieve a statement \nby specifying the date and any combination of customer name and number. \n\nCertain reports might not have a logical way of breaking up into individual documents. For \nexample, the Transaction Report is not sorted by customer name or number. The report is \ngenerated based on the transactions of the day and time, and the customers that are \nassociated with the transactions. In this case, we can break up the report into groups of \npages. An administrator can define a “*Trans application*” for the report that contains lines of \nsorted transaction data. The Trans application uses the report indexing method to divide the \nreport into documents. Each group of 100 pages in the report becomes a document in \nContent Manager OnDemand. Each group is indexed by using the first and last sorted \ntransaction values (transaction date and number) that occur in the group. Users can retrieve \nthe group of pages that contains a specific transaction number by specifying the date and the \ntransaction number. Content Manager OnDemand retrieves the document that contains the \nvalue that is entered by the user. \n\nTo summarize this example, as shown in Figure 1-2 on page 8: \n\n(cid:2) Customer Statements report: Contains all customer statements for a month. Customer \nStatements documents: Each customer statement is a document. \n\n(cid:2) Transaction Report: Logs all transactions as they occur for a month. Transaction Report \ndocuments: Every 100 pages of the report are a document.", + "page_start": 30, + "page_end": 30, + "source_file": "sg246915.pdf" + }, + { + "text": "A folder is the object with which users \nquery and retrieve reports. A folder can \nquery more than one application group, \nprovided the application groups have the \nsame database fields. \n\nThe application group is wher e you define \nthe database, cache storage, and archive \nstorage requirements for reports. An \napplication group can contain more than \none application, provided the applications \nhave the same database and storage \nmanagement attributes. \n\nEach application represents a repor t that \nyou want to define to the system. You \nmust assign an application to an \napplication group. \n\n*Figure 1-3 The concepts of cabinets, folders, application groups, and applications*\n\n**1.2.4 Indexing methods**\n\nContent Manager OnDemand provides two methods of indexing data: \n\n(cid:2) Document indexing \n(cid:2) Report indexing", + "page_start": 32, + "page_end": 32, + "source_file": "sg246915.pdf" + }, + { + "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
AcronymDescription
SPARQLQuery language for linked data ( RDF )
SSLSecure Socket Layer
URLUniform Resource Locator
XMLExtensible Markup Language
\n\n*Table 1-2: Abbreviations and Acronyms*", + "page_start": 4, + "page_end": 4, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is the function of the Graphical Data Visualisation Tool module ?", + "target_page": 6, + "target_passage": "How to visualize graphical data from a dataset resource ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features \nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which \nis applicable only for Excel files. \n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons) \nare also available on the “Grid” tab and work in the same way. \n\n**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available.", + "page_start": 42, + "page_end": 42, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**3.3 Visualization of Geo-Spatial Data (map.apps)**\n\nThe visualization of geo-spatial data within the European Data Portal provides previewing \nfunctionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific \nrequirements in terms of spatial and thematic coverage. The functionality that is provided in the \nheader (links to disclaimers and language switching) is consistent in the entire portal. \n\n**3.3.1 How to visualize geo-spatial data from a dataset resource**\n\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for \nspecific data, enters the dataset view of reasonable results and displays the available distributions \n(see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe \nbutton is displayed (see Figure 3). This is the entry point into the map viewer application. Supported \nformats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial \nvisualization for the first time, an interactive user tutorial is provided to guide the use through \nspecific functions of the user interface, similar to this written user manual.", + "page_start": 37, + "page_end": 37, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of \nthe Portal and the description of each function from the user’s perspective in terms of “*How to*…”. \n\nEach main function documentation consists of a screen snapshot, the steps required to execute the \nfunction and optionally a screenshot with the results. \n\n**3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0. \n\nThe table 1-3 below lists the described functions by module. \n\n**Module Name** **Function**\n\n- How to browse through the Editorial Content \n\n(how to access Resources on Open Data: eLearning \nmodules, Training Companion, Reports about Open \nData) \n\n- How to view / search for “Latest News” \n- How to view / search for “Open Data Events” \n- How to subscribe to the EDP Newsletter \n- How to view “Tweets” on the EDP \n- How to switch to another User Language \n- How to search for EDP Site Content \n- How to search for Datasets by Data Category \n- How to search for Datasets by Keyword \nEntering the Datasets-View \n\n1 Portal HomePage \n\n2 \n\nHow to filter datasets by using “Faceted Search” \n\nHow to store personal queries \n\nHow to filter datasets by geographical area \n\nHow to download dataset distributions \n\nHow to view licensing information \n\nHow to switch to another user language \n\nHow to browse by data catalogues \n\n3 \n\nVisualization of Geo-Spatial \nData (map.apps) \n\nHow to visualize geo-spatial data from a dataset resource \n\n4 \n\nGraphical Data Visualisation \nTool \n\nHelp Desk \n\nMetadata Quality Assurance \n(MQA) \n\nMonitoring tool for the metadata quality: \nThe Global Dashboard View \nThe Catalogue details view \nHow to run SPARQL Queries using: \n\n- SPARQL Search \n\nEuropean Data Portal Version 4.3 – User Manual", + "page_start": 5, + "page_end": 5, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "In some cases the user might experience the display of an error message. The geo-spatial \nvisualization tries to support all flavors of external services but cannot guarantee to work with \nbroken services. In these situations an error message dialog is presented and the user can decide if a \nsupport ticket shall be opened (see Figure 8). \n\n\n \n \n \n \n [html]\n
TableTable
TableTable
", + "page_start": 40, + "page_end": 40, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**6 Reporting Tables**\n\nThe Reporting Tables enable the user to view the data entered in the grids under the Data Entry section of the web \napplication. Note, however, that the column headings are not always fully displayed in the tables because column \nwidths are fixed. The full heading can be seen by scrolling the mouse over the column title. \n\nThe navigation tree here is organized**by year**(figure 32). It functions similarly as the navigation tree for data entry. \nData in reporting tables cannot be modified; modifications to data should be done through the data entry grids. \n\n***Figure 32: Reporting tables organized by year***\n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTable
TableTableTableTableNAIIS - User - MaxPage 25
", + "page_start": 24, + "page_end": 24, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**7 Data Export/Import**\n\nThis function enables users to export data from the system in either Excel or XML format. \n\n**7.1 Excel Export – Data Entry**\n\nClick on the “Data Export / Import” tab and the navigation tree will appear on the left-hand side (figure 33). \n\n***Figure 33: Data Export / Import initial navigation tree***\n\nThere are**three options**available to export files: \n\n1.**Export selected single grid**– only the data of the current selected grid will be exported. (figure 34, d) \n2.**Export selected sector / subsector**– all data of the current selected grid and the sub sectors will be \nexported. (figure 34, e) \n3.**Export all data entry grids**– all data entry grids will be exported. (figure 34, f) \n\nClicking on one of the Sector’s or sub sectors’ (figure 34, a) or c)) on the left-hand side navigation tree, three Export \nbuttons will appear on the middle of the screen. (figure 34, b) \n\nClick on one of the “Export” button. The system will then generate an excel export file. \nThe file that has been exported can be seen under “My Data Export” (figure 35). \n\n***Figure 34: Excel export***\n\n*NAIIS-User-Manual.Docx* Page 26 10/02/2013", + "page_start": 25, + "page_end": 25, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**Chapter 5. Graphical user interface**\n\nThis chapter describes an overview of the IBM Spectrum Virtualize graphical user interface \n(GUI). The management GUI is a tool that is enabled and provided by IBM Spectrum \nVirtualize that helps you to monitor, manage, and configure your system. \n\nThis chapter explains the basic view and the configuration procedures that are required to get \nyour IBM Storwize V7000 environment running as quickly as possible by using the GUI. \n\nThis chapter does not describe advanced troubleshooting or problem determination and \nsome of the complex operations (compression, encryption). For more information, see \nChapter 13, “RAS, monitoring, and troubleshooting” on page 673. \n\nThroughout this chapter, all GUI menu items are introduced in a systematic, logical order as \nthey appear in the GUI. However, topics that are described more in detail in other chapters of \nthe book are only referred to here. For example, storage pools (Chapter 6, “Storage pools” on \npage 191), volumes (Chapter 7, “Volumes” on page 241), hosts (Chapter 8, “Hosts” on \npage 317), and Copy Services (Chapter 11, “Advanced Copy Services” on page 435) are \ndescribed in separate chapters. \n\n**Demonstration:**The IBM Client Demonstration Center includes a demonstration of the \nV8.2 GUI. For more information, see the IBM Client Demonstration Center (log in \nrequired). \n\nThis chapter includes the following topics: \n\n(cid:2) 5.1, “Normal operations by using the GUI” on page 132 \n(cid:2) 5.2, “GUI introduction” on page 136 \n(cid:2) 5.3, “System View window” on page 143 \n(cid:2) 5.4, “Monitoring menu” on page 147 \n(cid:2) 5.5, “Pools” on page 155 \n(cid:2) 5.6, “Volumes” on page 155 \n(cid:2) 5.7, “Hosts” on page 156 \n(cid:2) 5.8, “Copy Services” on page 157 \n(cid:2) 5.9, “Access” on page 157 \n(cid:2) 5.10, “Settings” on page 162 \n(cid:2) 5.11, “Additional frequent tasks in GUI” on page 183", + "page_start": 152, + "page_end": 152, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.6.2 The Catalogue details view**\n\nThis page presents a detailed view of the issues per catalogue. The “Download as report” drop-down \nmenu provides a list of all available catalogues. As a next step, the user can choose whether to see \nthe catalogue dashboard, the distribution availability or dataset schema violations. The catalogue \ndashboard is the default view when visiting this page.", + "page_start": 50, + "page_end": 50, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**4.1 Data Entry**\n\nThe data entry tab provides the function to**input data**into the system through the use of**grids**. To display the grid, a \nnode has to be selected from the**navigation tree**. (Figure 23) \n\n**4.2 Navigation tree**\n\nTo expand or collapse the tree, click on the \nor collapse the entire tree by clicking the plus and minus signs at the bottom of the tree. \n or signs in front of the nodes, respectively. You can also expand", + "page_start": 16, + "page_end": 16, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 44. Data Entry Grid Export to Excel screen***\n\n\n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableNAIIS - User - Mamual. DocsPage 30
10 / 02 / 2013
", + "page_start": 29, + "page_end": 29, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "How to view “Tweets” on the EDP ?", + "target_page": 20, + "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3.1.5 How to view “Tweets” on the EDP**\n\nThe Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the \nright hand side. \n\n‐**Click on any of the tweets to display the complete tweet on twitter.**\n\n‐ **Scroll vertically to see previous tweets.**\n\n\n\n\n \n \n \n \n [html]\n
TableTable
European Data Portal Version 4.3 – User ManualPage 20 of 57
", + "page_start": 19, + "page_end": 19, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "138–166. \n\n62. Papacharissi, Z.; de Fatima Oliveira, M. Affective news and networked publics: The rhythms of news \n\nstorytelling on# Egypt. J. Commun.**2012**, 62, 266–282. \n\n63. Wang, X.; Wei, F.; Liu, X.; Zhou, M.; Zhang, M. Topic sentiment analysis in twitter: A graph-based hashtag \nsentiment classification approach. In Proceedings of the 20th ACM International Conference on Information \nand Knowledge Management, Scotland, UK, 24–28 October 2011; pp. 1031–1040. \n\n64. Laniado, D.; Mika, P. Making sense of twitter. In Proceedings of the International Semantic Web Conference \n\n2010, Shanghai, China, 7–11 November 2010; pp. 470–485. \n\n65. González-Ibánez, R.; Muresan, S.; Wacholder, N. Identifying sarcasm in Twitter: A closer look. In Proceedings \nof the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: \nShort Papers—Volume 2, Portland, OR, USA, 19–24 June 2011; pp. 581–586. \n\n66. Conover, M.D.; Ratkiewicz, J.; Francisco, M.; Gonçalves, B.; Menczer, F.; Flammini, A. Political polarization on \ntwitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, \nSpain, 17–21 July 2011. \n\n67. Kitzie, V.; Ghosh, D. # Criming and# Alive: Network and content analysis of two sides of a story on twitter. \nIn Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for \nthe Community, St. Louis, MO, USA, 6–10 October; 2015; p. 41. \n\n68. Burgess, J.; Galloway, A.; Sauter, T. Hashtag as hybrid forum: The case of# agchatoz. In Hashtag Publics. \n\nThe Power and Politics of Discursive Networks; Peter Lang: New York, NY, USA, 2015; pp. 61–76. \n\n69. Rushkoff, D. 17. Permanent revolution: Occupying democracy. In The Playful Citizen; Amsterdam University \n\nPress: Amsterdam, The Netherlands, 2013; p. 335. \n\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore \n\nhashtag. IC Rev. Cient*í*fica De Inf. Y Comun.**2015**, 11, 49–57. \n\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. \n\nPolitics Cult.**2011**, 44, 37–56. \n\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and \n\nconversations about the 2013 IPCC Working Group 1 report. PLoS ONE**2014**, 9, e94785. [CrossRef] \n\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using \ntopic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18–21 \nApril 2011; pp. 338–349. \n\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https://www.hashtags.org/featured/ \n\nhashtag-history-when-and-what-started-it/ (accessed on 16 January 2020). \n\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the \nrelease of the Working Group I Summary for Policymakers. Public Underst. Sci.**2017**, 26, 815–825. [CrossRef] \nSegerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore \nthe ecologies of two climate change protests. Commun. Rev.**2011**, 14, 197–215. [CrossRef] \nStatista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in \nMillions). 2019. Available online: https://www.statista.com/statistics/282087/number-of-monthly-active- \ntwitter-users/ (accessed on 10 October 2019). \n\n76. \n\n77. \n\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin’: Evolution of Twitter users and behavior. \nIn Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, \nUSA, 1–4 June 2014.", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "http://www.facebook.com/IBMRedbooks \n\n(cid:2) Follow us on Twitter: \n\nhttp://www.twitter.com/ibmredbooks \n\n(cid:2) Look for us on LinkedIn: \n\nhttp://www.linkedin.com/groups?home=&gid=2130806 \n\n(cid:2) Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks \nweekly newsletter: \n\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm \n\n(cid:2) Stay current on recent Redbooks publications with RSS Feeds: \n\nhttp://www.redbooks.ibm.com/rss.html", + "page_start": 20, + "page_end": 20, + "source_file": "sg246915.pdf" + }, + { + "text": "52. \n\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. \n\nHum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18,", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed10.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "[html]Example 7 - 20Deleting Pod and maintaining the data[ root @ dcocp01 “]# oc get podsNAMETableTableREADYSTATUSRESTARTSAGEappmongo – i bm – mongob - dev1 / 1Running021hdocker - registry - 2 -dxwx1 / 1Running113drouter - 1 - g9btn1 / 1Runni ng113d[ root @ dcocp01 “]#c de1te pod appmongo - 1bm - mongodb - devpod “ appmongo – ibm – mongod– development deleted[ root @ dcocp01 “]# 1 total 146028- 1an † smongof ' s / mongo /drwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------mong4096Nov1012 : 07.drwxr - xr - x. 4 rootroot40960ct3112 : 28.- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter16384Nov1012 : 07co11ection - 0 -- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter24576Nov1012 : 07co11ection - 0 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters32768Nov1012 : 07co11ection - 2 --- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter145391616Nov1012 : 07co11ecti1on - 3 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07co11ection - 4 -- 16295157678663310. wtdrwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter4096Nov1012 : 07diagnostc. d- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07index - 1", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + }, + { + "text": "**3.1.2 How to view / search for “Latest News”**\n\nThe Home Page displays the latest 4 news items in the “Latest News” panel on the left hand side. \n\n‐**Click on any of the 4 news items to display the complete news article (here: item#1).**\n\n‐**Or click on “More news” in order to find previously published news articles in the news**\n\n**archive.**", + "page_start": 16, + "page_end": 16, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Figure 8.2 Viewing the New Instances in the Individuals by Class tab", + "page_start": 65, + "page_end": 65, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "There are many other words in tweets besides hashtags to express the author’s intention. Multiple \napproaches, such as LDA and STM [32,73], can help to extract topics from unstructured texts. But in \nthis study, targeting on hashtags is more in line with our research question. Firstly, hashtags were \ninvented spontaneously by users of Twitter in 2007 as a mechanism to categorize discussions [74]. \nWords with hashtags are recognized as topics and considered worthy of public discussion. Secondly, \nby attaching # to certain words in tweets, the users intentionally anchor their tweets to certain topics. \nThe operator # explicitly reflects the author’s emphasis, which can help us extract rather than infer the \nauthor’s identification of the topic of the tweets. Our research question is to analyze and visualize \nthe associations of topics in public climate discourse. Compared with other approaches, analyzing \nhashtags co-occurrence pattern has advantage in extracting the structure of public discussions. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed10.pdf" + }, + { + "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library \nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed \n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset \ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the \n#globalwarming hashtag, we did not document these two hashtags when processing data. The number \nof hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose \nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended \nto be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, \nand excluding them helps researchers focus on meaningful rather than occasional associations. \n\n3.3. Measurement \n\n3.3.1. Hashtag Co-Occurrence Network \n\nThe co-occurrence patterns of hashtags in tweets from two datasets were documented to build \nsemantic networks for climate change and global warming. For instance, for “#cimatechange \nredistributes #fish species at high latitudes. @_OScience @AarhusUni #Arctic”, a tweet in the climate \nchange dataset, hashtags #fish and #arctic were documented as co-occurring and their associations plus \none in the semantic network of climate change. In the semantic network, nodes represent hashtags and \nthe weight of edge refers to the frequency at which two hashtags co-occurred. \n\nWe visualized the network using Gephi software [81]. Following the established literature \n[60,61,82], only the most prominent hashtags were included in the visualization to concentrate our \nanalysis on the most important hashtags. In this research, the top 50 hashtags with the highest centrality \nin each network were selected for visualization. Modularity analysis was then analyzed to identify the \nclusters of hashtags in each semantic network, and hashtags belonging to the same cluster were drawn \nin the same color. The network spatialization was conducted with Gephi’s built-in force-directed \nlayout algorithm proposed by Fruchterman and Reingold [83], where the more associated the hashtags, \nthe closer they are to each other in the spatial layout. \n\nA temporal analysis was introduced to understand the evolution of the two climate discourses \nover a long period. We first examined how the two semantic networks evolved in the past years. \nAll the nodes once ranked top 50 in any of the 10 years were gathered to form a union set for each \ndataset. Then, they were clustered according to the strength of their associations in the whole dataset \nand mapped with a force-directed layout algorithm in Gephi to produce a graph of nodes. With the \ndynamic network function supplied by Gephi, we then added the associations between the nodes \nranked on the top 50 list in 2009 to the graph of nodes and obtained the relationship of the top 50 nodes \nfor 2009. Similarly, we produced a total of 10 graphs from 2009 to 2018, where the positions of the \nnodes on the 10 maps are the same, but the strengths of their associations are different to represent the \nchanges in the associations of key hashtags for each discourse.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "Where can we open a document saved on OneDrive ?", + "target_page": 2, + "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Save the current backup to a secure and safe location. The files can be downloaded using \nUNIX**scp**or**pscp**for Microsoft Windows, as shown in Example 13-3. Replace the IP address \nwith the cluster IP address of your Storwize V7000 and specify a local folder on your \nworkstation. In this example, we are saving to C:\\V7000Backup. \n\nExample 13-3 Saving config backup files to your workstation \n\nC:\\**putty>pscp -unsafe**\n**superuser@9.174.157.250:/dumps/svc.config.backup.*c:\\V7000backup**\nUsing keyboard-interactive authentication. \nPassword: \nsvc.config.backup.bak_782 | 133 kB | 33.5 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.log_782 | 16 kB | 16.8 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.sh_7822 | 5 kB | 5.9 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.xml_782 | 105 kB | 52.8 kB/s | ETA: 00:00:00 | 100% \n\nC:\\putty> \n\nC:\\>**dir V7000backup**\n Volume in drive C has no label. \n Volume Serial Number is 0608-239A \n\n Directory of C:\\V7000backup \n\n24.10.2018 10:57 . \n24.10.2018 10:57 .. \n24.10.2018 10:57 137.107 svc.config.backup.bak_7822DFF-1 \n24.10.2018 10:57 17.196 svc.config.backup.log_7822DFF-1 \n24.10.2018 10:57 6.018 svc.config.backup.sh_7822DFF-1 \n24.10.2018 10:58 108.208 svc.config.backup.xml_7822DFF-1 \n 4 File(s) 268.529 bytes \n 2 Dir(s) 79.028.662.272 bytes free \n\nC:\\> \n\nThe use of the**-unsafe**option enables you to use the wildcard for downloading all the \nsvc.config.backup files in a single command. \n\n\n \n \n \n \n [html]\n
Tigt if you encounter Fatal : Received unexpected end - of - fi1e from server when usingthe pscp command, consider upgrading your version of PuTTY.
\n\n**13.3.2 Saving the backup by using the GUI**\n\nAlthough it is not possible to generate an ad hoc backup, you can save the backup files by \nusing the GUI. To do so, complete the following steps: \n1. Navigate to**Settings**→**Support**→**Support Package**. \n\n2. Click the**Manual Upload Instructions**twistie to expand it. \n\n3. Click**Download Support Package**, as shown in Figure 13-8 on page 685.", + "page_start": 705, + "page_end": 705, + "source_file": "sg247938.pdf" + }, + { + "text": "3. \n\nIn the next window (see Figure 13-39), indicate which of these drives you want to convert \nto spares by selecting them. Select one drive that has the same capacity and RPM of all \nother drives within the same mdisk0. Then, click**Next**. \n\n\n \n \n \n \n [html]\n
Convert to spare?Encleare IDSlot IDTechnologyCapacityRPMBlock SizeStatusUse
ED19TIER_ENTISRPRISE0.31815000F42continecandidate
ED14TIER_ENTSRPRISE0.3TR15000F42continecandidate
114TIER_ENTIERPRISE0.5TB10000512conlinecandidateExp
119TIER_ENTIERPRISE0.5TB10000512conlinecandidate. 9
112TIER_INTIRPRISE0.5TB10000512conlinecandidate1
24TIER_INTIRPRISE0.5TB10000512conlinecandidateECI1
22TIER_INTIRPRISE0.5TB10000512Non - containecandidate117
TIER_ENTERPRISE0.5TB10000512Outlinecandidate11TIER_ENTERPRISE
0.3TB10000512OutlinecandidateED121TER_ENTERPRISE
0.5TB10000512OnlinecandidateEDI10TER_ENTERPRISE
0.3TB15000512onlinecandidateEDI8TER_ENTERPRISE
0.5TB10000512onlinecandidateI15TIER_ENTERPRISE0.5TB
10000512onlinecandidateEDI20TIER_ENTERPRISE0.518
10000512onlinecandidate
", + "page_start": 728, + "page_end": 728, + "source_file": "sg247938.pdf" + }, + { + "text": "**Note:**For the best indexing results, select a monospacing font with the line data graphical \nindexer. \n\nIf the font is changed by using the Administrator Client, the selected font is also used by the \nWindows client the next time that the Windows client is started and a line data document is \nviewed. \n\nFor more information, see Technote 1215957, which is available at the following web address: \n\nhttp://www.ibm.com/support/docview.wss?uid=swg21215957 \n\n**3.1.4 Folders**\n\nA*folder*is the interface that allows a user to search for reports and documents that are stored \nin the Content Manager OnDemand system. One or more application groups can be defined \nto a folder. The user enters index search criteria into the folder search fields. In the \nbackground, an SQL search is issued for each included application group. The results of the \nqueries are accumulated, and a document hit list is constructed and returned to the user. The \nfolder can be customized to provide the look and feel that is wanted for the users of the \nContent Manager OnDemand system. The Content Manager OnDemand administrator can \nalso grant specific permissions for users and groups to use the folders. \n\n*Figure 3-7 Folder general information*\n\n**Display Document Location**\nThe Display Document Location setting (Figure 3-7) determines whether the client shows the \nstorage location of each document in the document list by placing an icon next to each entry. \nThe possible locations are cache storage (on the library server or an object server) or archive \nstorage.", + "page_start": 77, + "page_end": 77, + "source_file": "sg246915.pdf" + }, + { + "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. \n\nView who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. \n\n\n\nReview and track changes \n\nWhether you just want to check spelling, keep your word count in check, or fully \ncollaborate with other people, the**Review**tab has essential commands to track, \ndiscuss, and manage all of the changes made to your documents. \n\nFormat with styles \n\n**Styles**lets you create, apply, and review the formatting styles in your current \ndocument. To open it, select the**Home**tab, and then select the small arrow in the \nlower right corner of the Styles gallery.", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "**1** **2**\n\n\n\n\n\n\n\n\n\n press \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Before you begin ensure*\n*that there is a blank*\n*workbook on the screen…*\n\n Click in cell***A3***to make \n\nthis the active cell, type \n**Garden Settings**and \npress \n\n*When you press*\n*next cell down*\n*automatically becomes*\n*the active cell. By the*\n*way, even though the text*\n*looks like it is in cells A3*\n*and B3 it really only is in*\n*cell A3 – since there is*\n*nothing in B3, Excel*\n*allows the spill over to be*\n*displayed giving the*\n*illusion it is in 2 cells…*\n\n*the*\n\n Type**Pool Covers**and \n Repeat the above steps \nand enter the remaining \ntext in column***A***as shown \n\n Click in cell***B2***to make \nthis the active cell, type \n**UK**and press \n**5**\n\n*When you press*\n*the*\n*cell to the right becomes*\n*the active cell…*\n\n Enter the remaining text in \nrow***2***as shown \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n**For Your Reference…**\nTo***save a new document***: \nTo***enter text***: \n\n1. Click the cell pointer on the desired cell and \nand select**Save As**\n1. Click on the***File Tab***\n2. Locate the storage folder in the***Navigation***\n***pane***\n2. Press \n to \n3. Type a***File name***and click on**[Save]**\n\ntype the required information \n\n, an arrow key or \nconfirm the data entry and to move the cell \npointer to another cell \n\n**Handy to Know…**\n**Handy to Know…**\n \n You don’t have to use \n\nIn the exercise above we have named the \n to make \nworkbook***Garden Department Sales***and \nadjacent cells active. You can simply use the \nfiled it in***C:\\Course Files for Excel 2010***. \nmouse and click in the cells if you want or \nEach time you start Excel it will most likely \neven press the arrow keys to move up, \nassume you want to file your workbooks in a \ndown, left, or right. \nfolder called***Documents***which is associated \nwith the user name you use on the computer. \n\n or", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Summary:**Create a COM add-in for Office 2024, Office LTSC 2024, and Microsoft 365 \n\nVersion 2408 and later applications with your own logic for exporting to PDF format. The \n\ntechnique described requires knowledge of C++ and COM. \n\n**Applies to:**Excel, OneNote, PowerPoint, Publisher, Visio, and Word in Office 2024, Office \n\nLTSC 2024, Microsoft 365 Version 2408 and later. \n\n**Introduction to the Office (2024) Fixed-Format**\n**Export Feature**\n\nThis article explains how third-party software developers can hook in to the fixed-format \n\nexport feature available in the Office 2024, Office LTSC 2024, Microsoft 365 Version 2408 \n\nand later applications so that they can add their own exporter. \n\nThe applications include built in exporters for Microsoft XML Paper Specification (XPS) \n\nand Portable Document Format (PDF). Fixed-file formats expose the content of a \n\ndocument in a paginated form that is both application-independent and platform- \n\nindependent. \n\nSoftware developers can add their own exporter, by writing an Office add-in that \n\nimplements the**IMsoDocExporter**COM interface. This article describes \n\n**IMsoDocExporter**and its interaction with a hosting Microsoft 365 application, such as \n\nWord. \n\nFixed-format export has been available since the Office 2007 release, and this article \n\nincludes information on the features that are new in the Office 2024, Office LTSC 2024, \n\nMicrosoft 365 Version 2408 releases. \n\n**Important**\n\n\n \n \n \n \n [html]\n
TL, D, D
Specificity
Specifications
", + "page_start": 2, + "page_end": 2, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the bold keyboard shortcut on word ?", + "target_page": 4, + "target_passage": "Bold (keyboard shortcut: Ctrl+B)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: \n\n\n\n\n\n\n\n\n\n\n\n\n\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time.", + "page_start": 3, + "page_end": 3, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. \n\nView who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. \n\n\n\nReview and track changes \n\nWhether you just want to check spelling, keep your word count in check, or fully \ncollaborate with other people, the**Review**tab has essential commands to track, \ndiscuss, and manage all of the changes made to your documents. \n\nFormat with styles \n\n**Styles**lets you create, apply, and review the formatting styles in your current \ndocument. To open it, select the**Home**tab, and then select the small arrow in the \nlower right corner of the Styles gallery.", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "**SELECTING ROWS**\n\nIf you want to make changes to an***entire row***, \nsuch as bolding all of the headings in a row or \nchanging the font of all the cell entries, you must \nfirst select the row. This is done by clicking on the \n\n\n\n\nrow header to the left of the row. Remember that \nany changes you make will apply to every cell in \nthe row all the way across to column XFD, so be \ncareful! \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n **6**\n\nto select this row \n\n\n and click on the \n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous file*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*with this exercise, or open the file*\n*E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \nthe active cell \n to make cell***A1***\n\nrow heading for row***5***\n\n*Notice that the mouse pointer*\n*changes to a black arrow that*\n*points towards the row…*\n\n Click once on row heading***5***to \n Click in cell***B7***and press \n\n*This is the key combination for*\n*selecting an entire row…*\n\n Click on the row header for row***7***\n Hold down row header for row***10***\n\n*All rows from 7 to 10 will be*\n*selected…*\n\n Click in the row header for row***5***, \n\nthen hold down the left mouse \nbutton and drag down the row \nheaders to row***10***\n\n*This is another technique for*\n*selecting rows, but it does require*\n*a steady hand!*\n\n\n\nselect the entire row \n\n\n\n + \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n When***every cell***in a row or column is \n\nselected, the corresponding row or column \nheader is filled in dark blue. When only***some***\nof the cells are selected, the row or column \nheader is filled in orange. These indicators \nhelp you locate the active cell(s) on the \nworksheet. \n\n", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Unlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will \nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too, \nso you can learn by doing. \n\nFor practice using Word features, watch for Try it text in red throughout this document. \n\nTime saver: If you’ve only got a minute \nand you want to see how this works, \nwatch this Video: Welcome to Word. \n\n\n\nWrite eloquently, with a little help \n\nWord automatically checks spelling and grammar, and marks misspelled words with a red \nsquiggly underline. Grammatical glitches get a blue double underline. \n\nTry it: Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write \na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph. \n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct \nthe mistakes.", + "page_start": 0, + "page_end": 0, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "name is meant to be entered into a field it will only be highlighted rather than highlighted and printed in \nConsolas font. \n\nMenu options are shown with the name of the top-level menu, followed by a > followed by the next level \ndown to the desired selection. For example, to indicate how to open the Individuals by class tab under the \nTabs section in the Window menu the following text would be used: Window>Tabs> Individuals by \nclass. \n\nWhen a word or phrase is emphasized, it is*shown in italics like this*. \n\nExercises are presented like this: \n\n**Exercise 1: Accomplish this**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Do this. \n\n2. Then do this. \n\n3. Then do this. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nPotential pitfalls and warnings are presented like this. \n\n\nTips and suggestions related to using Protégé are presented like this. \n\n\nExplanations as to what things mean are presented like this. \n\n\nGeneral notes are presented like this. \n\n\nVocabulary explanations and alternative names are presented like this.", + "page_start": 5, + "page_end": 5, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**SELECTING COLUMNS**\n\nIf you want to make changes to an***entire***\n***column***, such as bolding all of the headings in a \ncolumn or changing the font of all the cell entries, \nyou must first select the column. This is done by \n\n\n\n\nclicking on the column header directly above the \ncolumn. Remember that any changes you make \nwill apply to every cell in the column all the way \ndown to row 1,048,576! \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\ncolumn***B***to select it \n\n\n and click on the \n**6**\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*file with this exercise, or open*\n*the file E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \n to make \ncell***A1***the active cell \n\ncolumn heading for column***B***\n\n*Notice that the mouse pointer*\n*changes to a black arrow*\n*pointing down the column…*\n\n Click once to select the column \n\n*This time the row headers*\n*change to orange to indicate*\n*that at least one cell (but not*\n*all) in each row is selected…*\n\n Click in cell***D6***and press \n+ \n\n*This key combination also*\n*selects an entire column…*\n\n Click on the column header for \n Hold down column header for column***D***\n\n*This time, columns B, C, and D*\n*are all selected…*\n\n Click in the column header for \n\ncolumn***A***, then hold down the \nleft mouse button and drag the \nmouse pointer across the \ncolumn headings to column***E***\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Make sure that you check your worksheet \n\ncarefully after you’ve made changes to entire \ncolumns. Remember that all of the cells in \nthat column are affected – even those in \nrows below the visible area.", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**CHANGING FONT SIZE**\n\nOne way that text can be emphasised is by \nchanging the***size***of the font. For example, if \nyour normal text is 11 pt, you may like to make \nthe headings 13 pt or larger. Font size may also \n\n\n\n\nbe changed for small detailed items, such as \ncomments or a caption. Main headings in a \nworksheet usually appear in a slightly larger font \nsize compared to the rest of the data. \n\n\n\n\n\n\n**8**\n\n\n\n\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E722 Font*\n*Formatting_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A1***to make the \ncell with the main heading the \nactive cell \n\n Click on the drop arrow next to \nthe***Font Size***command \n\n in the***Font***group on \n\nthe***Home***tab to display a \ngallery of available sizes \n\n Point to various sizes and \n\nnotice how***Live Preview***\nshows you how the heading \nwill look \n\n Click on***16***to change the \n\n*You can also change the font*\n*size of parts of a document,*\n*and you can use the Mini*\n*toolbar...*\n\n Click in cell***A2***\n Click with the right-mouse \nbutton to display the mini- \ntoolbar and the shortcut menu \n\n Click on the drop arrow next to \n\n***Font Size***\nclick on***14***\n\n and \n\n Click in cell***A3***to hide the \n\n\n\nheading to***16***pt \n\n\n\ntoolbar \n\n\n\n**Handy to Know…**\n You may have noticed that the text didn’t \n\nchange size when you used the mini toolbar \nuntil you actually clicked on a different font \nsize. This is because***Live Preview***doesn’t \nwork with the mini toolbar. \n\n**For Your Reference…**\nTo***change font size***: \n\n1. Select the cell or range that you want to \nchange \n\n\n2. Click on the drop arrow of***Font Size***\n\n3. Click on the required font size", + "page_start": 22, + "page_end": 22, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**CHANGING FONTS**\n\nThe appearance that you choose for your text is \nreferred to as the***font***or***typeface***. Font \ntraditionally refers to a combination of typeface, \nstyle and size in points (e.g. Arial Bold 12 pt). \n\n\n\n\nIn Excel 2007,***font***just refers to the typeface or \nshape of the letters. Typical classic fonts include \nTimes New Roman, Arial, Century Gothic and \n**Copperplate**. \n\n\n\n\n\n **4**\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E722 Font*\n*Formatting_1.xls...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A1***to make the \ncell with the main heading the \nactive cell \n\n Click on the drop arrow next to \n\nthe***Font***command \n in \nthe***Font***group on the***Home***\ntab to display a gallery of \navailable fonts \n\n Point to**Arial Narrow**, then**Book**\n**Antiqua**,**Garamond**and**Gill**\n**Sans MT**\n\n*If you don’t have these fonts,*\n*try different ones. As you point*\n*to each font, the preview will*\n*change...*\n\n Scroll to and click on Comics \n\nSans MS, or another font of \nyour choice if you don’t have \nthis one \n\n*This time the font formatting*\n*has changed in the cell and is*\n*no longer just a preview – it*\n*won’t change again unless you*\n*make another font selection.*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***apply font formatting***: \n\n1. Select the text \n\n 2. Click on the drop arrow for***Font***\n\n3. Point to a font to preview it \n4. Click on the font to apply it", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n To apply the same colour to two or more \n\nsheets at once, select them first. Hold down \n to select consecutive worksheets or \n to select non-consecutive \n\n\nhold down \nworksheets. \n\n**For Your Reference…**\nTo***change the colour***of a***worksheet tab***: \n\n1. Right-click on the worksheet tab to display \nthe shortcut menu \n\n2. Point to***Tab colour***to display a palette of \ncolour options \n\n3. Click on the desired colour", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the advise to make the style sets and themes work well ? ", + "target_page": 6, + "target_passage": "They work best when your document is formatted with styles", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Style sets and themes let you completely change the look of your document in an instant. They \nwork best when your document is formatted with styles (so it’s good that we fixed that Heading \nstyle, above). \n\nTry it: Explore style sets and themes: \n\n1. On the Design tab, select Themes, and choose a theme from the drop-down. \nNotice that the gallery of style sets updates to reflect the theme you picked. \n\n2. Select any theme you like from the drop-down and click to apply.", + "page_start": 5, + "page_end": 5, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "To make a good summary, you need to: \n\n\n \n \n \n \n [html]\n
Keep it brief.
Make sure to use main headings and keywords.
Focus on the main ideas.
Classify and organise the information in a logical manner.
Use your own words where possible.
Include examples.
Remember that your summaries are there to help you.
", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Make magic: use Heading styles \n\nThe heading for this part (“Make magic: use Heading styles”) looks the same as the other \nheadings in this document, but it’s not as useful. It’s formatted with font settings (font, size, and \ncolor), while the other headings are formatted with a Heading style (Heading 1, to be exact). \n\nSee the little triangle when you mouse over those other \nheadings? \n\nYou can collapse and expand everything under a heading, like an \noutline. But this one’s not working. Let’s fix it. \n\n\n\nTry it: Apply the Heading 1 style: \n\n1. Put your cursor somewhere in the heading above (“Make magic: use Heading styles”) – \n\ndon’t select anything. \n\n2. On the Home tab, find Styles, and select Heading 1 (keyboard shortcut Ctrl+Alt+1). \n\nTa-da! Now it looks like a heading, and acts like one too.", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "***Style 9***\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_9.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it \n\n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to see a \ngallery of style options, \nas shown \n\n Scroll through the \n\ngallery and point to \neach style to see how \nyour chart will look in \nLive Preview \n\n Scroll to and click on \n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to close the \ngallery \n\n Click on the***Chart Data***\nworksheet tab \n\n\n\n\n\n\n\n**Handy to Know…**\n \n\nInstead of using the***Chart Styles***tool to the \nright of the chart, you can also choose chart \nstyles from the***CHART TOOLS: DESIGN***\ntab on the ribbon when a chart is selected. \n\n**For Your Reference…**\nTo***change***the***chart style***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***Chart Styles***tool to the right of \nthe chart \n\n3. Click on the desired style", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Tasks:**\n\n*Before starting this exercise you MUST have completed all of the topics in*\n*the chapter Font Formatting…*\n\n Open the workbook called***PE_Font Formatting.xlsx***(it can be found in \n Format the heading in cell***A1***as***Cambria***,***36 pt***,***bold***,***Orange Accent 2***\n Format the other headings as bold, italic or underline as shown on the \n Use***Orange, Accent 2, Lighter 80%***to fill the area behind the headings \n Add the superscript 1 in cell***H3***and in cell***B27***with the following comment \n\nthe same folder as the student files) \n\nfollowing page \n\nas shown on the following page \n\n**1 Fee may be reduced as the result of Government Assistance**\n\n*Your completed worksheet should appear as shown on the following*\n*page...*\n\n Use the***Save As***command to save the workbook as***PE_Font Formatting***\n***(Completed).xlsx***\n\n\n\n\n\n\n \n \n \n \n [html]Reservations for January 2009Error, per, Child, per, Dencb\n
$ 33.00
Age Group5DateDay547 - 899 - 1213 - 14 [Total
Fees6.6 / 01 / 2014Monday101415847
$ 1.351.007.7 / 01 / 2014Tuesday9.14.12.7 |42
$ 1.386.0088 / 01 / 2014Wednesday11.1513847
$ 1.351.0099 / 01 / 2014Thursday1216121050
$ 1.650.001010 / 01 / 2014Friday1115151253
$ 1.749.00111213 / 01 / 2014Monday13182014 ]
67$ 2.211.0013.14 / 01 / 2014Tuesday14.1917.12 ]
62$ 2.046.00 ]1415 / 01 / 2014Wednesday16201813 ]
67$ 2.211.001516 / 01 / 2014Thursday17171725
66$ 2.178.001617 / 01 / 2014Friday26202017 |
73$ 2.409.00171820 / 01 / 2014Mondey162020
1369$ 2.277.0019.21 / 01 / 2014Tuesday14.1817.
1261$ 2.013.002022 / 01 / 2014Wednesday162018
14 ]68$ 2.244.002123 / 01 / 2014Thursday181917
1569$ 2.277.002224 / 01 / 2014Friday172020
17 |74$ 2.442.002324Total Children819792
n30$ 11.253.002326273 Fee may be reduced as the result of Government Assistance28
", + "page_start": 26, + "page_end": 26, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Compose**\n\n**Tip**Going into format mode will \nprevent your message from sending \nwhen you hit [Enter], so it's a great \nway to draft and preview messages \nbefore sending them. \n\nHi @Daichi. Can you coordinate a time to meet with \n\n**Format**your messages, add bullet points, \ncharts or hyperlinks. \n\nChristie to talk coverage on Brandhaus while Alex is out**next week?**\n\n**Mark as important**to call attention to specific messages.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet \n\n\n\n\n\n\n\n**Handy to Know…**\n***Chart layouts***are predefined themes \n\ncreated by Microsoft. Even if you choose one \nof these layouts you can still make your own \nmodifications to the way the elements and \nobjects are positioned and how they appear. \n\n**For Your Reference…**\nTo***change***the***chart layout***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Quick Layout***in the***Chart***\n***Layouts***group \n\n3. Select the desired layout", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
# wget https :// d1. goog1e. can / go / goL. 12.9. 11nux - ppc641e. tar. gz
# tar - C / usr / 1ocal - xzf gol. 12.9. 11nux - ppc641e.
#### Step 3. Conf1gure Environment #### Md1r −/− go
###† The go b1nary, so we can actual ly run 1t ####
FFFFFTh1s : 15 where a11 your go packages 11ve # HFH # G0PATH +/ root / _go ; exprt : 00PATIN
HHH4HF Rdd GOPATH / b1n so comp11ed go 11bs appear on your PATH HHH export : PATH - SIG0PATK / b1n ;
", + "page_start": 123, + "page_end": 123, + "source_file": "sg248459.pdf" + }, + { + "text": "**STYLE ON YOUR SCHEDULE**TO HELP BUSY GUYS LOOK \nTHEIR BEST, TRUNK CLUB STYLISTS SEND CUSTOMERS \nCLOTHES BASED ON THEIR PREFERENCES AND NEEDS. \nTHEY KEEP WHAT THEY LIKE AND SEND BACK THE REST. \nAT TRUNK CLUB SHOWROOMS, CUSTOMERS CAN \nMEET STYLISTS FOR AN IN-PERSON FITTING. \n\n\n\nWe are uniquely positioned to serve customers extremely pleased with the efforts of our team. \n\nthrough full-price, off-price, stores and online. Their successful planning, preparation and \n\nEach offers a way for customers to shop with navigation of many complex issues for several \n\n\n \n \n \n \n [html]locations, and vstematic\n
up, anti - to - to - to - to - to - to - to - to - to - to - the - to - specific - to - theStatistics
growth opportunity. The real success lics inIts only one m2
how our business works together to betterIof to learn abov
serve customers and help us attract and retaincontinue learni
ctastomers, now and in the future. We see aexpand Rirther.
meaningful opportunity in this synergy througha store in Uttaw
a focus on service, product and capabilities.another in Vane
FULL - PRICE1 NORDSTROM, NORDSTROM. COM
AND TRUNK CLUB201 + marked an important milestone in
cultural
our company ’ s history as we opened our
In 2014, we alsofirst international store in Calgary, Alberta,
United States aCanada. We were humbled as more than
The Woodland :2.000 customers welcomed us when we
Center in Jacksopened our doors. In the first six months,
stores and thoswe outperformed our expectations and are
new store desig
", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Great, high-quality design creates better work environments communication products. All of our products respond com- \n\nand happier end-users. Whether we’re building lateral files (the pletely to the needs of end-users because that’s where the \n\nfirst product for which we became known) or designing award- design process starts. \n\n\n \n \n \n \n [html]\n
Steel core messageControl (%), duration
Comparison of workplace
1 desking systems,Number of counter point to
Nursiture. WorkingArget the contract
gn - oriented officeStyping allows for
ction of our agile,Products are, design
Consistent and controls along the way to
σ chair, are icono -Post - study and are quite
• two newest enter -Sens line providing
SetTM — an incred -Parameters, and
", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "Where are the peaks of the VHE blazars ?", + "target_page": 1, + "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the ��rst year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "VERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. \n\n1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "What are the blazars observed in the discovery program ?", + "target_page": 2, + "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", + "target_page": 3, + "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "VERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. \n\n1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "For which language have been introduced the ActiveInference.jl library ?", + "target_page": 1, + "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**\n\n1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. \n\n**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 \n\n**MSC:**91-08 \n\n\n \n \n \n \n [html]\n
Citation : Nehrer, S. W.; EhrenreichTable
Laursen, J,; Heins, C.; Friston, K ;Mathys, C.; Thestrup Waade, P.
Introducing Active Inference. j1 : AJulia Library for Simulation and
Parameter Estimation with ActiveInference Models. Entropy 2025.27.62.
https :// doi. org / 10.3390 / e27010062Copyright : © 2025 by the authors.
Licensee MDPI, Basel, Switzerland.This article is an open access article
distributed under the terms andconditions of the Creative Commons
Attribution ( CC BY ) license( https :// creativecommons. org /
licenses / by / 4.0 /).
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Julia uses its “just-in-time” (JIT) compilations via the LLVM framework to approach the \nspeed of languages like C without relying on external compilers [36]. Julia is also natively \nauto-differentiable, which means it can solve what is called the two-language problem \n(i.e., that high-level languages often have to rely on lower-level languages, either for \nperformance or for auto-differentiability; this is the case with standard tools for cognitive \nmodelling, where languages like R [37] must rely on external languages like STAN [38] for \nBayesian model fitting). This means that ActiveInference, in conjunction with Turing [39], \nJulia’s powerful library for Bayesian model fitting, and its newly developed extension for \nbehavioural modelling, ActionModels, makes it possible to use cutting-edge Markov Chain \nMonte Carlo [40] methods, as well as variational methods [35], for Bayesian model fitting \nwith AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming \nlanguage, but to also fit them to empirical behaviour, as is performed in cognitive modelling \nand computational psychiatry. Importantly, this also places AIF models in an ecosystem \nof other models for computational psychiatry so that it can easily be compared with \nmodels, like Hierarchical Gaussian Filters [41], and reinforcement learning models, like the \nclassic Rescorla–Wagner model [42]. As part of making ActiveInference.jl available to the \nscientific community, and to the larger software ecosystem within computational psychiatry, \nit is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science \n(TAPAS) ecosystem [43]. \n\nIn the next section, we provide a conceptual and formal introduction to AIF, particu- \nlarly in the context of using POMDP generative models. In Section 3, we demonstrate how \nto use the package in practice, both for simulation and parameter estimation. In Section 4, \nwe give a fully worked example of how ActiveInference can be used with a concrete \nsimulated dataset. Finally, we discuss potential applications and future directions for \ndeveloping the package.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In this section, we outline how to use \nparameter recovery and predictive checks. \nActiveInference for simulation and model fitting in conjunction with ActionModels. In the \nfollowing section, we show how to achieve this on a concrete worked example. \n\n**4. Usage Example**\n\nIn this section, we demonstrate a full usage example of how to create an AIF agent, sim- \nulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated exam- \nple dataset. We provide the necessary code to run this simulation. All code required to repro- \nduce the example simulation can be found in an open source OSF repository osf.io/j3k5q/. \nThis example was performed with the current version of ActiveInference.jl (0.1.1); the \nnewest version can be found at github.com/ilabcode/ActiveInference.jl. \n\n4.1. Setting Up Environment and Agent \n\nA T-maze is a simple task commonly employed in the behavioural sciences, as well \nas in the AIF literature [14,54–57]. It is a minimal type of task that requires balancing \nexploration and exploitation, or epistemic and pragmatic value, respectively. It is also \nsuitably represents in a discrete state space. Together, this makes it easily compatible with \na POMDP-based AIF approach. \n\nThe structure of the T-maze is, as the name suggests, a T-shaped maze, consisting \nof a centre location, a cue location (bottom of the T), and reward and loss locations (one \nin each arm of the T) (Figure 2). On every trial, the agent can move to one of the two \narms of the T to receive a reward; one, called the reward location, will yield rewards with \na higher probability than the other side. At the cue location, which the agent can move \nto, the agent receives a cue that indicates which of the locations is the reward location. \nGenerally, the cue may be more or less informative; in this example, it always accurately \nreflected the reward conditions state (reward in the right or left arm). The reward location \nonly provides a reward probabilistically. This means the agent can either take a chance \nand go directly to one of the two upper arms, or spend its first move seeking information \nabout where the reward is before moving to the reward location. Since the clue location \nis not preferred, the second option comes with a cost in terms of pragmatic value, which \nhas to be outweighed by the epistemic value in resolving uncertainty about the reward \nlocation state. Note that for the agent to realise that this uncertainty reduction will aid it in \nits subsequent choice of arm, it would have to be able to anticipate the effect of its actions \non its own future beliefs, a process called “sophisticated inference” [58]. \n\n\n\n**Figure 2.**A depiction of the T-maze. (**A**) The full layout of the T-maze task, with the centre location, \nthe cue location and the two reward conditions. (**B**) A three-step example of a T-maze trial. The agent \n(in this case, a mouse) starts at the centre location. In order to reduce the uncertainty regarding which \narm the reward is located in, the agent moves to the cue location. The cue location reveals the right \narm to be the reward location, and in the subsequent time step, it goes to the right arm and observes \nthe reward with some probability.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**9.2.1 Overview**\n\nBefore version 8.5.0.0, the ODWEK Java APIs provided a tight integration with only a few \nspecific transforms: AFP2PDF, AFP2HTML, and AFP2XML. These transform engines were \nused by ODWEK clients to generate different document types for display purposes. Although \nthis capability provided invaluable functionality, it meant that new transform engines were not \nreadily integrated into ODWEK. \n\nTo meet this requirement, a highly flexible interface was added to the ODWEK Java APIs that \nallows a developer to easily implement a third-party document transform solution. \n\nThe new ODWEK Interface allows a client developer to implement an external program to \ntransform a document in one of two ways: \n\n(cid:2) If the transform vendor provides a basic command-line executable file, it is implemented in \nan XML interface, which supports the retrieval of all of the document details that are stored \nin Content Manager OnDemand, and also allows specific options to be passed to the \ntransform. \n\n(cid:2) The ODWEK Java APIs also provide a Java interface that a client developer can use to \n\nadd even more flexibility to their client solution. The Java interface allows a client \ndeveloper to get the document byte stream from ODWEK, then use any methods that they \nwant to convert the document. These methods can include calls to web services that allow \nremote transformation. After the document is transformed, the resulting data can be \nreturned to ODWEK, where it is passed back to the client that made the request. \n\n**9.2.2 Configuration**\n\nTo enable the Generic Transform Interface in ODWEK, an XML document must be created \nand defined in the ODConfig.Properties object. This XML document is identified by the \n key name and must include the fully qualified path to the XML file \nwhere the transforms are defined. \n\n\n \n \n \n \n [html]\n
functionality in your ODWEK environment, as shown in Example 9 - 1. Example 8 - 1 : Enabling Generic Transform Interface in the ODWEK environinr
Propert1es props : - new Propert1ess [ 1, props. set? Hoperty [ 00corf1p, TRMEF00R5_89L, * cransform. anh1 *]; - * Ya11y qua11 if ' ed path to 98L f11e containing transform deta11s. \"/\"
000conf1g adConf1g + new ODCon11g ( 000constant, PLIG1R, // AfpX - ewerna11a, APPLT1, // L teel1ewerna11, // Meta1lever * 10.1 / PhosH t5
", + "page_start": 233, + "page_end": 233, + "source_file": "sg246915.pdf" + }, + { + "text": "**Summary of changes**\n\nThis section describes the technical changes made in this edition of the book and in previous \neditions. This edition might also include minor corrections and editorial changes that are not \nidentified. \n\nSummary of Changes \nfor SG24-7938-07 \nfor Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1 \nas created or updated on November 7, 2019. \n\n\n \n \n \n \n [html]\n
• Hot Spare node • RAS line items
Changed information
• Added new GUI windows throughout
Table
", + "page_start": 20, + "page_end": 20, + "source_file": "sg247938.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. \n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode \n\n1.2 Conventions \nClass, property, rule, and individual names are written in Consolas font like this. The term used for \nany such construct in Protégé and in this document is an*Entity*. Individuals and classes can also be \nreferred to as objects. \n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this. \n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something \nthat you should or optionally could view or enter into the user interface. If you ever aren’t sure what to \ndo to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you \nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the \n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableTableTable
TableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "?customer ?relation ?relatedToCustomer.} \n\nThis would be much less intuitive than the user defined names. There are good reasons to use auto- \ngenerated names, especially for large ontologies that are implemented in multiple natural languages. \nHowever, for new users, especially those who plan to use SPARQL and SHACL, I think it is more \nintuitive to start with user supplied names and then progress to auto-generated names if and when the \nrequirements show a true need for them. This approach to developing software incrementally rather than \nto attempt to design the perfect system that can scale for all possible future requirements is known as the \nAgile approach to software development. In my experience Agile methods have proven themselves in \ncountless real-world projects to deliver better software on time and on budget than the alternative \nwaterfall approach. For more on Agile methods see: https://www.agilealliance.org/agile101/ \n\nThis just gives you a basic overview of some of the things that can be done with SPARQL. There is a lot \nmore and if you are interested you should check out DuCharme’s book or some of the many SPARQL \ntools and tutorials on the web. Some of these are in the bibliography. \n\nOne final point: features of OWL and SWRL that new users frequently find frustrating are the Open \nWorld Assumption (OWA) and lack of non-monotonic reasoning. The OWA was discussed in chapter \n4.13. Non-monotonic reasoning will be discussed in section 11.1. For now, though remember that \nSPARQL is*not*subject to*either*of these restrictions. With SPARQL one can do non-monotonic \nreasoning and leverage the more common Closed World Assumption (CWA). E.g., one can test if the \nvalue for a property on a specific instance exists or not and can take actions if that property does not exist.", + "page_start": 71, + "page_end": 71, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Exercise 3: Add a Comment Annotation to Your Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology \nVersion IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create \na new annotation on the ontology. \n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then \ntype a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain. \n\n3. Click OK. Your Active Ontology tab should like Figure 4.3. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n\nAdd Subclass \n\nAdd Sibling Class \n\n\n\n\nDelete Class \n\n\n\n4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. \n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the \nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or \nto create them as independent tabs. \n\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, \nXuyi Chen, Han Zhang, Xin Tian, Danxiang \nZhu, Hao Tian, and Hua Wu. 2019b. ERNIE: \nEnhanced Representation through Knowledge \nIntegration. arXiv:1904.09223 [cs]. James Yi Tian, Alexander P Kreuzer, Pai-Hung \nChen, and Hans-Martin Will. 2019. WaL- \nDORf: Wasteless Language-model Distillation", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Neumann, Bernd; Möller, Ralf (January 2008). \"On scene interpretation with description logics\". \n*Image and Vision Computing*.**26**(1): 82–101. doi:10.1016/j.imavis.2007.08.013 (https://doi. \norg/10.1016%2Fj.imavis.2007.08.013). S2CID 10767011 (https://api.semanticscholar.org/Co \nrpusID:10767011). \n\nNilsson, Nils (1995), \"Eyes on the Prize\",*AI Magazine*, vol. 16, pp. 9–17", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "To which system does the AIF apply ?", + "target_page": 2, + "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(cid:7) \n# Create AIF object \n\naif = init_aif ( \n\nA:: Vector { Array {T, N}}, \nB:: Vector { Array {T, N}}; \nC:: Vector { Array { Real }}, \nD:: Vector { Vector { Real }}, \nE:: Vector {T}, \npA :: Union { Vector { Array {T , N} }, Nothing }, # Dirichlet priors for A - matrices ( optional ) \npB :: Union { Vector { Array {T , N} }, Nothing }, # Dirichlet priors for B - matrices ( optional ) \npD :: Union { Vector { Array { Real } }, Nothing }, # Dirichlet priors for D - vectors \n( optional ) \nparameters :: Dict { String , Real }, # Dictionary containing other parameters ( optional ) \nsettings :: Dict { String , Any } \n) \n\n# A - matrices \n# B - matrices \n# C - matrices ( optional ) \n# D - matrices ( optional ) \n( optional ) \n# E - vector \n\n(cid:6) (cid:5) \n\n**A**and**B**are the only mandatory arguments to the init_aif function—the other arguments \nare keyword arguments that default to uniform priors.**A**,**B**,**C**,**D**and**E**and their corre- \nsponding Dirichlet priors, in the cases of**A**,**B**and**D**, should be formatted as standard \narray objects. All but**E**can have multiple modalities/factors (see Section 4), so they should \nbe formatted as vectors of arrays with one array per modality/factor. These arrays can be \nhand-specified by the user, or be generated with some of the helper functions supplied by \nActiveInference. Here, we create an AIF agent equipped with a generative model with \nsix environmental states, five possible observations and two possible actions. Here, we use \nhelper functions to create matrices and vectors with the correct dimensions; in Section 4, we \ncreate them manually. First, we define the number of states, observations, controls and the \nlength of policies: \n(cid:7) (cid:4) \n\n# Information about number of states , observations , actions and policy length \nstates \nobservations = [5] # Five observations , single modality \ncontrols \npolicy_length = 1 \n\n= [6] # Six states , single factor \n\n= [2] # Two actions , single factor \n# Length of policies \n\n# Generate uniform templates for matrices and vectors of the generative model \nA, B, C, D, E = create_matrix_templates ( states , observations , controls , policy_length ) \n(cid:6) (cid:5) \n\nThe**A**object generated here is a one-dimensional vector containing a uniform 5 × 6 matrix \n(six states and five observations). The**B**object is a one-dimensional vector containing \na uniform 6 × 6 × 2 array (six states and two actions). The**C**,**D**and**E**objects are one- \ndimensional vectors, each containing uniform vectors with their corresponding sizes. We \ncan now modify these to supply the agent with more informative priors over observations, \ninitial states and policies. Here, we performed this using the onehot function: \n(cid:7) (cid:4) \n\n# We make C take the following form : [0 , 0 , 0, 0 , 1] \nC[1] = onehot (5,5) # Initialize the single element of the C object with a one - hot vector \n\n# D will be : [1 , 0, 0, 0 , 0, 0] \nD[1] = onehot (1,6) # Initialize the single element of the D object with a one - hot vector \n\n# To make the agent prefer policy 2 \nE = onehot (2,2) # Initialize as a one - hot encoded vector : [0 ,1] \n(cid:6) (cid:5) \n\nWe now create the Dirichlet priors for**A**,**B**and**D**. When we use parameter learning, these \nare used to define**A**,**B**and**D**defined above, and are updated at every time step. One \nway to construct Dirichlet priors is to simply multiply the matrices below with a scaling \nfactor; a higher scaling leads to more precise priors that require stronger evidence to update. \nHere, we use a scaling parameter of 2. In the current version, parameter learning is only \nimplemented for the**A**,**B**and**D**:", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**35. Australian Equivalents to International Financial Reporting Standards (continued)**", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
through : a comprehensive• FINANCIAL REPORTING −through
Environmental Health anda comprehensive budgetingexx
Safety Management Systemsystem exists with an annualbased on Australian Standard
budget approved by the Board.stz4801 and International
Monthly actual results arebuStandard 14001 ;
reported against budget and,deenvironmental and safety
where applicable, revisedCocommittees at Board and
forecasts for the year areinmanagement levels ; the
\n\n\n \n \n \n \n [html]\n
Intervention of compositive the patients and comparison of comparisons and comparisons and comparisons and comparisons. There with there with there with their patients with their patients with their patients with their patients wite• Presence of experiences and experiences and supports and supports and supports and supports and supports and supports and supports.• Supports and supports and compared to mental strategies and supports.• Supports and compared to merNo diseases, experience also being the patients and support the patients and the patients and their patients and their patients. There is and their patients with their patients and their patients with their patients and their patients anAnalysis of contained to provide and social and social and social and social and social and social and social and social and social and and anythesis and anythesis and anythesis of the anythesis and anythesis and anythesis of the patient anPatients with previously previously previously interventions and previously interventions and controlled interventions. There within there within therefore there with therefore their prevention of therefore their prevention of
Interactive contents with and compared to the patients with the patients with the patients with the patients with the patients to the patients to the patients to the patients to the patients to the patients to the patients to the patients th# extend any toxamic severe interventions with the patients with the patients and therefore their patients with their patients with their patients and their patients. There with their patients with their patients with their patients wi• Interventions • Interventions • Interventions • Interventions and there with the patients and avapoptions and therefore analysis of the following the following and therefore analysis of the following and the following and the follop
", + "page_start": 34, + "page_end": 34, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "font-size: 10px;\n }\n \n \n \n [html]( a ) the rights to tenure of the area of interest are current ; and", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n\n \n \n \n
35. Australian Equivalents to International Financial Reporting Standards ( continued )Deferred tax assets and liabilities
Selferred toas assets and failsfittles will generally be lased on the differences between the accounting and tax basis of assets and liabilities under the “ balance sheet ” approach which will result in the recognition of additional defoDefined benefit superannuation surplus and deficits
Serfined benefit superariouslion plan surpluses and deficits will be recognised in the statement of froncial position and the changes in these values section prind will be recognised either directly in the statement of francial perforRestoration liabilities
Restraration failsfitties will be discounted to present value and capitalised as a component part of caphalised explaintion and development expenditue and property, plat and engagement. The supplicied cased to be amonities over therFunctional currency
The majority of the controlled entities within the Sarios Source, that have periplex operations in framigr juritafictions will howe the IS didar as their facetoral currency. The first time application of A - FRS wills result in the net astEquity - based payments
Under A - DRS the cost of employee remuneration provided in the from of equity - based remuneration ( including shares and options ) will be measured based on the for value of those instruments and amortised to the profit and loss over the vestExploration and evaluation expenditure
There is no litterational frastrict life porticipation ( TRT ) within comprehensively deads with the accounting and reporting toures perforch is the estactive initiative, bit the absence of such as midsty - based STRL comparison, spentPrescription of a competencive project on accounting for extractive inductive, AMSA Toperation for and fundarition of Meness Breassescribed was local to Stronder ( 06 ho focilitate the introduction of AISS in expect of the treatment of
( b ) at least one of the following conditions is also met :
( i ) the explanation and evaluation expenditures are expected to be recruped through successful development and explaintation of the area of interest, or alternatively, by its sale ; or
( ii ) exploration and evaluation activities in the area of inferest have not at the reporting date eached a stage which permits a reasonable assessment of the existence or otherwise of economically recoverable reserves, and active and si
The UASB decided that the effective date of 3 RRS 6 to be 1. January 2006 to allow affected componies more time to make the transition to DRS. Despite the lateness of the issuence of the Australian equivalent accounting standard AASB I, Santo
Santas is currently evaluating this accounting standard and its accounting policy for exploration and evaluation expenditure. At the date of this report, roo decision has been made as to how the Santas Group will account for exploratiou
Impairment
Techniq of non - cometic aure, for inspirament will be undertake on the ondolog structing of sustra presenting cash flows, salid cash generating units, filleness for experience them is an indication for a case generatrity unit is requiri
The AABB and LKBI twe significant snoping projects including a comprehensive “ Sotactive Snductive Smokpect that could affect the differences between current Australian SAAP and A - DRS as described above and could further irrepact the
\n [html]\n
< underline > NOT TE 1 - STATEMENT OF SIGNIFICANT ACCOUNTING POLICIES co
u )Adoption of New and Revised Accounting Standards
\n\nDuring the current reporting period the Group adopted all of the new and revised Australian Accounting Standards \nand Interpretations applicable to its operations which became mandatory. The nature and effect of selected new \nstandards and amendments on the Group’s consolidated financial report are described below. Adoption of the other \nnew mandatorily applicable standards did not have a material impact on the financial statement, financial position \nor performance of the Group. \n\n**AASB 2011-4 -*Amendments to Australian Accounting Standards to Remove Individual Key Management Personnel***\n***Disclosure***\nThis standard removes the requirements to include individual key management personnel disclosures in the notes \nto and forming part of the Financial Report. This standard also removes the individual KMP disclosure requirements \nfor all disclosing entities in relation to equity holdings, loans and other related party transactions. \n\n**Amendments to IAS 32 -*Offsetting Financial Assets and Financial Liabilities***\nThe amendments to IAS 32 clarify the requirements relating to the offset of financial assets and financial liabilities. \nSpecifically, the amendments clarify the meaning of ‘currently has a legally enforceable right of set-off’ and \n‘simultaneous realization and settlement’. As the Group does not have any financial assets and financial liabilities \nthat qualify for offset, the application of the amendments has had no impact on the disclosure or the Group’s \nconsolidated financial statements. \n\n**Recently issued accounting standards to be applied in future reporting periods:**\nThe following Standards and Interpretations have been issued but are not yet effective. These are the standards that \nthe Group reasonably expects will have an impact on its disclosures, financial position or performance with applied \nat a future date. The Group’s assessment of the impact of these new standards, amendments to standards, and \ninterpretations is set out below. \n\n**AASB 9/IFRS 9 –*Financial Instruments***\nAASB 9/IFRS 9 introduces new requirements for the classification, measurement, and derecognition of financial \nassets and financial liabilities. The final version of IFRS 9 supersedes all previous versions of the standard. However, \nfor annual periods beginning before 1 January 2018, an entity may elect to apply those earlier versions of IFRS 9 if \nthe entity’s relevant date of initial application is before 1 February 2015. The effective date of this standard is for \nfiscal years beginning on or after 1 January 2018. Management is currently assessing the impact of the new standard \nbut it is not expected to have a material impact on the Group’s consolidated financial statements.", + "page_start": 72, + "page_end": 72, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n**NOTE 1 - STATEMENT OF SIGNIFICANT ACCOUNTING POLICIES continued**\n\nDeferred tax assets and liabilities are ascertained based on temporary differences arising between the tax bases of \nassets and liabilities and their carrying amounts in the financial statements. Deferred tax assets also result where \namounts have been fully expensed but future tax deductions are available. No deferred income tax will be recognised \nfrom the initial recognition of an asset or liability, excluding a business combination, where there is no effect on \naccounting or taxable profit or loss. \n\nDeferred tax assets and liabilities are calculated at the tax rates that are expected to apply to the period when the \nasset recognised or the liability is settled, based on tax rates enacted or substantively enacted at the reporting date. \nTheir measurement also reflects the manner in which management expects to recover or settle the carrying amount \nof the related asset or liability. \n\nDeferred tax assets relating to temporary differences and unused tax losses are recognised only to the extent that it \nis probable that future taxable profit will be available against which the benefits of the deferred tax asset can be \nutilized. Where temporary differences exist in relation to investments in subsidiaries, branches, associates, and joint \nventures, deferred tax assets and liabilities are not recognised where the timing of the reversal of the temporary \ndifference can be controlled and it is not probable that the reversal will occur in the foreseeable future. \n\nCurrent tax assets and liabilities are offset where a legally enforceable right of set-off exists and it is intended that \nnet settlement or simultaneous realisation and settlement of the respective asset and liability will occur. Deferred \ntax assets and liabilities are offset where a legally enforceable right of set-off exists, the deferred tax assets and \nliabilities relate to income taxes levied by the same taxation authority on either the same taxable entity or different \ntaxable entities where it is intended that net settlement or simultaneous realisation and settlement of the respective \nasset and liability will occur in future periods in which significant amounts of deferred tax assets or liabilities are \nexpected to be recovered or settled. \n\n*Tax Consolidation*\nSundance Energy Australia Limited and its wholly-owned Australian controlled entities have agreed to implement \nthe income tax consolidation regime, with Sundance Energy Australia Limited being the head company of the newly \nconsolidated group. Under this regime the group entities will be taxed as a single taxpayer. Whilst this choice is yet \nto be communicated to the Australian Taxation Office, it is intended to be communicated prior to lodgement of the \n31 December 2014 income tax return and will be effective from 1 January 2014. Sundance Energy Australia Limited \nand its wholly-owned Australian controlled entities intend to enter into a Tax Sharing Agreement and Tax Funding \nAgreement in due course. \n\nThe head entity of the income tax consolidated group and the controlled entities in the tax consolidated group \naccount for their own current and deferred tax amounts. These tax amounts are measured as if each entity in the \ntax consolidated group continues to be a standalone taxpayer in its own right. \n\nIn addition to its own current and deferred tax amounts, Sundance Energy Australia Limited, as head company, also \nrecognises the current tax liabilities (or assets) and the deferred tax assets arising from unused tax losses and unused \ntax credits assumed from controlled entities in the tax consolidated group.", + "page_start": 61, + "page_end": 61, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "generative models, or even (deep learning-based) amortised inference models. These vari- \nous extensions could provide valuable tools for using AIF models in both theoretical and \napplied research. \n\n**Author Contributions:**Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and \nP.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing—original draft \npreparation, S.W.N. and J.E.L.; writing—review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, \nS.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and \nagreed to the published version of this manuscript. \n\n**Funding:**C.M. acknowledges funding from Aarhus Universitets Forskningsfonds (grant no. AUFF- \nE-2019-7-10) and from the Carlsberg Foundation (grant no. CF21-0439). \n\n**Institutional Review Board Statement:**Not applicable. \n\n**Informed Consent Statement:**Not applicable. \n\n**Data Availability Statement:**The original data presented in this study are openly available in \nActiveInferenceJuliaPaper at URL: https://osf.io/j3k5q/. \n\n**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\n\n \n \n \n \n [html]\n
AIFActive inference
FEPFree energy principle
VFEVariational free energy
EFEExpected free energy
MCMCMarkov Chain Monte Carlo
POMDPPartially Observed Markov Decision Proces
\n\nParr, T.; Pezzulo, G.; Friston, K.J. Active Inference: The Free Energy Principle in Mind, Brain, and Behavior; The MIT Press: Cambridge, \nMA, USA, 2022. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O’Doherty, J.; Pezzulo, G. Active inference and learning. Neurosci. \nBiobehav. Rev.**2016**, 68, 862–879. [CrossRef] \nFriston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. Neural Comput.**2017**, \n29, 1–49. [CrossRef] \nFriston, K.J.; Stephan, K.E. Free-energy and the brain. Synthese**2007**, 159, 417–458. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A unified brain theory? Nat. Rev. Neurosci.**2010**, 11, 127–138. [CrossRef] [PubMed] \nFriston, K. The free-energy principle: A rough guide to the brain? Trends Cogn. Sci.**2009**, 13, 293–301. [CrossRef] [PubMed] \nFriston, K. A free energy principle for a particular physics. arXiv**2019**, arXiv:1906.10184. [CrossRef] \nFriston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but \nnot too simple. Phys. Rep.**2023**, 1024, 1–29. [CrossRef] \nFriston, K.; Kiebel, S. Predictive coding under the free-energy principle. Philos. Trans. R. Soc. B Biol. Sci.**2009**, 364, 1211–1221. \n[CrossRef] [PubMed] \n\n**References**\n\n1. \n\n2. \n\n3. \n\n4. \n5. \n6. \n7. \n8. \n\n9. \n\n10. Karl, F. A Free Energy Principle for Biological Systems. Entropy**2012**, 14, 2100–2121. [CrossRef] \n11. Corcoran, A.W.; Pezzulo, G.; Hohwy, J. From allostatic agents to counterfactual cognisers: Active inference, biological regulation, \n\nand the origins of cognition. Biol. Philos.**2020**, 35, 32. [CrossRef] \n\n12. Heins, C.; Millidge, B.; Da Costa, L.; Mann, R.P.; Friston, K.J.; Couzin, I.D. Collective behavior from surprise minimization. Proc.", + "page_start": 29, + "page_end": 29, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**15. Interest-Bearing Liabilities (continued)**\n\n**(c) Medium-term notes**\n\nThe Santos Group has a A$500.0 million (2003: A$500.0 million) Australian medium-term note program. At 31 December 2004, A$20.0 million \n(2003: A$20.0 million) of medium-term notes have been issued at fixed rate and swapped into floating rates of interest of 6.25% (2003: 6.20%), \nmaturing in 2008. \n\n**(d) Long-term notes**\n\nUS$170.0 million of long-term notes were issued to institutional investors in 1993 at an annual effective interest rate of 6.95% and are \nrepayable in five annual US dollar instalments which commenced in December 2001. As at 31 December 2004, US$34.0 million (A$43.7 million) \nremains outstanding (2003: US$68.0 million equivalent to A$90.8 million). A further US$290.0 million (A$372.5 million) (2003: US$290.0 million \nequivalent to A$387.3 million) of long-term notes were issued to institutional investors in 2000 at an annual effective interest rate of 8.37% \nand are repayable at varying maturity dates between 2007 and 2015. In addition US$300.0 million (A$385.3 million) (2003: US$300.0 million \nequivalent to A$400.6 million) of long-term notes were issued to institutional investors in 2002 at an annual effective interest rate of 6.11% \nand are repayable at varying maturity dates between 2009 and 2022.", + "page_start": 62, + "page_end": 62, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
( u )
Income tax.
Tax effect accessiting is applied wheredity of the patients with any the patients with any the patients with the patients with the patients with the patients to the patients to the patients to the patients to the patients to the patients tour
Santos Ltd is the head entity in the tax - consolidated group comprising all the Australian resident wholly - owned controlled entities set out in note 22. The implementation date for the tax - consolidated group was 1 January 2003.The head entity recognises all of the current and deferred tax assets and liabilities of the tax - consolidated group.
The last - consultated group tax antened the last the patients with the patients with the patients with the patients with the brain the last the last the last the last the last the last the last they medical there waternal transactions scoren
", + "page_start": 56, + "page_end": 56, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "(cid:7) \naif_agent = init_aif ( \nA, B, C = C, D = D, E = E, pA = pA , settings = settings , parameters = parameters \n\n) \n(cid:6) (cid:5) \n\n4.2. Simulating Behaviour \n\nSince the environment and agent were set up, we could proceed to simulate the \nbehaviour of the agent in the environment. We created a for loop, where the agent received \nan observation, made inferences about the environment, updated**A**, inferred policies \nand sampled actions: \n(cid:7) (cid:4) \n\n# Run 1000 time steps \nT = 1000 \n\n# Sample initial observation \nobs = reset_TMaze !( Env ) \n\n# For loop over every time step \n**for**t = 1:T \n\n# Infer states based on the current observation \ninfer_states !( aif_agent , obs ) \n\n# Infer policies and calculate expected free energy \ninfer_policies !( aif_agent ) \n\n# Updating A. This is the learning part , \n# that includes the counting of the pA Dirichlet . \nupdate_parameters !( aif_agent ) \n\n# Sample an action based on the inferred policies \nchosen_action = sample_action !( aif_agent ) \n\n# Feed the action into the environment and get new observation . \nobs = step_TMaze !( Env , chosen_action ) \n\n**end**(cid:6) (cid:5) \n\nThe agent here started by moving to the cue location, and then proceeded to move to the \nleft arm repeatedly. The main objects of learning here were the reward condition state and \nthe**A**parameters for rewards under the two reward conditions. After observing the cue, \nthe agent updated its belief (correctly) to be certain of being in the left reward condition \n(Figure 4). Over time, the agent learned the correct probability of receiving rewards in the \nleft arm (0.94 versus a correct 0.95). It did not learn the probabilities for the right arm; this \nwas because it never moved to that location, having already learnt that the left arm was \nmore likely to produce rewards (Figure 5). This would be less likely to be the case with \nlower*γ*and*α*values, as well as a more entropic**C**.", + "page_start": 22, + "page_end": 22, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "What is the definition of POMDP ?", + "target_page": 4, + "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "A library of pre-made canonical POMDP models could be created so that users can eas- \nily implement them directly. Alternatives to the fixed-point iteration method for updating \nposteriors over environmental states could be included, like the marginal message passing \nalgorithm. There are various ways in which the package can be made more computationally \nefficient, and it could be compared with other software implementations. There are plenty \nof utility and plotting functions that could be added to the package to make it easier to \nuse and to facilitate integration with the model-fitting packages it relies on; for example, \nto allow for combining the models with linear regressions to compare parameters values \nof different populations in a single model. More complex types of POMDP models can \nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning \ncould be considered, where different model structures are compared and chosen between \nby evaluating their free energies. Sophisticated inference, where predictions are also made \nabout changes in one’s own beliefs—depending on expected action-dependent observations \nin the future—could also be implemented [58]. Finally, the package could be extended to \nother types of generative models than POMDPs, including other universal models, like \ngeneralised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom", + "page_start": 28, + "page_end": 28, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**Figure 1.**Depiction of a POMDP generative model. This encodes the agent’s expectations about how \nthe state s of the environment changes over time t, and how it generates observation o at each time step. \n**A**, also called the observation model, describes how environmental states give rise to observations.**B**, \nalso called the transition model, describes how environmental states change over time, depending on \naction u (called policy*π*when structured into sequences).**C**is the preference prior, which encodes \nthe agent’s preferences for observations. This shapes the expected free energy G associated with each \npolicy, which is used for policy selection.**D**encodes the agent’s prior belief over environmental states \nbefore making any observations, and**E**is the prior over policies that determines the agent’s preferences \nfor policies in the absence of other motivation. \n\n2.2. Perception in Active Inference \n\nIn AIF, perception is conceptualised as the result of variational (i.e., approximate) \nBayesian inference, performed by minimising the VFE to optimise parameters of poste- \nrior beliefs about the environment. In exact Bayesian inference, we use a parametrised \ngenerative model m to make an optimal inference about state s of the environment based \non observation o. This is performed by combining a prior belief over states p(s|m); a like- \nlihood model p(o|s, m); and the model evidence p(o|m), a normalisation term encoding \nthe likelihood of receiving the given observations across all possible environmental states, \nas follows [1]: \n\np(o|s, m)p(s|m) \np(o|m) \np(s|o, m) = (1) \n\nThe posterior distribution over states given observations p(s|o, m) here represent the agent’s \nbeliefs about the environment. Forming beliefs in this way is thought to be the process that \nenables conscious, as well as unconscious, perception. The product of the likelihood model \nand prior is also called the joint likelihood p(o, s|m), which fully defines the generative \nmodel, and which we use henceforth. In the following, for notational simplicity, we also \nomit denoting the dependency on the generative model m. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. \n\n2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration \nparameters*θ*: \n\np(Θ) = Dir(Θ|*θ*) (19) \n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count \nof how many times the given category (be it a type of observation or state transition) has \noccurred. The distribution of concentration parameter counts will determine the shape \nof the estimated categorical probability distribution, while the scale of the concentration \nparameters will determine the certainty per precision of the belief. Updating beliefs about \nΘ (the parameters in the matrices) then corresponds to updating these concentration \nparameters*θ*with the following update equation: \n\n*θ*t+1 =*ω*∗*θ*t +*η*∗*χ*t \n(20) \n\nThe updated value for the concentration parameter (*θ*t+1) is found by adding the previous \nconcentration parameter*θ*t multiplied by a forgetting rate*ω*to the observed data count \n*χ*(either the observation in the case of**A**learning, or the inferred state or state transition \nfor other matrices) multiplied by a learning rate*η*. With this relatively simple update \nequation—which, in essence, amounts to just counting the occurrences of categories—an \nAIF agent can update its beliefs about the various matrices it uses to make inferences about \nenvironmental states. For more details on parameter learning with POMDPs, see [23,33,52]. \n\n**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP \n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], \na Python library for implementing simulations of AIF in discrete state spaces. Those \nalready acquainted with pymdp should find the syntax here familiar. ActiveInference \ncan be installed as normal from the official Julia General Registry using the Julia’s native \npackage manager Pkg: \n(cid:7) (cid:4) \n\n**using**Pkg \nPkg . add ( ActiveInference ) \n(cid:6) (cid:5) \n\n\n \n \n \n \n [html]\n
It can then be loaded into the current project environment :
vsing ActiveInference
\n\n(cid:4) \n\n(cid:5) \n\nCentral to the package is the AIF object. This is a structure containing all the components of \nthe generative model, as well as the dynamic belief states and the various settings needed to \nperform AIF, and is used in conjunction with most of the high-level functions of the package. \nAn AIF object can be created with the init_aif function, which takes as arguments the \ncomponents of the generative model and a dictionary of various settings and parameters:", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Tools for simulating POMDP-AIF models were originally developed as part of the \nDEM [20] library for MATLAB [21] (part of the larger SPM library [22]). Since then, a \nmodal and flexible software package pymdp [23] was created for Python [24], as well as a \nperformance-oriented package cpp-AIF [25] for C++ [26] that can be used across platforms. \nFinally, the factor graph library RxInfer [27] for Julia [28] has also been used to implement \nsome AIF models on an efficient factor graph back-end [29–31]. The important tools \nthat these packages provide make AIF available for researchers to perform simulation \nstudies and for use in engineering contexts. They do not, however, usually allow for \nfitting models to empirically observed data, which is a fundamental method used in \ncognitive modelling [32], often in the context of computational psychiatry [13], to infer the \nmechanisms underlying variations in behaviour or to investigate the differences between \n(for example, clinical) populations. Smith and colleagues [33] provided a guide for manually \ndoing variational Bayesian parameter estimation based on empirical data, but only in \nMATLAB and restricted to a particular class of variational parameter estimation methods \n(variational Laplace), instead of the sampling-based methods that currently predominate in \nthe field of cognitive modelling [34,35]. \n\nIn this paper, we introduce ActiveInference.jl, a new software library for Julia [28] \nthat aims to provide easy-to-use tools for model fitting with AIF models and to introduce \nAIF to the growing community of researchers using Julia for computational psychiatry and \ncognitive modelling. Julia is a free and open-source high-level programming language that \nretains an easy user interface reminiscent of that in MATLAB and Python. Simultaneously,", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "it means that the transitions of the environment are expected to be uncertain (and therefore, \noften transition to new states). In this sense, volatile and unstable environments will lead \nto less certain predictions about the future. \n**C**, also called the preference prior, is a prior preference over possible observations. It encodes \nthe types of observations that an agent a priori expects to encounter; since minimising ex- \npected free energy through AIF entails taking actions that make the predicted observations \ncome about,**C**also encodes the agent’s preferences. It is a single categorical probability \ndistribution over possible observations; if the observations are multidimensional, there \nis a separate preference prior for each observation modality. If**C**is imprecise (i.e., highly \nentropic), its preferences are weak and it will prioritise collecting information over realising \nits preferences; if it has low entropy, the agent will have stronger preferences and instead \nprioritise preferred outcomes or goals. \n**D**, also called the state prior, is the agent’s prior belief about the states of the environment. It \nspecifies the agent’s belief about the environmental state before receiving any observations. \nThere is a separate state prior over environmental states for each factor. With a more precise \n**A**, the influence of the**D**quickly diminishes since the likelihood overwhelms the prior in \nthe Bayesian inference. \n**E**, also called the habit prior, is the prior over policies or paths. In the AIF vernacular, \npolicies are allowable sequences of actions, with some specified policy length or temporal \ndepth.**E**encodes the agent’s preferences for choosing certain policies in the absence of \nplans based upon expected free energy, sometimes called the agent’s “habits”. It is a single \nprobability distribution over each possible policy. \n\nIn addition to the five matrices, there are several hyper-parameters that are not part \nof the generative model, but are part of the inference algorithm. Here, we include two of \nthe most common: the*γ*and*α*(inverse) temperature parameters.*γ*, the precision over \npolicies, is the inverse temperature of a softmax transformation of expected free energies \nover policies, which is covered later in this section. After policies have been selected for a \ngiven time step, they are marginalised to calculate the probabilities of taking each possible \naction in the next time step.*α*, the action precision, is the inverse temperature of a softmax \ntransformation on these final action probabilities, with higher values resulting in more \nstochastic action selection. \n\nAs noted, here we focus specifically on the POMDP-based generative models often \nused in the AIF literature. However, the basic steps when performing AIF—perception, \naction and learning—remain the same across generative models. In the remainder of this \nsection, we describe each of these three steps in turn.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "the behaviour (Figure 8). We saw that the estimation successfully captured the difference \nbetween the two groups, and that the*α*parameter recovered fairly well. Note that the \nability to recover parameters depends on the specific model and task, as well as on the \nspecific values of the parameters (when*α*is very high, for example, the behaviour becomes \nessentially deterministic; further increases in*α*would then not have any effect on the \nbehaviour, and therefore, not be estimable). A subtle issue here is that the parameters \nthat best explain some data are not necessarily the parameters used to generate those \ndata. This is because the best parameters are those that maximise the marginal likelihood \nof the data (also known as the model evidence); because the model evidence includes \na complexity term, the parameter recovery will often recover parameters that provide a \nsimpler explanation for the data relative to the parameters used to generate these data. \n(cid:7) (cid:4) \n\n# Extract quantities from the fitted model \nagent_parameters = extract_quantities ( model , renamed_posterior_chains ) \n# Extract posterior estimates \nposterior_estimates = get_estimates ( agent_parameters ) \n(cid:6) (cid:5) \n\n**Figure 8.**Results of the parameter recovery study. (**A**) Estimated parameter values plotted against \nthe values used to generate the data. (**B**) Parameter estimates split by the two groups from which the \nparameter values of synthetic subjects were sampled. \n\nFinally, there are various metrics for model comparison that might be calculated, as \nimplemented by various software packages. Here for demonstration, we calculated the \nPareto-Smoothed Importance Sampling approximation to Leave One Out cross-validation \n(PSIS-LOO) [59], as implemented by ParetoSmooth.jl [64]: \n(cid:7) (cid:4) \n\n**using**ParetoSmooth : psis_loo \n# Calculate the PSIS LOO \nPSIS_loo = psis_loo ( model , results . chains ) \n(cid:6) (cid:5) \n\n**5. Discussion**\n\nWe introduce ActiveInference.jl, a novel Julia software package for creating and \nusing POMDP-based AIF models for simulation and fitting to empirical data, demonstrat- \ning its ease of use on a small parameter study with simulated agents. ActiveInference.jl \nmakes AIF modelling available in a fast language, equipped with an interface and situated \nin an ecosystem oriented specifically towards cognitive and behavioural modelling. \n\nImportantly, the ability to fit models to empirical data with sampling-based methods \nprovides value to researchers within cognitive modelling and computational psychiatry: it \nallows for comparing estimated parameter values between population groups or investigat-", + "page_start": 27, + "page_end": 27, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "(cid:7) \n**using**Distributions \n\n# Set priors \nparameter_priors = Dict ( \n\" alpha \" => Truncated ( Normal (5 ,5 ), 0 , 20 ) \n\n) \n(cid:6) (cid:5) \n\nNext, we instantiated the probabilistic model with data and parameter priors: \n(cid:7) \nmodel = create_model ( \n\nagent , # ActionModels Agent containing the model \nparameter_priors , # Dictionary with parameter priors \ndata ; # Dataframe containing data from all subjects \ngrouping_cols = [: SubjectID ], # Identifier column \ninput_cols = [\" Location \", \" Reward \", \" Cue \"], # Observation columns \naction_cols = [\" Action_Location \", \" Action_Reward \"] # Columns containing actions \n\n) \n(cid:6) \n\nFinally, we used the fit_model function to perform (parallelised) parameter estimation for \neach of the agents: \n(cid:7) (cid:4) \nresults = fit_model ( \n\nmodel ; # Model object \nparallelization = MCMCDistributed () # Parallelize over chains \nn_iterations = 1000 , # Number of iterations \nn_chains = 4 # Number of chains \n\n) \n(cid:6) (cid:5) \n\nThe output contained the chains object with the resulting posterior samples: \n(cid:7) \n\n# Take out chains from the results object and rename parameters \nrenamed_posterior_chains = rename_chains ( results . chains , model ) \n(cid:6) \n\nSummary Statistics \n\n\n \n \n \n \n [html]\n
parametersmeanstdmcseess_bulkess_tailrhat
SubjectID : 1. alpha3.8785θ. 2358≥ 80344826.81142512.88611.0016
SubjectID : 2. alpha2.97188.1945≥ 88294523.96582781.45321.0033
SubjectID : 3. alpha3.35988.2147≥ 88314816.16613854.75881. @ 816
\n\nWe could plot the posteriors and chains, which is often performed to diagnose whether the \nsampling was successful (Figure 6): \n(cid:7) (cid:4) \n**using**StatsPlots \n\n# Plot chain traces for the first and the last subject \nplot ( renamed_posterior_chains [: ,1 :1 ,: ]) \nplot ( renamed_posterior_chains [: , 10 : 10 ,: ]) \n(cid:6) (cid:5) \n\nFurther, we used plot_parameters from ActionModels to plot the posterior estimates \nagainst their priors. Here, we performed this for one agent from each group, also high- \nlighting the parameter value used to generate the behaviour (Figure 7). We saw that the \nposterior was correctly centred around the generative value.", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief \ntrajectories can then be related to other (for example, physiological) measures, as is usual \nin model-based neuroscience [65]. This method can also, in principle, be used for fitting \nmodels to other types of experimentally observable systems, like animals, organoids [66], \nand simulated or emergent systems [67]. The package can also be used for agent-based \nmodelling in general, for repeating earlier analyses with sampling based model-fitting \nand for comparing POMDP-based AIF models directly to other types of models. \n\nSince they implement full approximate Bayesian inferences, AIF models are compu- \ntationally more demanding than many approaches traditionally used in cognitive and \nagent-based modelling, in particular when the dimensionality of the generative model is \nlarge. This means that models with highly multidimensional or complex behaviour and \nlarge numbers of agents can be computationally infeasible to implement, especially given \nthe additional computational demands introduced by fitting these models to empirical \ndata. Avenues for addressing this implicit scaling problem were proposed in the context of \nmachine learning applications [68,69], and with the use of simplifying assumptions—the \nuse of which are ubiquitous in computational modelling—AIF has been used to model \nmulti-agent phenomena, such as opinion dynamics [15,70], coordinated foraging [71] and \nfish school movements [12]. It remains to be explored how AIF models can be applied to \nhighly complex natural phenomena, such as a concrete election, which underscores the \nneed for efficient but flexible and accessible software tools in the field. \n\nThere are many ways in which ActiveInference can be improved. It would be useful \nto extend the set of dynamic belief states to include prediction errors since they are often \nused for model-based neuroscience. This would entail departing from discrete state-space \n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering \nor predictive coding (see below). An alternative would be to generate prediction errors \nfrom belief updating under discrete models, where prediction errors can be read as the \n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain). \nA simple interface could be added for creating custom parametrisations of the requisite \nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed \nto Dirichlet distributions. Parameter learning could be extended to all generative model \nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or \ntemperature of the parameters that are learned); similarly for the precision over expected \nfree energies*γ*. Preference priors should also be implementable for environmental states, \nin addition to observations, and**A**can be made action dependent.", + "page_start": 28, + "page_end": 28, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "(cid:7) \n**using**ActiveInference . Environments \n\n# setting the probability of reward to 0.95 \nEnv = TMazeEnv (0 .9 5) \ninitialize_gp ( Env ) \n(cid:6) \n\nWe then proceeded to set up**A**,**B**,**C**,**D**and**E**. For this we used the create_matrix_templates \nhelper function to set up the correct structure and then populate it. To start, we defined \nwhat went into the helper function. It took five arguments: the numbers of states and ob- \nservations in each factor and modality; the policy length; the number of controls; and lastly, \nwhat to initially populate them with. The specific states and observations are made clear \nbelow when discussing populating the parameters. \n\nThe first three arguments should be specified as vectors of integers, containing the \nnumbers of states and observations for each factor or modality. In our case, we had two \nfactors: a location factor and a reward condition factor, which had four and two states, \nrespectively. There were three modalities: one location modality with four observations, \none reward modality with three observations and one cue modality with two observations. \nFinally, there were four possible actions for controlling the location factor, and only one \npossible action for the reward state factor. The policy length was specified as an integer, \nin our case 2, and we populated the template with zeros. \n(cid:7) (cid:4) \n\n(cid:5) \n\nWe started by defining**A**, or the observation model. In this example, since we allowed \nfor**A**learning,**A**was not used directly, but we still defined it in order to construct the \nDirichlet prior over it (and it could be used directly if**A**learning was not required). Of the \nthree observation modalities, the first was the location observation. Here, there were \nfour possible observations, mapped to the four location states and two reward condition \nstates. This resulted in an**A**that was four location observations by four location states by \ntwo reward conditions, i.e., a 4 × 4 × 2 tensor. We let the agent correctly assume perfect \nobservations of the location by specifying an identity matrix for**A**in each reward condition: \n(cid:7) (cid:4) \n\n# Use identity matrices between locations and observations . \n# For reward condition right \nA[1][:,:,1] = [ 1 .0 \n0 .0 \n0 .0 \n0 .0 0 .0 \n1 .0 \n0 .0 \n0 .0 0 .0 \n0 .0 \n1 .0 \n0 .0 0 .0 \n0 .0 \n0 .0 \n1 .0 ] \n\n# For reward condition left \nA[1][:,:,2] = [ 1 .0 \n0 .0 \n0 .0 \n0 .0 0 .0 \n1 .0 \n0 .0 \n0 .0 0 .0 \n0 .0 \n1 .0 \n0 .0 0 .0 \n0 .0 \n0 .0 \n1 .0 ] \n(cid:6) (cid:5) \n\nThe second modality was the reward modality, which mapped the observations “no re- \nward”, “reward” and “loss” onto the location states and reward conditions. For the second \nmodality, we therefore had a tensor that was three reward observations by four location \nstates by two reward conditions, i.e., a 3 × 4 × 2 tensor. When the agent was at the centre \nand cue locations, we let the modality accurately expect the observation of “no reward” \nwith certainty. For the two arm locations, we let the agent be agnostic regarding whether \nthey provided rewards or losses. This was different from the true reward probabilities \n(see Figure 3), which the agent needed to learn over time. This was the case for both \nreward conditions.", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What is dyspnea ?", + "target_page": 2, + "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "[html]5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdfTablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. htmlTablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD \n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? \n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]TABLE 2 | Mean Responses to Individual Dyspnea Questions2.93 ( 1.18 )37", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "; Jennifer Biggs, RN ; Jessica Bergeron ;", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI) \n\n\n \n \n \n
Questions About Dyspnea From CAT and SGRQControl Group ( n = 231 )Normal Spirometry Group ( n = 2.090 )Asthma Group ( n = 265 )COPD Group ( n = 330 )
PRISm Group ( n = 172 )Q1 ( weight = 0.514 )When I wak up a hill or one flight of stairs, I am breathless. The scale for this question ranges from 0 ( when I walk up a hill or 1. flight of stairs, I am not breathless ) to 5 ( when I wak up a hill or one fight of itam, I am very breathless ).0.90 ( 1.04 )2.85 ( 1.46 )3.03 ( 1.37 )3.21 ( 1.30 )
3.56 ( 1.37 )Q2 ( weight – 0.436 )Over the past 3 mo, I have had shortness of breath... The scale for this question ranges from 0 ( over the past 3 mo, I have had shortness of breath... not at all ) to 4 ( over the past 3 mo,. I have had shortness of breath... most days a week ).0.45 ( 0.89 )2.50 ( 1.30 )2.71 ( 1.18 )2.83 ( 1.21 )
Q3 : I feel breathless these daysSitting or lying still, %3162314
19Getting washed or dressed, %2172120
28Walking around at home, %2202123
27Walking outside on the level, %4364238
49Climbing up a flight of stairs, %20758183
87Climbing hills, %35838990
89Playing sports or games, %34788381
82Q3 ( total ) ( weight = 0.648 )The scale for this question ranges from 0 to 7, based on the number of positive answers for the 7 items.1.00 ( 1.25 )3.23 ( 1.72 )3.55 ( 1.63 )3.45 ( 1.61 )
3.76 ( 1.75 )Q4 ( weight – 0.091 )I am breathless when I talk, %2354337
39Q5 ( weight = 0.095 )I am breathless when I bend over, %5374537
56Q6 ( weight – 0.060 )I get afraid or panic when I cannot get my breath, %4303331
Because of my breathing...Q7 ( weight = 0.037 )I take a long time to get washed or dressed, %18910
17Q8 ( weight – 0.023 )I cannot take a bath or shower, or I take a long time, %0577
8Q9 ( weight = 0.116 )I walk slower than other people, or I have to stop for rests, %5404656
66Q10 ( weight – 0.113 )Jobs such as housework take a long time, or I have to stop for rests, %3384048
59Q11 ( weight = 0.124 )If I climb up one flight of stairs, I have to go slowly or stop, %5474457
67Q12 ( weight = 0.127 )If I hurry or walk fast, I have to stop or slow down10596270
Sarah Anthony, BNRN ; and Tanya Nolan,Prevalence of dyspnea in general adult
and Elisabet White ; Vancouver GeneralBNRN ; McGill University Health CentrePreparations : a systematic review and
Hospital, Vancouver, British Columbia :Montreal, QC : Francine Noel ; Royal Victoriameta - analysis. Respir Med. 2023 ; 218 :
Shelley Abercromby, BSc ; Jana Caine, DavidRegional Health Centre, Barrie, ON : Masoud1.07379.
\n [html]MeasureUnadjustedAdjusted\n
Dyspnea OR ( 95 % CI )P ValueDyspnea OR ( 95 % CI )P Value
Are you currently employed ( working for pay )?0.995 ( 0.992 - 0.998 ). 0020.993 ( 0.990 – 0.997 )<. 001
MeasureaDyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Absenteeism0.061 ( 0.040 - 0.083 )<. 0010.066 ( 0.044 – 0.089 )<. 001
Presenteeism0.334 ( 0.293 - 0.375 )<. 0010.349 ( 0.306 – 0.392 )<. 001
Work productivity loss0.368 ( 0.323 - 0.413 )<. 0010.383 ( 0.336 - 0.430 )<. 001
Activity impairment0.503 ( 0.463 - 0.544 )<. 0010.501 ( 0.458 – 0.544 )<. 001
\n\nORs and regression coefficients are presented with 95% CIs and P values. Adjusted coefficients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- \nductivity and Activity Impairment questionnaire. \naMeasures calculated from WPAI questions.21", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "The prevalence of individuals who were obese and \nmorbidly obese in the PRISm group partially explains \nthe between-group difference in dyspnea. The excess \ndyspnea seen in the PRISm group when compared with \nthe normal spirometry group is partly explained by \npatient-specific risk factors, including BMI, which \nshrink the mean dyspnea differential between the groups \nfrom 11.2 to 5.5 points (Tables 3-6). The remaining 5.5- \npoint difference indicates that PRISm patients have \nexcess dyspnea relative to symptomatic individuals with \nnormal spirometry for additional reasons other than \nobesity.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) \n\n\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Physical functioning− 0.693 (− 0.718 to − 0.668 )<. 001− 0.655 (− 0.680 to − 0.630 )<. 001
Physical health limitations− 0.634 (− 0.666 to − 0.603 )<. 001− 0.628 (− 0.661 to − 0.595 )<. 001
Emotional problems− 0.403 (− 0.438 to − 0.369 )<. 001− 0.407 (− 0.443 to − 0.370 )<. 001
Energy / fatigue− 0.454 (− 0.479 to − 0.428 )<. 001− 0.452 (− 0.479 to − 0.425 )<. 001
Emotional well - being− 0.230 (− 0.256 to − 0.204 )<. 001− 0.239 (− 0.266 to − 0.213 )<. 001
Social functioning− 0.433 (− 0.466 to − 0.399 )<. 001− 0.434 (− 0.469 to − 0.399 )<. 001
Pain− 0.410 (− 0.444 to − 0.377 )<. 001− 0.387 (− 0.423 to − 0.352 )<. 001
General health− 0.390 (− 0.416 to − 0.364 )<. 001− 0.382 (− 0.409 to − 0.355 )<. 001
Total score− 0.485 (− 0.504 to − 0.467 )<. 001− 0.473 (− 0.493 to − 0.454 )<. 001
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. \n\nAll participants filled out the COPD Assessment Test \n(CAT) questionnaire. Elevated CAT scores indicate a \ngreater burden of respiratory symptoms impacting \ndaily activities and health status.13 The St. George’s \nRespiratory Questionnaire (SGRQ)14-16 was used to \nassess respiratory disease-related quality of life. Higher \nSGRQ scores indicate poorer health status. Both the \nCAT and SGRQ questionnaires were completed prior The composite dyspnea impact measure was scaled so its \nminimum value was 0 if the response to each of the 15 \nquestions was 0, and the maximum value was scaled to \n100 if the individual responses for all 15 questions rep- \nresented the most severe dyspnea response.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). \n\nDyspnea Impact and Health Care Use, Quality of \nLife, and Work Productivity \n\nThe impact of dyspnea and its associations with health \ncare use, quality of life, and work productivity were exam- \nined. Health care utilization was assessed through self- \nreported data. Quality of life was assessed using the 36- \nItem Short Form Health Survey questionnaire, where \nhigher scores indicate better health status. Work produc- \ntivity was assessed using the Work Productivity and Activ- \nscores \nity Impairment questionnaire, where higher \n\nResults \nFigure 1 illustrates the results of the case finding \napproach, including the enrollment of the control group. \nAmong 5,631 potentially eligible participants, 1,359 participants (24%) did not meet the threshold of $ 6 \npoints on the ASQ or $ 20 points on the COPD- \nDiagnostic Questionnaire and were thus excluded, \nleaving 4,272 individuals deemed eligible for spirometry. \n\n21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory \n\n2,090 (73.2%) had normal \nspirometry \n172 (6.0%) had PRISM \n\nFigure 1 – Study flow diagram demonstrating the case finding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; \nCOPD-DQ¼ COPD Diagnostic Questionnaire; CF ¼ cystic fibrosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What are the criterion to be control patient in the dyspnea study ?", + "target_page": 3, + "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). \n\nDyspnea Impact and Health Care Use, Quality of \nLife, and Work Productivity \n\nThe impact of dyspnea and its associations with health \ncare use, quality of life, and work productivity were exam- \nined. Health care utilization was assessed through self- \nreported data. Quality of life was assessed using the 36- \nItem Short Form Health Survey questionnaire, where \nhigher scores indicate better health status. Work produc- \ntivity was assessed using the Work Productivity and Activ- \nscores \nity Impairment questionnaire, where higher \n\nResults \nFigure 1 illustrates the results of the case finding \napproach, including the enrollment of the control group. \nAmong 5,631 potentially eligible participants, 1,359 participants (24%) did not meet the threshold of $ 6 \npoints on the ASQ or $ 20 points on the COPD- \nDiagnostic Questionnaire and were thus excluded, \nleaving 4,272 individuals deemed eligible for spirometry. \n\n21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory \n\n2,090 (73.2%) had normal \nspirometry \n172 (6.0%) had PRISM \n\nFigure 1 – Study flow diagram demonstrating the case finding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; \nCOPD-DQ¼ COPD Diagnostic Questionnaire; CF ¼ cystic fibrosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "[html]5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdfTablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. htmlTablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "to spirometry to avoid influencing patients’ perceptions \nof their dyspnea. \n\nprerecorded message then inquired whether any house- \nhold member was $ 18 years of age and had experi- \nenced respiratory symptoms (eg, shortness of breath, \nwheezing, \nsputum, prolonged \ncough) within the past 6 months. Households with affir- \nmative responses were subsequently contacted by the \nlocal study coordinator for a follow-up call. The house- \nhold member \nreporting respiratory symptoms was \nverbally consented and screened for eligibility to partic- \nipate in the study over the telephone.8,9 \n\nincreased mucus or \n\nExclusion criteria included the following: (1) a history of \ndiagnosis of lung or airway disease, (2) use of respiratory \ninhalers aside from as-needed salbutamol, (3) contrain- \ndications for spirometry (eg, occurrences of myocardial \ninfarction, stroke, aortic or cerebral aneurysm, eye sur- \ngery, detached retina within the last 3 months), (4) \ninability or refusal to provide informed consent, (5) be- \ning in the third trimester of pregnancy, and (6) being < \n18 years of age. \n\nClassification of Undiagnosed Cases \nCertified study personnel administered spirometry tests \nbefore and after BD use. Participants showing an in- \ncrease of at least 12% and 200 mL in their FEV1 after \nreceiving 400 mg of salbutamol were classified as having \nspirometry indicative of asthma.17 Those whose post-BD \nratio of FEV1/FVC fell below the lower 95% confidence \nlimit (ie, FEV1/FVC < lower limit of normal) were clas- \nsified as having spirometry indicative of COPD.18 Partic- \nipants meeting the criteria for both conditions were \nlabeled as having COPD. Those with a post-BD \n< 80% of the predicted normal and a post-BD \nFEV1 \nFEV1/FVC ratio > 0.70 were classified as having \nspirometry indicative of preserved ratio impaired \nspirometry (PRISm). PRISm was defined based on \npost-BD spirometry values for a more specific classifica- \ntion.19 Participants not meeting criteria for asthma, \nCOPD, or PRISm were labeled as having normal \nspirometry. \n\nEach participant completed the Asthma Screening Ques- \ntionnaire (ASQ)10 via telephone. Individuals aged $ 60 \nyears, and those aged < 60 years who scored < 6 points \non the ASQ, also completed the COPD-Diagnostic \nQuestionnaire.11,12 Participants scoring $ 6 points on \nthe ASQ or $ 20 points on the COPD-Diagnostic Ques- \ntionnaire were invited to the study site for pre- and post- \nbronchodilator (BD) spirometry. \n\nAssessment of the Impact of Participants’ Dyspnea \n\nA control group without respiratory symptoms was \nselected randomly using identical random digit dialing \nreported no respiratory \nmethods. Control patients \nsymptoms in the preceding 6 months and obtained a \nscore of 0 on the ASQ. Participants were recruited as \ncontrol patients if they could be matched with an indi- \nvidual from the undiagnosed group based on age ((cid:2) 5 \nyears) and sex. This matching process aimed to have \nsimilar demographic profiles between the control group \nand the newly found cases. This matching was imple- \nmented solely to ensure demographic comparability \nacross the study groups and not for pairing patients \nfor statistical analysis purposes.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]TABLE 2 | Mean Responses to Individual Dyspnea Questions2.93 ( 1.18 )37", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. \n\nAll participants filled out the COPD Assessment Test \n(CAT) questionnaire. Elevated CAT scores indicate a \ngreater burden of respiratory symptoms impacting \ndaily activities and health status.13 The St. George’s \nRespiratory Questionnaire (SGRQ)14-16 was used to \nassess respiratory disease-related quality of life. Higher \nSGRQ scores indicate poorer health status. Both the \nCAT and SGRQ questionnaires were completed prior The composite dyspnea impact measure was scaled so its \nminimum value was 0 if the response to each of the 15 \nquestions was 0, and the maximum value was scaled to \n100 if the individual responses for all 15 questions rep- \nresented the most severe dyspnea response.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) \n\n\n \n \n \n
Questions About Dyspnea From CAT and SGRQControl Group ( n = 231 )Normal Spirometry Group ( n = 2.090 )Asthma Group ( n = 265 )COPD Group ( n = 330 )
PRISm Group ( n = 172 )Q1 ( weight = 0.514 )When I wak up a hill or one flight of stairs, I am breathless. The scale for this question ranges from 0 ( when I walk up a hill or 1. flight of stairs, I am not breathless ) to 5 ( when I wak up a hill or one fight of itam, I am very breathless ).0.90 ( 1.04 )2.85 ( 1.46 )3.03 ( 1.37 )3.21 ( 1.30 )
3.56 ( 1.37 )Q2 ( weight – 0.436 )Over the past 3 mo, I have had shortness of breath... The scale for this question ranges from 0 ( over the past 3 mo, I have had shortness of breath... not at all ) to 4 ( over the past 3 mo,. I have had shortness of breath... most days a week ).0.45 ( 0.89 )2.50 ( 1.30 )2.71 ( 1.18 )2.83 ( 1.21 )
Q3 : I feel breathless these daysSitting or lying still, %3162314
19Getting washed or dressed, %2172120
28Walking around at home, %2202123
27Walking outside on the level, %4364238
49Climbing up a flight of stairs, %20758183
87Climbing hills, %35838990
89Playing sports or games, %34788381
82Q3 ( total ) ( weight = 0.648 )The scale for this question ranges from 0 to 7, based on the number of positive answers for the 7 items.1.00 ( 1.25 )3.23 ( 1.72 )3.55 ( 1.63 )3.45 ( 1.61 )
3.76 ( 1.75 )Q4 ( weight – 0.091 )I am breathless when I talk, %2354337
39Q5 ( weight = 0.095 )I am breathless when I bend over, %5374537
56Q6 ( weight – 0.060 )I get afraid or panic when I cannot get my breath, %4303331
Because of my breathing...Q7 ( weight = 0.037 )I take a long time to get washed or dressed, %18910
17Q8 ( weight – 0.023 )I cannot take a bath or shower, or I take a long time, %0577
8Q9 ( weight = 0.116 )I walk slower than other people, or I have to stop for rests, %5404656
66Q10 ( weight – 0.113 )Jobs such as housework take a long time, or I have to stop for rests, %3384048
59Q11 ( weight = 0.124 )If I climb up one flight of stairs, I have to go slowly or stop, %5474457
67Q12 ( weight = 0.127 )If I hurry or walk fast, I have to stop or slow down10596270
\n [html]MeasureUnadjustedAdjusted\n
Dyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Physical functioning− 0.693 (− 0.718 to − 0.668 )<. 001− 0.655 (− 0.680 to − 0.630 )<. 001
Physical health limitations− 0.634 (− 0.666 to − 0.603 )<. 001− 0.628 (− 0.661 to − 0.595 )<. 001
Emotional problems− 0.403 (− 0.438 to − 0.369 )<. 001− 0.407 (− 0.443 to − 0.370 )<. 001
Energy / fatigue− 0.454 (− 0.479 to − 0.428 )<. 001− 0.452 (− 0.479 to − 0.425 )<. 001
Emotional well - being− 0.230 (− 0.256 to − 0.204 )<. 001− 0.239 (− 0.266 to − 0.213 )<. 001
Social functioning− 0.433 (− 0.466 to − 0.399 )<. 001− 0.434 (− 0.469 to − 0.399 )<. 001
Pain− 0.410 (− 0.444 to − 0.377 )<. 001− 0.387 (− 0.423 to − 0.352 )<. 001
General health− 0.390 (− 0.416 to − 0.364 )<. 001− 0.382 (− 0.409 to − 0.355 )<. 001
Total score− 0.485 (− 0.504 to − 0.467 )<. 001− 0.473 (− 0.493 to − 0.454 )<. 001
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Individuals with undiagnosed respiratory symptoms, \ndetermined to have asthma or COPD through \nspirometry, experience poor health status.28 Therefore, \nthe implementation of known treatment approaches for \nasthma or COPD is important to improve their \nconditions.29 In contrast, those with normal spirometry \nor PRISm face unclear treatment approaches. Long- \nacting BD therapy in symptomatic individuals with \ntobacco exposure with normal spirometry is not \neffective.30 Weight management programs may be useful \nfor individuals who are obese with PRISm-related \ndyspnea; however, this awaits definitive clinical trials.31 In conclusion, our study measured dyspnea impact in \nindividuals with no preexisting diagnosis of lung disease \nwho reported respiratory symptoms as part of a \npurposeful case finding strategy. Individuals with PRISm \nexhibited the greatest impact of dyspnea, even higher \nthan those newly diagnosed with asthma or COPD. \nAfter adjusting for patient factors, comorbidities, \npulmonary diseases, and severity of lung physiologic \nimpairment, most of the variability in dyspnea remained \nunexplained. We also showed that dyspnea was \nassociated with increased health care utilization, \nimpaired quality of life, and work productivity. \n\nDyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI) \n\n\n \n \n \n \n [html]MeasureUnadjustedAdjusted\n
Dyspnea OR ( 95 % CI )P ValueDyspnea OR ( 95 % CI )P Value
Are you currently employed ( working for pay )?0.995 ( 0.992 - 0.998 ). 0020.993 ( 0.990 – 0.997 )<. 001
MeasureaDyspnea Coefficient ( 95 % CI )P ValueDyspnea Coefficient ( 95 % CI )P Value
Absenteeism0.061 ( 0.040 - 0.083 )<. 0010.066 ( 0.044 – 0.089 )<. 001
Presenteeism0.334 ( 0.293 - 0.375 )<. 0010.349 ( 0.306 – 0.392 )<. 001
Work productivity loss0.368 ( 0.323 - 0.413 )<. 0010.383 ( 0.336 - 0.430 )<. 001
Activity impairment0.503 ( 0.463 - 0.544 )<. 0010.501 ( 0.458 – 0.544 )<. 001
\n\nORs and regression coefficients are presented with 95% CIs and P values. Adjusted coefficients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- \nductivity and Activity Impairment questionnaire. \naMeasures calculated from WPAI questions.21", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 - 1539.12. Price DB, Tinkelman DG, Halbert RJ,Carben HK, Haga SL, Olsson D, et al. Birch pollen, air pollution and their interactive effects on airway symptoms and peak expiratory flow in allergic asthma during pollen season – a panel study in Northern and Southern Sweden. Environ Hen31Marott [ L, Ingebrigtsen T5, Colak Y, et al. Impact of the metabolic syndrome on cardiopulmonary morbidity and mortality in individuals with lung function impairment : a prospective cohort study of the Dunth general population. Level ReRespiration. 2006 ; 73 : 285 - 295.13. Jones PW, Harding G, Berry P, et al.TableLeft - find - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - se32Stehn Mb, Prya A, Martin B, et al. How well do patients and providers agree on the severity of dyspnoa? J Hosp Med. 2016.110 ). 701 - 707.2009 ; 34 : 648 - 654.23Ekstrom M, Johannessen A, Abramson MJ, et al. Breathlessness across generations : results from the RHINESSAJones PW. Quality of life measurement for patients with diseases of the airways. Thorax. 1991 ;# 6 : 676 - 682.33Cherian M, Magner KMA, Whitmore GA, et al. Patient and physician factors associated with symptomatic undiagnosed asthma or COPD. Ewr Respir J. 2023.61 ( 2 ):I5. Jones PW, Quirk FH, Baveystock CM. The24Ziegler B, Femandes AK, Sanches PR, Konnen GI, Dalcin Pde T. Variability of dyspnea perception in healthy subjects", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "What is the revenue of Republic Services in 2002 ?", + "target_page": 2, + "target_passage": " $ 2,365.1", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally \nmade on a basis intended to reÖect the market value of such services. \n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for \nfurther information.) \n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity \nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:", + "page_start": 88, + "page_end": 88, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions, except earnings per share data )Year\n
Med Decer1,2004
20__2002REVENUE$ 2.7
708.1
$ 2.517.8$ 2.365.1EXPENSES :Cost of operations
1.714.41.605.41.472.9Depreciation, amortization and depletion
259.4239.1199.6Accretion
13.712.7Selling, general and administrative
268.3247.9238.7Other charges ( income )
( 5.6 )OPERATING INCOME
452.3412.7459.5INTEREST EXPENSE
( 76.7 )( 78.0 )( 77.0 )INTEREST INCOME
6.99.54.3OTHER INCOME ( EXPENSE ), NET
1.23.2_ (. 3 )INCOME BEFORE INCOME TAXES
383.7347.4386.5PROVISION FOR INCOME TAXES
145.8132.0146.9INCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN
ACCOUNTING PRINCIPLES
237.9215.4239.6CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING
PRINCIPLES, NET OF TAX( 37.8 )
NET INCOME
$ __2237.9$ _177.6$ 239.6
BASIC EARNINGS PER SHARE :Before cumulative effect of changes in accounting principles$1.56
$1.341Cumulative effect of changes in accounting principles, net of tax
(. 23 )Basic earnings per share................................................................................................................................
. 56
S1.11SpeciesWeighted average common shares outstanding
152.8160.3165.4DILUTED EARNINGS PER SHARE :
Before cumulative effect of changes in accounting principles$1.53$
1.33$1.44Cumulative effect of changes in accounting principles, net of tax
(. 23 )Diluted earnings per share
$ ___
. 53$1.10$ __1.44
Weighted average common and common equivalent shares outstanding..............................____5.3_
62.1__166.7CASH DIVIDENDS PER COMMON SHARE36
", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC.**\n\n**VALUATION AND QUALIFYING ACCOUNTS AND RESERVES**\n**SCHEDULE II**\n**(in millions)**\n\n**Balance at**\n**Beginning**\n**of Year** **Additions**\n**Charged to**\n**Income** **Accounts**\n**Written**\n**OÅ** **Balance at**\n**End**\n**of Year** **Other(1)**\n\nCLASSIFICATIONS \nAllowance for doubtful accounts: \n\n2004 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n2003 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n2002 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $19.0 \n19.0 \n19.0 $ 8.0 \n10.4 \n11.2 $ (9.0) \n(10.4) \n(11.4) $ Ì \nÌ \n.2 $18.0 \n19.0 \n19.0", + "page_start": 101, + "page_end": 101, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
YearEnded December31,
200420032002
Patients$ 23$ 177.6$
239.6PercentageSpecification154.0
141.0126.1Specification98.4
92.867.4Patients7.0
5.36.1Specifications13.7
12.7__Specificity57.6
178.973.1Specifications8.0
10.411.2.........10.6
6.74.0Specificity2.1
( 1.8 )( 4.8 )tax...
37.8Patients( 27.5 )
− 21.8 )( 13.6 ).........91.8
( 109.4 )( 5.9 )Patients15.3
9.037.1.......( 2.6 )
61.329.4666.3600.5
569.7Patients( 283.8 )( 273.2 )
( 258.6 ).........5.79.1
14.6Specificity( 47.3 )( 51.5 )
( 55.8 ).........3.2
18.9Patients( 3.7 )( 17.6 )
( 2.7 ).........( 21.4 )( 40.0 )
( 32.7 ).........143.8( 182.4 )
( 206.7 )( 552.4 )( 316.3 )
Specification____( 30.0 )
Specificity88.886.396.9
( 252.2 )( 2.6 )( 2.2 )Patients
38.249.129.9Patients
( 266.1 )( 184.2 )( 150.0 ).........
( 46.0 )( 19.0 ).........
( 72.6 )( 437.3 )
( 70.4 )( 128.0 )ENTS22.3
( 22.3 )125.4ERIOD119.2
141.516.1Patients$ 141.5
$ 119.2$ 141.5
\n\nCASH PROVIDED BY OPERATING ACTIVITIES:", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Cumulative EÅect**\n**of Changes in**\n**Accounting**\n**Principles** **Balance as of**\n**December 31,**\n**2002** **Balance as of**\n**December 31,**\n**2003** **Acquisitions** **Divestitures**\n\nEastern Region ÏÏÏÏÏÏÏÏ \nCentral Region ÏÏÏÏÏÏÏÏ \nSouthern Region ÏÏÏÏÏÏÏ \nSouthwestern Region ÏÏÏ \nWestern RegionÏÏÏÏÏÏÏÏ $ 429.0 \n343.0 \n323.2 \n134.7 \n314.3 $ 7.2 \n7.5 \n2.6 \n.3 \n3.6 $(.3) \nÌ \nÌ \nÌ \nÌ $ Ì \nÌ \nÌ \nÌ \n(7.0) $ 435.9 \n350.5 \n325.8 \n135.0 \n310.9 \n\nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,544.2 $21.2 $(.3) $(7.0) $1,558.1 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: \n\n\n \n \n \n \n [html]\n
200420032002
$ 655.2$601.2
$530.7737.9
706.0696.7558.1
523.0501.662.2
50.950.8...
2.013.4_1.881.11.779.8
1.031.0967.5854.1
...( 519.8 )( 493.7 )
( 428.5 )...511.2
473.8425.6183.5
\n\n**11. FUEL HEDGE**\n\nDuring June 2001, the Company entered into option agreements for approximately 14.3 million gallons of \nheating oil. Under SFAS 133, the options qualiÑed for and were designated as eÅective hedges of changes in \nthe prices of forecasted diesel fuel purchases. These option agreements settled each month in equal notional \namounts through December 2002. The option agreements were structured as zero-cost collars indexed to the \nprice of heating oil. These option agreements expired in December 2002. In accordance with SFAS 133, \n$1.6 million representing the eÅective portion of the change in fair value for the year ended December 31, \n2002, net of tax, has been recorded in stockholders' equity as a component of accumulated other comprehen- \nsive income. The ineÅective portion of the change in fair value was a gain of approximately $.1 million for the \nyear ended December 31, 2002, and has been included in other income (expense), net in the accompanying \nConsolidated Statements of Income. Realized losses of $.8 million related to these option agreements are \nincluded in cost of operations in the Company's Consolidated Statements of Income for the year ended \nDecember 31, 2002.", + "page_start": 89, + "page_end": 89, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\nHedging Activities'' (\"\"SFAS 133''), as amended. (For further information, see Note 11, Fuel Hedge.) Of this \namount, $1.6 million, net of tax, representing the eÅective portion of the change in fair value was recorded to \nother comprehensive income for the year ended December 31, 2002. \n\nAt December 31, 2004, the Company had $38.7 million of restricted marketable securities held as \nÑnancial guarantees. These securities consist of mutual funds invested in short-term investment grade \nsecurities, including mortgage-backed securities and U.S. Government obligations. These securities are \navailable for sale and, as a result, are stated at fair value based on quoted market prices. During the years \nended December 31, 2004 and 2003, the Company recorded a $.1 million and ($.1) million unrealized \ngain/(loss), net of tax, respectively, to other comprehensive income related to the change in fair value of these \nsecurities. \n\nThe Company had no other components of other comprehensive income for the periods presented. \n\n**Statements of Cash Flows**\n\nThe Company considers all unrestricted highly liquid investments with purchased maturities of three \nmonths or less to be cash equivalents. The eÅect of non-cash transactions related to business combinations, as \ndiscussed in Note 4, Business Combinations, and other non-cash transactions are excluded from the \naccompanying Consolidated Statements of Cash Flows. \n\n**Fair Value of Financial Instruments**\n\nThe carrying amounts of cash and cash equivalents, restricted cash and marketable securities, receivables, \naccounts payable and accrued liabilities approximate fair value due to the short maturity of these instruments. \nThe fair value of the Company's Ñxed rate unsecured notes and tax-exempt Ñnancing using quoted market \nrates is $1,227.4 million at December 31, 2004. The carrying value of the unsecured notes and tax exempt \nÑnancing is $1,123.3 million at December 31, 2004. The carrying amounts of the Company's remaining notes \npayable and tax-exempt Ñnancing approximate fair value because interest rates are variable and, accordingly, \napproximate current market rates. \n\n**Concentration of Credit Risk**\n\nThe Company provides services to commercial, industrial, municipal and residential customers in the \nUnited States. Concentrations of credit risk with respect to trade receivables are limited due to the wide \nvariety of customers and markets in which services are provided as well as their dispersion across many \ngeographic areas in the United States. The Company performs ongoing credit evaluations of its customers, but \ndoes not require collateral to support customer receivables. The Company establishes an allowance for \ndoubtful accounts based on various factors including the credit risk of speciÑc customers, age of receivables \noutstanding, historical trends, economic conditions and other information. \n\n**New Accounting Pronouncement**\n\nOn December 16, 2004, the Financial Accounting Standards Board issued Statement of Financial \nAccounting Standards No. 123 (revised 2004), \"\"Share-Based Payment'' (\"\"SFAS 123(R)''), which is a \nrevision of Statement of Financial Accounting Standards No. 123, \"\"Accounting for Stock-Based Compensa- \ntion'' (\"\"SFAS 123''). SFAS 123(R) supersedes APB Opinion No. 25, \"\"Accounting for Stock Issued to \nEmployees,'' and amends SFAS 95, \"\"Statement of Cash Flows.'' Generally, the approach in SFAS 123(R) is \nsimilar to the approach described in SFAS 123. However, SFAS 123(R) requires all share-based payments to \nemployees, including grants of employee stock options, to be recognized in the income statement based on \ntheir fair values. Pro forma disclosure is no longer an alternative.", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\napproximately $48.0 million which was collected or used to oÅset taxes payable during the year ended \nDecember 31, 2004. \n\nA reconciliation of the statutory federal income tax rate to the Company's eÅective tax rate is shown \nbelow: \n\n\n \n \n \n \n [html]December 31,\n
200420032002
........................35.0 %35.0 %
35.0 %........................1.3
1.9. 7........................
2.41.72.1
........................(. 7 )(. 6 )
\n\nComponents of the net deferred income tax asset and liability in the accompanying Consolidated Balance \nSheets are as follows: \n\n**December 31,**\n**2004** **2003**\n\nDeferred tax assets (liabilities): \nCurrent portion Ì \n\nBook basis in property over tax basisÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nAccruals not currently deductible ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n\n$ $ \n\nLong-term portion Ì \n\nBook basis in property over tax basisÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nAccruals not currently deductible ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nTotal ��ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n\n1.8 \n8.1 \n9.9 2.5 \n3.3 \n5.8 $ $ \n\n$(434.4) \n27.9 \n$(406.5) $(367.3) \n13.8 \n$(353.5) \n\nAt December 31, 2004, the Company had available domestic federal and state net operating loss \ncarryforwards of approximately $25.6 million ($16.6 million after tax), which begin to expire in 2023. In \nassessing the realizability of deferred tax assets, management considers whether it is more likely than not some \nportion or all of the deferred tax assets will not be realized after the initial recognition of the deferred tax asset. \nThe Company provides valuation allowances to oÅset portions of deferred tax assets due to uncertainty \nsurrounding the future realization of such deferred tax assets. The Company adjusts the valuation allowance, if \nany, in the period management determines it is more likely than not that deferred tax assets will or will not be \nrealized. \n\nThe Company made income tax payments (net of refunds received) of approximately $12.9 million, \n$17.7 million and $69.3 million for the years ended December 31, 2004, 2003 and 2002, respectively. \n\nThrough the date of the Company's initial public oÅering of common stock in July 1998, the Company \nÑled consolidated federal income tax returns with AutoNation Inc. (\"\"AutoNation''), its former parent \ncompany. In accordance with the Company's tax sharing agreement with AutoNation, the Company may be \nliable for certain assessments imposed by the Internal Revenue Service for the periods through June 1998. \nThe Internal Revenue Service is auditing the Company's consolidated tax returns for Ñscal years 1998 through \n2003. Management believes that the tax liabilities recorded are adequate. However, a signiÑcant assessment in \nexcess of liabilities recorded against the Company could have a material adverse eÅect on the Company's \nÑnancial position, results of operations or cash Öows. \n\n77", + "page_start": 84, + "page_end": 84, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Risk-free interest ratesÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nExpected livesÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nExpected volatility ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \nDividend yieldÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n\n**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Years Ended December 31,**\n**2003** **2004** **2002**\n\nWeighted-average fair value of the Company's stock options, \nrestricted stock and stock units granted during the period ÏÏÏ $ 9.33 $ 7.64 $ 7.47 \n\nAssumptions Ì \n\n3.6% 3.2% 2.7% \n\n5 years 5 years 5 years \n\n30.0% \n.9% 40.0% \nÌ 40.0% \nÌ \n\n**Revenue Recognition and Deferred Revenue**\n\nThe Company generally provides services under contracts with municipalities or individual customers. \nRevenue consists primarily of collection fees from commercial, industrial, residential and municipal customers \nand transfer and landÑll disposal fees charged to third parties. Advance billings are recorded as deferred \nrevenue, and the revenue is then recognized over the period services are provided. Collection, transfer and \ndisposal, and other services accounted for approximately 74.3%, 18.9% and 6.8%, respectively, of consolidated \nrevenue for the year ended December 31, 2004. No one customer has individually accounted for more than \n10% of the Company's consolidated revenues or of the Company's reportable segment revenue in any of the \npast three years. \n\nThe Company recognizes revenue when all four of the following criteria are met: \n\n‚ Persuasive evidence of an arrangement exists such as a service agreement with a municipality, a \nhauling customer or a disposal customer, \n\n‚ Services have been performed such as the collection and hauling of waste or the disposal of waste at a \nCompany-owned disposal facility, \n\n‚ The price of the services provided to the customer are Ñxed or determinable, and \n\n‚ Collectability is reasonably assured. \n\n**Other Charges**\n\nDuring the fourth quarter of 2002, the Company recorded a $5.6 million gain on the sale of certain assets \nfor amounts exceeding estimates originally made and recorded as other charges during the fourth quarter of \n2001. \n\n**Income Taxes**\n\nThe Company accounts for income taxes in accordance with Statement of Financial Accounting \nStandards No. 109, \"\"Accounting for Income Taxes.'' Accordingly, deferred income taxes have been provided \nto show the eÅect of temporary diÅerences between the recognition of revenue and expenses for Ñnancial and \nincome tax reporting purposes and between the tax basis of assets and liabilities and their reported amounts in \nthe Ñnancial statements. \n\n**Comprehensive Income**\n\nDuring the year ended December 31, 2002, the Company recorded an unrealized gain of $2.8 million \n($1.7 million, net of tax) relating to the change in fair value of its fuel hedge option agreements in accordance \nwith Statement of Financial Accounting Standards No. 133, \"\"Accounting for Derivative Instruments and", + "page_start": 71, + "page_end": 71, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n$1.8 million was recorded as compensation expense in the Company's Consolidated Statements of Income. \nThe remaining $1.0 million, representing the unamortized balance of unearned compensation on restricted \nstock, is included as a separate component of stockholders' equity in the Company's Consolidated Balance \nSheets. No other stock units or restricted shares were granted during the twelve months ended December 31, \n2004. \n\nThe following table summarizes the activity for Equity-Based Compensation Units for the years ended \n2002, 2003 and 2004: \n\n\n \n \n \n \n [html]\n
SharesWeighted - Average Exercise Price
nits outstanding at December 31.2001........................................................................................................................................................................12.4$ 16.22
ranted2.317.45
Research( 1.9 )15.18
ancelled−(. 2 )15.39
nits outstanding at December 31.2002........................................................................................................................................................................12.616.61
ranted2.019.30
Research( 2.5 )16.21
ancelled_ (. 3 )16.02
nits outstanding at December 31.200311.817.18
ranted1.824.65
Research( 2.3 )16.24
ancelled−(. 2 )19.72
nits outstanding at December 31.200411.1$ 18.51
\n\n**Range of Exercise Price**\n\n$10.16 Ì $13.55 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n$13.56 Ì $16.93 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n$16.94 Ì $20.32 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n$20.33 Ì $33.88 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n\n\n \n \n \n \n [html]OutstandingExercisable\n
Weighted - Average Remaining Contractual Life ( Yrs.)Weighted - Average Exercise PriceSharesWeighted - Average Exercise Price. 6
3.5$ 11.87. 6$ 11.871.3
4.914.68. 914.737.3
4.818.125.117.931.8
8.626.05. 224.7811.0
5.418.686.817.13
", + "page_start": 86, + "page_end": 86, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "Who is the Vice Chairmain of the Board of Republic Services ?", + "target_page": 5, + "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON THE FINANCIAL STATEMENTS**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and \nsubsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, \nstockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits \nalso included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements \nand schedule are the responsibility of the Company's management. Our responsibility is to express an opinion \non these Ñnancial statements and schedule based on our audits. \n\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether the Ñnancial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An \naudit also includes assessing the accounting principles used and signiÑcant estimates made by management, as \nwell as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable \nbasis for our opinion. \n\nIn our opinion, the Ñnancial statements referred to above present fairly, in all material respects, the \nconsolidated Ñnancial position of Republic Services, Inc. and subsidiaries at December 31, 2004 and 2003, and \nthe consolidated results of their operations and their cash Öows for each of the three years in the period ended \nDecember 31, 2004 in conformity with U.S. generally accepted accounting principles. Also, in our opinion, the \nrelated Ñnancial statement schedule, when considered in relation to the basic Ñnancial statements taken as a \nwhole, presents fairly in all material respects the information set forth therein. \n\nAs discussed in Note 1 to the Ñnancial statements, in 2003 Republic Services, Inc. changed its method of \naccounting for Ñnal capping, closure and post-closure costs relating to its landÑlls and for methane gas \ncollection systems. \n\nWe also have audited, in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States), the eÅectiveness of Republic Services, Inc.'s internal control over Ñnancial reporting \nas of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by \nthe Committee of Sponsoring Organizations of the Treadway Commission and our report dated February 24, \n2005, expressed an unqualiÑed opinion thereon. \n\n\n \n \n \n \n [html]\n
Fort Lauderdale, Florida February 24.2005TableTableTable
TableTableTableTable
TableTableTableTable
TableTableTableTable
Table51
", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON INTERNAL CONTROL OVER FINANCIAL REPORTING**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited management's assessment, included in the accompanying Report of Management on \nRepublic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and \nsubsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on \ncriteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring \nOrganizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is \nresponsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the \neÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on \nmanagement's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial \nreporting based on our audit. \n\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether eÅective internal control over Ñnancial reporting was maintained in all material \nrespects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating \nmanagement's assessment, testing and evaluating the design and operating eÅectiveness of internal control, \nand performing such other procedures as we considered necessary in the circumstances. We believe that our \naudits provide a reasonable basis for our opinion. \n\nA company's internal control over Ñnancial reporting is a process designed to provide reasonable \nassurance regarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external \npurposes in accordance with generally accepted accounting principles. A company's internal control over \nÑnancial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, \nin reasonable detail, accurately and fairly reÖect the transactions and dispositions of the assets of the company; \n(2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of Ñnancial \nstatements in accordance with generally accepted accounting principles, and that receipts and expenditures of \nthe company are being made only in accordance with authorizations of management and directors of the \ncompany; and (3) provide reasonable assurance regarding prevention or timely detection of unauthorized \nacquisition, use, or disposition of the company's assets that could have a material eÅect on the Ñnancial \nstatements. \n\nBecause of its inherent limitations, internal control over Ñnancial reporting may not prevent or detect \nmisstatements. Also, projections of any evaluation of eÅectiveness to future periods are subject to the risk that \ncontrols may become inadequate because of changes in conditions, or that the degree of compliance with the \npolicies and procedures may deteriorate. \n\nIn our opinion, management's assessment that Republic Services, Inc. maintained eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, is fairly stated, in all material respects, based on the \nCOSO criteria. Also, in our opinion, the Company maintained, in all material respects, eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, based on the COSO criteria.", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
YearEnded December31,
200420032002
Patients$ 23$ 177.6$
239.6PercentageSpecification154.0
141.0126.1Specification98.4
92.867.4Patients7.0
5.36.1Specifications13.7
12.7__Specificity57.6
178.973.1Specifications8.0
10.411.2.........10.6
6.74.0Specificity2.1
( 1.8 )( 4.8 )tax...
37.8Patients( 27.5 )
− 21.8 )( 13.6 ).........91.8
( 109.4 )( 5.9 )Patients15.3
9.037.1.......( 2.6 )
61.329.4666.3600.5
569.7Patients( 283.8 )( 273.2 )
( 258.6 ).........5.79.1
14.6Specificity( 47.3 )( 51.5 )
( 55.8 ).........3.2
18.9Patients( 3.7 )( 17.6 )
( 2.7 ).........( 21.4 )( 40.0 )
( 32.7 ).........143.8( 182.4 )
( 206.7 )( 552.4 )( 316.3 )
Specification____( 30.0 )
Specificity88.886.396.9
( 252.2 )( 2.6 )( 2.2 )Patients
38.249.129.9Patients
( 266.1 )( 184.2 )( 150.0 ).........
( 46.0 )( 19.0 ).........
( 72.6 )( 437.3 )
( 70.4 )( 128.0 )ENTS22.3
( 22.3 )125.4ERIOD119.2
141.516.1Patients$ 141.5
$ 119.2$ 141.5
\n\nCASH PROVIDED BY OPERATING ACTIVITIES:", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the \nCompany has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nREGISTRANT: \n\nREPUBLIC SERVICES, INC. \n\nBy: /s/ \n\nJAMES E. O'CONNOR \nJames E. O'Connor \n*Chairman of the Board and Chief Executive OÇcer*\n*(principal executive oÇcer)*\n\nFebruary 25, 2005 \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed by the \nfollowing persons on behalf of the Registrant and in the capacities and on the dates indicated. \n\n**Signature** **Title** **Date**\n\n/s/ JAMES E. O'CONNOR \nJames E. O'Connor \nChairman of the Board and Chief \nExecutive OÇcer (principal \nexecutive oÇcer) \n\nFebruary 25, 2005 \n\n/s/ HARRIS W. HUDSON Vice Chairman and Director February 25, 2005 \nHarris W. Hudson \n\n/s/ TOD C. HOLMES \nTod C. Holmes \nFebruary 25, 2005 \n\nSenior Vice President and Chief \n\nFinancial OÇcer (principal Ñnancial \noÇcer) \n\nVice President and Chief Accounting February 25, 2005 \n\nOÇcer (principal accounting \noÇcer) \n\nDirector February 25, 2005 \n\n/s/ CHARLES F. SERIANNI \nCharles F. Serianni \n\n/s/ JOHN W. CROGHAN \nJohn W. Croghan \n\n/s/ W. LEE NUTTER \nW. Lee Nutter \n\n/s/ RAMON A. RODRIGUEZ \nRamon A. Rodriguez \n\n/s/ ALLAN C. SORENSEN \nAllan C. Sorensen \n\n/s/ MICHAEL W. WICKHAM \nMichael W. Wickham", + "page_start": 100, + "page_end": 100, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions, except earnings per share data )Year\n
Med Decer1,2004
20__2002REVENUE$ 2.7
708.1
$ 2.517.8$ 2.365.1EXPENSES :Cost of operations
1.714.41.605.41.472.9Depreciation, amortization and depletion
259.4239.1199.6Accretion
13.712.7Selling, general and administrative
268.3247.9238.7Other charges ( income )
( 5.6 )OPERATING INCOME
452.3412.7459.5INTEREST EXPENSE
( 76.7 )( 78.0 )( 77.0 )INTEREST INCOME
6.99.54.3OTHER INCOME ( EXPENSE ), NET
1.23.2_ (. 3 )INCOME BEFORE INCOME TAXES
383.7347.4386.5PROVISION FOR INCOME TAXES
145.8132.0146.9INCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN
ACCOUNTING PRINCIPLES
237.9215.4239.6CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING
PRINCIPLES, NET OF TAX( 37.8 )
NET INCOME
$ __2237.9$ _177.6$ 239.6
BASIC EARNINGS PER SHARE :Before cumulative effect of changes in accounting principles$1.56
$1.341Cumulative effect of changes in accounting principles, net of tax
(. 23 )Basic earnings per share................................................................................................................................
. 56
S1.11SpeciesWeighted average common shares outstanding
152.8160.3165.4DILUTED EARNINGS PER SHARE :
Before cumulative effect of changes in accounting principles$1.53$
1.33$1.44Cumulative effect of changes in accounting principles, net of tax
(. 23 )Diluted earnings per share
$ ___
. 53$1.10$ __1.44
Weighted average common and common equivalent shares outstanding..............................____5.3_
62.1__166.7CASH DIVIDENDS PER COMMON SHARE36
", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "On behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \ncreate for both our customers and our people. We care about our customers and the communities we \nserve. About our people. About the environment. And, of course, we care about you -- our \nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \nher business and community. Our goal is to remain flexible and to tailor our services to each \ncustomer. \n\nW. Lee Nutter 2, 3, 4 \n*Chairman, Compensation*\n*Committee*\n*Chairman, President &*\n*Chief Executive Officer*\n*Rayonier, Inc.*\n*(a forest products company)*\n\nMichael W. Wickham 2, 3, 4 \n*Retired Chairman, President*\n*& Chief Executive Officer,*\n*Roadway Corporation*\n\n1*Member, Executive Committee*• 2*Member, Audit Committee*• 3*Member, Compensation Committee*• 4*Member, Nominating and Corporate Governance Committee*\n\nOfficers \n\nJames E. O’Connor \n*Chairman & Chief Executive Officer*\nMichael J. Cordesman \n*President & Chief Operating Officer*\nDavid A. Barclay \n*Senior Vice President & General Counsel*\nTod C. Holmes \n*Senior Vice President & Chief Financial Officer*\nLee V. Twyford \n*Senior Vice President & Chief Information Officer*\nBrian A. Bales \n*Vice President, Corporate Development*\nKenneth M. Baylor \n*Vice President, Employee & Labor Relations*\n\nWilliam C. Flower \n*Vice President, Communications*\nMatthew D. Katz \n*Vice President & Associate General Counsel*\nRonald R. Krall \n*Regional Vice President - Eastern Region*\nEdward A. Lang III \n*Vice President, Finance & Treasurer*\nThomas E. Miller \n*Regional Vice President - Southwest Region*\nCraig J. Nichols \n*Vice President, Human Resources*\nCharles F. Serianni \n*Vice President & Chief Accounting Officer*\nRobert N. Shepard \n*Regional Vice President - Southern Region*\nGary L. Sova \n*Vice President, Marketing & Sales*\nKevin C. Walbridge \n*Regional Vice President - Central Region*\nGerard W. Wickett \n*Vice President, Purchasing & Maintenance*\n\nTim M. Benter \n*Vice President & Associate General Counsel*\n\nJerry S. Clark \n*Vice President & Controller*\nPaul J. Connealy \n*Vice President, Tax*\nMatthew E. Davies \n*Vice President, Environmental Engineering & Compliance*\nArthur J. Dudzinski \n*Regional Vice President - Western Region*", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**EXHIBIT 23.1**\n\n**CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n\nWe consent to the incorporation by reference in the Registration Statements (Form S-8 Nos. 333-81801, \n333-78125, 333-45542 and 333-104048) pertaining to the Republic Services 401(k) Plan, 1998 Stock \nIncentive Plan, Republic Services, Inc. Amended and Restated Employee Stock Purchase Plan, and Republic \nServices, Inc. Amended and Restated 1998 Stock Incentive Plan, respectively, of our reports dated \nFebruary 24, 2005, with respect to the consolidated Ñnancial statements and schedule of Republic Services, \nInc., Republic Services, Inc. management's assessment of the eÅectiveness of internal control over Ñnancial \nreporting, and the eÅectiveness of internal control over Ñnancial reporting of Republic Services, Inc., included \nin this Annual Report (Form 10-K) for the year ended December 31, 2004.", + "page_start": 102, + "page_end": 102, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally \nmade on a basis intended to reÖect the market value of such services. \n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for \nfurther information.) \n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity \nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:", + "page_start": 88, + "page_end": 88, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "How mush did the Moomba incident cost to Santos in 2004 ?", + "target_page": 12, + "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "A large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. \n\nImportantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \n\n\n \n \n \n \n [html]decline reduced n by a furthern boe.to effectively control its casts in the face of significant external pressures in the form of risingthese factors, Santos ’ ojects are starting to jine and have bequn toExamining production costs in detail. reveals :edecline experienced oast three years. Two vere commissioned in Bayu - Undan liquids▪ the start - up of Bayu - Undan and acquisitions added $ 16 million to Santos ’ cost baseand the Minerva gas n addition, acquisitions▪ changes in our accounting added a further $ 16 million to Santos ’ production costsproduction is expected• higher insurance premiums ($ 8 mllion ) and one - off stock res.The impact of the ncident. Santos now roduction to be around boe in 2005. Thisoffset by $ 17 million in cost savings largely as a result of Santos ' continuous improvement initiativess largely driven by the oning of Mutineer - Exeter 2005 and the 3ohnthe Moomba incident resulted in $ 17 million of one - off costs in 2004.as field in the middle ar.Piecing this together, the key themes in our financial performance were :ION COSTS DNTROLcosts in 2004 were lon, up $ 45 million or 003. Analysis shows os was able to continue\n
▪ cost savings in established production areas more than offset increases in the price of services and materialsMean definitionε0Santos ’ cost : base rose as production from new developments and acquisitions were added to the Company ’ s expanding portfolio of producing assets.
0.465Table4030
zo32710
", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n**1,544.3**\n**–**\n**3.5**\n**14.5**\n**19.9**\n**(583.6)**\n**(169.6)**\n**(65.2)**\n**(158.8)** 1,637.3 \n0.4 \n2.5 \n17.0 \n28.2 \n(439.9) \n(118.7) \n(60.9) \n(168.6) **644.4**\n**251.7**\n**45.1**\n**19.0**\n**18.0**\n**(279.0)**\n**(78.4)**\n**(90.6)**\n**(137.5)** 683.0 \n0.4 \n36.9 \n22.1 \n1.6 \n(186.4) \n(39.8) \n(83.6) \n(65.1) \n\n**605.0** 897.3 **392.7** 369.1 \n\n**Cash flows from operating activities**\nReceipts from customers \nDividends received \nInterest received \nOverriding royalties received \nPipeline tariffs and other receipts \nPayments to suppliers and employees \nRoyalty, excise and PRRT payments \nBorrowing costs paid \nIncome taxes paid \n\n**Net cash provided by operating activities**\n\n**Cash flows from investing activities**\nPayments for: \n\nExploration \nDelineation \nDevelopment \nLand and buildings, plant and equipment \nAcquisitions of oil and gas assets \nAcquisitions of controlled entities \nShare subscriptions in controlled entities \nRestoration \n\nProceeds from disposal of non-current assets \nProceeds from disposal of controlled entities \nOther investments \n\n**Net cash used in investing activities**\n\n**Cash flows from financing activities**\nDividends paid \nProceeds from issues of ordinary shares \nProceeds from issue of redeemable convertible preference shares \nRedemption of reset convertible preference shares \nNet drawdowns/(repayments) of borrowings \nNet (payments to)/receipts from controlled entities \nPremium paid on buy-back of reset convertible preference shares \nOther \n\n**Net cash (used in)/provided by financing activities**\n\n**Net increase/(decrease) in cash**\n**Cash at the beginning of the year**\nEffects of exchange rate changes on the balances of cash held in foreign currencies \n\n**Cash at the end of the year**\n\n(149.8) \n(75.0) \n(188.1) \n(337.8) \n(7.6) \n(22.7) \n– \n(2.6) \n108.0 \n22.6 \n– \n\n(653.0) \n\n(198.0) \n8.3 \n– \n– \n(20.4) \n– \n– \n– \n\n(210.1) \n\n34.2 \n84.8 \n(7.9) \n\n111.1 \n\n**(65.7)**\n**(6.1)**\n**(124.4)**\n**(127.7)**\n**–**\n**(93.6)**\n**(151.7)**\n**(0.1)**\n**430.0**\n**–**\n**(0.5)**\n\n**(139.8)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**–**\n**(297.0)**\n**(2.4)**\n**–**\n\n**(266.3)**\n\n**(13.4)**\n**52.9**\n**(0.2)**\n\n**39.3**\n\n(30.6) \n(29.5) \n(68.7) \n(91.7) \n(1.5) \n(22.7) \n(469.9) \n(0.3) \n62.7 \n3.9 \n– \n\n(648.3) \n\n(198.0) \n8.3 \n– \n– \n– \n494.1 \n– \n– \n\n304.4 \n\n25.2 \n26.6 \n1.1 \n\n52.9 \n\n**(126.0)**\n**(73.7)**\n**(256.1)**\n**(343.1)**\n**(14.5)**\n**(112.3)**\n**–**\n**(7.3)**\n**39.9**\n**–**\n**(0.5)**\n\n**(893.6)**\n\n**(212.8)**\n**6.4**\n**589.5**\n**(350.0)**\n**282.8**\n**–**\n**(2.4)**\n**0.4**\n\n18 \n18 \n\n**313.9**\n\n**25.3**\n**111.1**\n**(8.4)**\n\n**128.0**\n\nThe statements of cash flows are to be read in conjunction with the notes of the financial statements.", + "page_start": 53, + "page_end": 53, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **29. Commitments for Expenditure**\n\nThe Santos Group has the following commitments for expenditure: \n**(a) Capital commitments**\n\nCapital expenditure contracted for at balance date for which no amounts \nhave been provided in the financial statements: \n\nDue not later than one year \nDue later than one year but not later than five years **253.5**\n**13.4** 237.7 \n33.2 **93.9**\n**8.2** 84.3 \n0.2 \n\n**266.9** 270.9 **102.1** 84.5 \n\nSantos Ltd has guaranteed the capital commitments of certain controlled entities \n(refer note 31 for further details). \n**(b) Minimum exploration commitments**\n\nMinimum exploration commitments for which no amounts have been provided \nin the financial statement or capital commitments: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years **42.1**\n**118.8**\n**11.6** 108.2 \n207.7 \n31.4 **10.3**\n**61.2**\n**–** 36.5 \n70.9 \n– \n\n**172.5** 347.3 **71.5** 107.4 \n\nThe Santos Group has certain obligations to perform minimum exploration work and expend \nminimum amounts of money pursuant to the terms of the granting of petroleum \nexploration permits in order to maintain rights of tenure. These commitments may be \nvaried as a result of renegotiations of the terms of the exploration permits, licences or \ncontracts or alternatively upon their relinquishment. The minimum exploration \ncommitments are less than the normal level of exploration expenditures expected to be \nundertaken by Santos Ltd and its controlled entities. \n\n**(c) Lease commitments**\nOperating leases: \n\nDue not later than one year \nDue later than one year but not later than five years \nDue later than five years \n\n**54.7**\n**102.9**\n**0.1** 39.1 \n140.1 \n19.0 **8.4**\n**21.1**\n**–** 18.7 \n115.1 \n18.9 \n\n**157.7** 198.2 **29.5** 152.7 \n\n**30. Superannuation Commitments**\n\nSantos Ltd and certain controlled entities participate in a number of superannuation funds and pension plans in Australia and the United States of \nAmerica. From 1 February 2002, three of the more significant employee benefit plans were combined into a single plan which provides benefits either \non a defined benefit or cash accumulation basis for employees or their dependants on retirement, resignation, temporary or permanent disablement \nor death. The employers and employee members make contributions as specified in the rules of the plan. \n\nIn the case of the defined benefit component of the combined plan, employer contributions are based on the advice of the plan’s actuary. The most \nrecent actuarial assessment of the plan was undertaken as at 1 January 2004. \n\nThe following is a summary of the Santos Superannuation Plan: \n\n**Type of benefit**\n**Basis of contributions**\n\n\n \n \n \n \n [html]\n
Type of benefitDefined benefits and cash accumulation
Basis of contributions
Percentage of member ' s salary contributed by member and employers. The employer ' s percentage reflects the amount to provide an accumulation and the amount recommended by the actuary to provide the defined benefit.Last actuarial assessment :
Balance date1 January 2004
Date issued20 December 2004
", + "page_start": 83, + "page_end": 83, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "At 31 December 2004 the Santos Group has open oil price swap contracts with settlement expiry dates up to nine months. If closed out at \nbalance date these contracts would have resulted in a loss of $11.2 million (2003: loss of $1.8 million). \n\n**(d) Credit risk exposure**\n\nCredit risk represents the potential financial loss if counterparties fail to perform as contracted. \n\nThe credit risk on financial assets, excluding investments, of the Santos Group which have been recognised on the statements of financial \nposition is indicated by the carrying amount. \n\nThe credit risk on off-balance sheet derivatives is the cost of replacing the contract if the counterparty were to default and is measured by their \nmarket value at balance date. As at 31 December 2004, counterparty default of foreign currency swaps, foreign currency option contracts, oil \nprice swap contracts and interest rate swap contracts would result in a loss of $37.2 million (2003: loss of $61.9 million). \n\nThe Santos Group controls credit risk on derivative financial instruments by setting exposure limits related to the credit worthiness of \ncounterparties, all of which are selected banks or institutions with a Standard and Poor’s rating of A or better. \n\n85 Annual Report 2004", + "page_start": 86, + "page_end": 86, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**‘During 2004 we brought**\n**together everyone at Santos**\n**responsible for commercialisation**\n**into a single team. One of the**\n**outcomes from this was the**\n**introduction of gas swaps,**\n**where we were able to move**\n**gas between Santos assets in**\n**different states.’**\n\n**RICK WILKINSON**\nVice President \nGas Marketing \nand Commercialisation \n\n\n \n \n \n \n [html]\n
MALE0 NEGOTIATIONSADVANCEDsubsidiary, Santos Direct Pty Ltd (‘ Santos Direct ’).higher volumes of crude oil that Santos will receive from
0utside Australia, Santos and its co - venturers have executed a Heads of Agreement for the sale of the entire gas reserves of the Maleo field offshore EastSantos Direct will market Santos ' 10 % share of gas production from the Minerva field – around 15 T2 / d – in the offshore 0tway Proisprojects, coming on stream in 2005, and the increasing globalisation of the liquids marketplace.
Java, Indonesia, Santos continued negotiations with PT Perusahaan Gas Negara, Indonesia ’ s state - owned gas distributor, on behalf of the joint venture to finalise the Gas Sales Agreement. The project is targeting firstproalsistin as ure end or association as The move to market and sell gas directly into the Wictorian retail market is a first for Santos and leverages off Santos ' position as one of Australia ' s largest gasThe validity of this approach has already been demonstrated by the sale of the first Mutineer - Exeter oil cargo at a premium to Tapis despite a discount for the uncertain delivery date.
production in the first half of 2006 at rates of up to 100 mmcf / d for more than five years.producers, supplying wholesale gas to major industrial customers and specialist marketers in all.Santos continues to build an inventory of high quality options to provide a platform
FIRST RETAIL GAS SALES WITH SANTOS DIRECTterritones.the coming years. Santos 1s committed to a program of
As well as selling gas into the wholesale gas market, SantosLTQUIDS MARKETING ALLLIANCE WITH BPsecured a retail. gas licence from the Victorian Government in 2004. This allows Santos to sell.
Another important marketing development during the year was the decision to outsource thelegacy asset. Most importantly, this involves leveraging the strengths of the coregas direct to industrial customer and into the Victorian spot
\n\n\n\n**The alignment of joint venture**\n**interests in the John Brookes and**\n**East Spar fields has created an**\n**important production hub at**\n**Varanus Island, Carnarvon Basin,**\n**offshore Western Australia.**", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**32. Additional Financial Instruments Disclosure**\n\n**(a) Foreign exchange risk exposure**\n\nThe Santos Group is exposed to foreign exchange risk principally through the sale of liquid petroleum products denominated in US dollars, \nUS dollar borrowings and US dollar expenditure. In order to hedge this foreign exchange risk, the Santos Group has from time to time entered \ninto forward foreign exchange, foreign currency swap and foreign currency option contracts. \n\nAt 31 December 2004 the Santos Group has one open forward foreign currency exchange contract which has expired in January 2005. If closed \nout at balance date a loss of $0.2 million would have resulted. \n\nUS dollar denominated borrowings are either swapped into Australian dollar exposure (2004: US$321.4 million; 2003: US$115.0 million) or \ndesignated as a hedge of US dollar denominated investments in self-sustaining overseas controlled entities (2004: US$313.0 million; \n2003: US$323.6 million) or as a hedge of future US denominated sales revenues (2004: US$146.4 million; 2003: US$219.4 million). As a result, \nthere were no net foreign currency gains or losses arising from translation of US denominated dollar borrowings recognised in the statements \nof financial performance in 2004. Accordingly, $37.4 million of unrealised foreign currency gains were deferred as at 31 December 2004 \n(2003: gains of $66.3 million). The ultimate foreign currency gains or losses will be included in the measurement of the specific hedged US dollar \ndenominated sales revenues to be realised in the years 2005 through 2006. \n\nThe Australian dollar equivalents of foreign currency monetary items included in the statements of financial position to the extent that they are \nnot effectively hedged are: \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n\n \n \n \n \n [html]0042003\n
20042003$ million$ million
$ million$ millionCurrent assets– United States dollars126.482.7
32.941.3Current liabilities– United States dollars60.535.4
6.58.5Non - current liabilities– United States dollars26.5
", + "page_start": 85, + "page_end": 85, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. \n\nIn Australia, our increasing focus \non the potential of offshore areas \nwill see Santos drill three wells \noff Western Australia in 2005, \none off southern Australia and \ntwo wells off northern Australia. \nWe will also drill two wells \nonshore in Queensland and one \nonshore in Victoria. \n\nThe discovery of oil and gas \nat Hiu Aman in the Kutei Basin, \noffshore East Kalimantan, has \nprovided a strong start to our \n2005 exploration program and \nwe look forward with anticipation \nto further work on that \nsignificant find. Santos has a \n50% interest in the discovery. We \nbelieve this region of Indonesia \nis very promising and Santos \nexpects to drill four wells in the \nKutei Basin in 2005. \n\n**BIGGEST DEVELOPMENT**\n**YEAR YET**\nI am pleased also to report \nthat 2004 was a record year for \ndevelopment with six projects \nadvancing through the pipeline. \n\nSantos has an exciting \nexploration program for 2005: one \nthat I believe holds the highest \nresource potential of any program \nin the Company's 50-year history. \n\n5 Annual Report 2004", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**15. Interest-Bearing Liabilities (continued)**\n\n**(c) Medium-term notes**\n\nThe Santos Group has a A$500.0 million (2003: A$500.0 million) Australian medium-term note program. At 31 December 2004, A$20.0 million \n(2003: A$20.0 million) of medium-term notes have been issued at fixed rate and swapped into floating rates of interest of 6.25% (2003: 6.20%), \nmaturing in 2008. \n\n**(d) Long-term notes**\n\nUS$170.0 million of long-term notes were issued to institutional investors in 1993 at an annual effective interest rate of 6.95% and are \nrepayable in five annual US dollar instalments which commenced in December 2001. As at 31 December 2004, US$34.0 million (A$43.7 million) \nremains outstanding (2003: US$68.0 million equivalent to A$90.8 million). A further US$290.0 million (A$372.5 million) (2003: US$290.0 million \nequivalent to A$387.3 million) of long-term notes were issued to institutional investors in 2000 at an annual effective interest rate of 8.37% \nand are repayable at varying maturity dates between 2007 and 2015. In addition US$300.0 million (A$385.3 million) (2003: US$300.0 million \nequivalent to A$400.6 million) of long-term notes were issued to institutional investors in 2002 at an annual effective interest rate of 6.11% \nand are repayable at varying maturity dates between 2009 and 2022.", + "page_start": 62, + "page_end": 62, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**ACQUIRING NEW ACREAGE**\nFuture exploration success depends \non quality exploration acreage. \nSantos acquired five exploration \nblocks in three hydrocarbon \nprovinces during 2004. The most \nsignificant of these were in Egypt \nand Indonesia. \n\n• the addition of three new \n\n**2004 EXPLORATION**\n**EXPENDITURE BY CATEGORY** **2004 EXPLORATION**\n**EXPENDITURE BY REGION**\n\nventure areas in the shallow \nwaters of the Gulf of Mexico \nand onshore Montana and \nTexas, which significantly \nexpands and diversifies the \nUS exploration acreage and \nprospect inventory \n\nDrilling \n$63.6 million Offshore Australia \n$32.6 million \n\nGeoscience and other \n$37.5 million Onshore Australia \n$23.4 million \n\n• the farm-out of a 60% interest \nand operatorship of the NT/P61 \npermit in the Bonaparte Basin, \noffshore northern Australia to \nConocoPhillips \n\nSeismic \n$17.2 million South East Asia \n$41.4 million \n\nNew ventures \n$7.3 million United States \n$28.2 million \n\nEgypt and surrounding countries \nare a focus area for Santos. The \nCompany has farmed in to three \nexploration blocks in Egypt with \nUS petroleum group, Devon \nEnergy, committing approximately \n$70 million to an eight-well \nexploration joint venture over \nthe next three years in the Gulf \nof Suez. This is Santos’ first move \ninto the North Africa–Middle East \nregion, which is considered the \nworld’s premier hydrocarbon \nprovince. \n\n��� the farm-out of a 16.67% \ninterest in the WA-264-P \npermit offshore Western \nAustralia to Beach Petroleum \n\n• the farm-out of a 70% interest \nin the deep water exploration \nblock, Nth Bali 1 PSC, offshore \nEast Java Basin to Total \nand Mitsui \n\nAn example of this is the strong \nposition Santos has created in \nthe Kutei Basin, with interests in \nthree neighbouring production \nsharing contracts: Popodi, \nDonggala and Papalang. 2004 also marked the year that \nSantos drilled its first operated \ndeep water wells – a significant \nachievement for a company that \nhad its beginnings in a desert \nenvironment. \n\nSantos continues to seek other \nexploration opportunities in this \narea, concentrating on the Gulf \nof Suez and the onshore Desert \nBasins. \n**KUTEI BASIN**\n\nSantos has acquired six \nexploration permits in Indonesia \nover the past three years, \nincluding an interest in the \nDonggala PSC in the Kutei Basin \nduring late 2004. This block lies \nbetween Santos’ other Kutei \nacreage: the Papalang and \nPopodi PSCs. \n\n• the farm-out of a 25% \n\ninterest in the VIC P/51 \nblock containing the Callister \nprospect to Mitsui & Co \nsubsidiary Mitwell Energy \nResources. \n\nThese farm-outs continued the \ntrend of risk-sharing with quality \npartners. \n\n**ADDING MATERIAL PROSPECTS**\nSantos is now in a position that \nexploration success in 2004 and \ngood acreage management has \ncreated future options that will \nultimately translate into greater \nvalue for the business in 2005 \nand beyond. \n\nThe addition of the Donggala PSC \ngives Santos a particularly strong \npresence in the Kutei Basin and \ncovers a highly prospective trend, \nwhile adding to the Company’s \ngrowing Indonesian operations. \n\nThis has been achieved by \nfocusing on ‘basin excellence’. \nThis means becoming a technical \nleader in basins, within our focus \nareas, entering early where \npossible to keep entry costs \ndown, balancing the commercial \nand the technical risks and \nselecting the right co-venturers. \n\nOther exploration acreage \nportfolio management and \nactivities during 2004 included: \n\n• the award of exploration permit \n\nT/36P in the Sorell Basin, \noffshore Tasmania \n\nAnnual Report 2004", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What is the main focus of the Santos 2005 program ?", + "target_page": 19, + "target_passage": " Oil is the main focus of the 2005 program", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "We expect to participate in \ndrilling a record 157 wells during \n2005, of which 25 are exploration \nwildcat wells. Consistent with \nthe growing internationalisation \nof Santos, this includes eight \nwells in Indonesia and six wells \nin the Gulf of Suez, Egypt. This \nprogram offers an attractive \ncombination of risk and reward \nand is a new focus to our \noverseas exploration effort. \n\nis also located in relatively \nshallow water with infrastructure \nnearby, creating options for \nearly production. \n\nProduction is expected to rise \nin 2005 when, as usual, our \nfinancial performance will be \nsubject to oil prices, exchange \nrates and interest rates. These \nfactors have a significant effect \non our bottom line. A US$1 per \nbarrel change in the oil price \nequates to a A$16 million change \nin net profit after tax in 2005. \n\nBayu-Undan is currently stripping \nliquids and re-injecting the gas \npending tie-in of the pipeline to \nDarwin in May 2005 for future \nLNG production. The onshore LNG \nfacilities are more than two-thirds \ncomplete. With a gross production \nof 19 million barrels, 22% above \nexpectations for the year, we were \npleased with the performance of \nBayu-Undan and look forward to \na full year contribution from this \nexciting project in 2005. \n\nAt Santos, we are proud that an \nAustralian company took on that \nchallenge and succeeded, and I \ncongratulate the exploration and \ndrilling teams on a great effort. \nWith the Jeruk discovery behind \nus, Indonesia is at the forefront \nof our international exploration \nefforts. With eight wells planned \nin the region for 2005, Santos is \ncurrently the most active explorer \nin Indonesia. \n\nA one US cent movement in the \nAustralia–US dollar exchange rate \nwould produce a change in profit \nafter tax of A$8 million, and \na 1% change in interest rates \nequates to a change in net profit \nafter tax of A$9 million. \n\n**A STRONG FINANCIAL**\n**PERFORMANCE**\nIt was pleasing that Santos \nwas able to conclude 2004 \non a higher note than it started. \n2004 has also been an important \nperiod for shareholders, with a \nsignificant improvement in the \nSantos share price combined with \nan increase in the dividend. \n\nWe achieved record annual \nrevenue thanks to higher oil and \ngas prices combined with the \nreturn of full production at \nMoomba to produce a 21.5% jump \nin second half sales: the best \nresult for any six-month period \nin Santos' history. \n\nThe average realised price for \ncrude oil was up nearly 19% \nto A$51.83 per barrel. \n\nIn the US, two exploration wells \nare planned, one onshore, and \none offshore in the shallow \nwaters of the Gulf of Mexico. \n\nThe Minerva gas field off \nVictoria's western coast started \nproduction in December 2004 \nand is ramping up to full field \nproduction of around 150 TJ \nper day. Our share in this project \nis 10%, and is significant because \nit represents our first foray \ninto marketing gas directly to \ncustomers or into the Victorian \nspot market through our sales \nvehicle, Santos Direct, aimed \nat delivering higher prices. \n\n**PRODUCTION TO REBOUND**\nWhile we expected lower \nproduction overall in 2004, our \noutput was obviously curtailed \nfurther by the incident at the \nMoomba plant. The good news \nis that several projects emerged \nfrom the development pipeline \nduring the year and made positive \ncontributions to our expanding \nsuite of oil and gas facilities. \n**RECORD EXPLORATION**\n**EFFORT AHEAD**\nExploration is a great way to \nincrease shareholder value so \nI am pleased to be able to report \nthat in 2004, Santos drilled 16 \nwildcat wells resulting in seven \nhydrocarbon discoveries. \n\nThese results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004.", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. \n\nIn Australia, our increasing focus \non the potential of offshore areas \nwill see Santos drill three wells \noff Western Australia in 2005, \none off southern Australia and \ntwo wells off northern Australia. \nWe will also drill two wells \nonshore in Queensland and one \nonshore in Victoria. \n\nThe discovery of oil and gas \nat Hiu Aman in the Kutei Basin, \noffshore East Kalimantan, has \nprovided a strong start to our \n2005 exploration program and \nwe look forward with anticipation \nto further work on that \nsignificant find. Santos has a \n50% interest in the discovery. We \nbelieve this region of Indonesia \nis very promising and Santos \nexpects to drill four wells in the \nKutei Basin in 2005. \n\n**BIGGEST DEVELOPMENT**\n**YEAR YET**\nI am pleased also to report \nthat 2004 was a record year for \ndevelopment with six projects \nadvancing through the pipeline. \n\nSantos has an exciting \nexploration program for 2005: one \nthat I believe holds the highest \nresource potential of any program \nin the Company's 50-year history. \n\n5 Annual Report 2004", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "across Santos operations. The \nlong-term environmental and \nfinancial benefits of using this \ntechnology are expected to be \nconsiderable. \n\nSantos has a number of long-term \nprojects underway which will \noptimise the substantial \ninvestment the Company makes \nin training people. Importantly, \nthese projects will deliver \nprograms that are targeted to \nmeet business and individual \nneeds and to support culture \nchange initiatives. \n\n**REDUCED OIL SPILLS**\nThere was a substantial reduction \nin the volume of hydrocarbons \nreleased to the environment \nin 2004, with uncontained \nhydrocarbons spilt reducing from \n1,943 cubic metres to 83 cubic \nmetres and Santos continues to \nfocus on reducing oil spills. \n\n**BANKSIA AWARDS**\nSantos was selected in 2004 \nas a finalist in the Banksia \nEnvironmental Awards for the \nwork undertaken in the Company- \nled initiative to protect the \nworld-renowned Coongie Lakes, \nresulting in the area being \ndeclared a new National Park by \nthe South Australian Government. \n**GREENHOUSE POLICY**\nSantos released its Greenhouse \nPolicy in 2004 to drive performance \nimprovements in this area through \nreducing emissions and producing \noil and gas more efficiently. \n\n\n\nAs a finalist for this award Santos \nwas recognised for its leadership \nrole in bringing together a group \nof disparate parties to develop a \nMemorandum of Understanding \nrecommending further protection \nfor the Coongie Lakes. \n\nSantos’ Greenhouse Policy is \nbeing rolled out across the \norganisation through cross- \nfunctional greenhouse gas teams \nthat have the right skill sets and \nresponsibilities to progress this \ninitiative. These teams will \nmanage Greenhouse Policy and \nregulation, carbon management \nand trading opportunities, and \nenergy efficiency. A key internal \ndriver for emissions reduction \nwill be the promotion of energy \nefficiency. \n\n**Santos is investing in the future of Australia’s petroleum industry**\n**through the funding of the Australian School of Petroleum at the**\n**University of Adelaide.**\n\n**WASTE MANAGEMENT**\nSantos trialled innovative waste \nmanagement techniques during \n2004 to reduce the volume of \nhydrocarbon waste generated \nfrom Cooper Basin operations. \nPreliminary results indicate that \nthese waste volumes can be \nreduced to 3-5% of their original \nvolume, which is a significant \nachievement. \n\nSantos is committed to achieving \neffective emission reduction \ntargets, to the pursuit of energy \nefficiency strategies and to the \nidentification and implementation \nThis technology will be \nimplemented where possible", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "[html]The Santos base business comprises production from assets in all of the Company ’ s extisting producing fields.and increased interests at Patricia - Baleen. Amadeus Basin gas production remained flat as declining production wasdelineation wells on the deepFrio trend contributed with improved condensate content during the year.program achieved better than predicted rate improvements for all three gas wells. Three means wells. Three management, c2I exercise than therefore and there weill exercise therefore and there weill exercise the treatments will exerciSantos is countering decline from mature fields with strategies such as optimisation and trialling new technologies to maximise output, while running an explorationdevelopment drilling during the second half of 2004 at Palm Valley and Mereenie.LPG production declined by 34 % to 158.600 tonnes in 2004 from 240.700 tonnes in 2003, due mainly to the effectsThese programs will now be extended to a variety of more complex and possibly harsher oil and gas wellbore / reservolr environments during 2005.while running an exploration program which aims to add new projects and production.Crude oil production was 13 % lower at 9.5 million barrels, down from 10.9 million barrels in theof the Moomba incident on the production of liquids through the liquids recovery plant. ProductionSantos increased gas well deliverability in the Cooper Basin by 63 TJ per day throughAt all times, ensuring the safety of all operations and minimising any environmental impacts remains paramount.β - cHour y - area would declined at Stag. Legendre and 3abiru - Challis. Successful infill drilling at Legendre and Stag helped turn around declines forTotal body partially offset this decrease. APPLYING NEW TECHN0L0GIES Reservoir studies have identifiednumerous projects brought online during 2004. Some 8 PJ of incremental gas production resulted during 2004 from this resultinis - wilce sprearment2004 PRODUCT10.13NPACTEDBY KOOKIIA. INCIDENTSantor ' total production in 2004. fell from $ 4.2 million boe in 2003 to 47.1 million boe, primarily due to the effects of the 1.2anuarythese fields during the second half of 2006. The program to improve production at Stag will continue into 2005 as simulation studies suggest further drilling and lincreased water injectionural : suine : owen perineasuring reservoirs may have significant potential to increase recoveries through activities such as additional Infilt drilting, fracture stimulation and waterflooding.optimacon program, 19ext results were achieved at a significantly lower cost than conventional development drilling and substantially exceeded targets set at the beginning of the year.incident at Moomba that resulted in a reduction of 4.6 million boe, together with declining performance from the East Spar and Stag fields in the Carnarvon Basin, offshore Western Australia.Cooper Basin oil production declined just 4 % during 2004 due to successful delineation, development and production optimisation at several fields, particularly Merrimelia, Derrilynin the Cooper Basin in drilling, completions and artificial lift optimisation during 2006 to improve product delivery and recovery In order to reduce production costs per unit.While the Cooper Basin is a mature hydrocarbon area, Santos Is drilling wells which can be commercialised quickly and cost - effectively, delivering strong cash flow which can be appliedSales gas and ethane production fell 14 % during the year from 22.8 P3 to 190.5 P3. Productionparticularly Merrimelia, Derrilyn and Mulberry. Amadeus Basin oil production declines were madeTo this end, further reductions in costs for 2005 are", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**‘During 2004 we brought**\n**together everyone at Santos**\n**responsible for commercialisation**\n**into a single team. One of the**\n**outcomes from this was the**\n**introduction of gas swaps,**\n**where we were able to move**\n**gas between Santos assets in**\n**different states.’**\n\n**RICK WILKINSON**\nVice President \nGas Marketing \nand Commercialisation \n\n\n \n \n \n \n [html]\n
MALE0 NEGOTIATIONSADVANCEDsubsidiary, Santos Direct Pty Ltd (‘ Santos Direct ’).higher volumes of crude oil that Santos will receive from
0utside Australia, Santos and its co - venturers have executed a Heads of Agreement for the sale of the entire gas reserves of the Maleo field offshore EastSantos Direct will market Santos ' 10 % share of gas production from the Minerva field – around 15 T2 / d – in the offshore 0tway Proisprojects, coming on stream in 2005, and the increasing globalisation of the liquids marketplace.
Java, Indonesia, Santos continued negotiations with PT Perusahaan Gas Negara, Indonesia ’ s state - owned gas distributor, on behalf of the joint venture to finalise the Gas Sales Agreement. The project is targeting firstproalsistin as ure end or association as The move to market and sell gas directly into the Wictorian retail market is a first for Santos and leverages off Santos ' position as one of Australia ' s largest gasThe validity of this approach has already been demonstrated by the sale of the first Mutineer - Exeter oil cargo at a premium to Tapis despite a discount for the uncertain delivery date.
production in the first half of 2006 at rates of up to 100 mmcf / d for more than five years.producers, supplying wholesale gas to major industrial customers and specialist marketers in all.Santos continues to build an inventory of high quality options to provide a platform
FIRST RETAIL GAS SALES WITH SANTOS DIRECTterritones.the coming years. Santos 1s committed to a program of
As well as selling gas into the wholesale gas market, SantosLTQUIDS MARKETING ALLLIANCE WITH BPsecured a retail. gas licence from the Victorian Government in 2004. This allows Santos to sell.
Another important marketing development during the year was the decision to outsource thelegacy asset. Most importantly, this involves leveraging the strengths of the coregas direct to industrial customer and into the Victorian spot
\n\n\n\n**The alignment of joint venture**\n**interests in the John Brookes and**\n**East Spar fields has created an**\n**important production hub at**\n**Varanus Island, Carnarvon Basin,**\n**offshore Western Australia.**", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Listed on Australian Stock Exchange at 28 February 2005 were 585,390,738 fully paid ordinary shares and 6,000,000 redeemable convertible \npreference shares. Unlisted were 67,250 partly paid Plan 0 shares, 57,750 partly paid Plan 2 shares, 32,400 fully paid ordinary shares issued pursuant \nto the Santos Employee Share Purchase Plan (‘SESPP’) for General Employee Participation and 178,027 fully paid ordinary shares issued pursuant to \nSESPP for Senior Executive Long Term Incentive. Also unlisted were 50,000 fully paid ordinary shares issued consequent upon exercise of 50,000 \noptions granted pursuant to the Santos Executive Share Option Plan, an application for quotation of which has been lodged with the Australian Stock \nExchange. There were: 79,423 holders of all classes of issued ordinary shares (including 9 holders of Plan 0 shares; 8 holders of Plan 2 shares; and 76 \nholders of SESPP shares) compared with 84,977 a year earlier; 15,479 holders of redeemable convertible preference shares; and 22 holders of the \n5,438,972 options granted pursuant to the Santos Executive Share Option Plan. \n\nThe listed issued ordinary shares plus the ordinary shares issued pursuant to SESPP represent all of the voting power in Santos. The holdings of the \n20 largest holders of ordinary shares represent 52.65% of the total voting power in Santos (last year 48.2%) and the holdings of the 20 largest \nholders of redeemable convertible preference shares represent 43.08% of the issued redeemable convertible preference shares. \n\nThere is no current on-market buy-back. \n\nThe 20 largest shareholders of fully paid ordinary shares in Santos as shown in the Company’s Register of Members at 28 February 2005 were:", + "page_start": 91, + "page_end": 91, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. \n\nImportantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "…TO DELIVER ON THE STRATEGY \nSantos continues to tap into the spirit and commitment of the \nentrepreneurs and explorers who laid the Company’s foundations \nas we deliver on our growth strategy. \n\nToday, Santos is a major Australian oil and gas exploration and \nproduction company growing a global energy business through:", + "page_start": 2, + "page_end": 2, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**NOTICE OF MEETING**\nThe Annual General Meeting of Santos Ltd will be held in the Auditorium \nat The Adelaide Town Hall Function Centre, 128 King William Street, \nAdelaide, South Australia on Friday 20 May 2005 at 10.00 am. \n\nOther investor information available on the Santos website includes: \n\n• live and archived webcasts of investor briefings \n\n**FINAL DIVIDEND**\nThe 2004 final ordinary dividend will be paid on 31 March 2005 to \nshareholders registered in the books of the Company at the close of \nbusiness on 4 March 2005 in respect of fully paid shares held at record \ndate. \n\nThe Santos website provides shareholder forms to help shareholders \nmanage their holdings, as well as a full history of Santos’ dividend \npayments and equity issues. Shareholders can also check their holdings \nand payment history in the secure View Shareholding section. \n\n**STOCK EXCHANGE LISTING**\nSantos Ltd. Incorporated in Adelaide, South Australia, on 18 March \n1954. Quoted on the official list of the Australian Stock Exchange Ltd \n(ordinary shares code STO; FUELS code STOPB) and the NZX Ltd. \n\nSantos’ website also provides an online Conversion Calculator, which \ninstantly computes equivalent values of the most common units of \nmeasurement in the oil and gas industry. \n\n**AMERICAN DEPOSITORY RECEIPTS**\nSantos American Depository Receipts issued by Morgan Guaranty in the \nUSA are sponsored and are quoted on the NASDAQ system in the USA \n(code STOSY). \n\n**Publications**\nThe Annual Report and the Sustainability Review are the major sources \nof printed information about Santos. Printed copies are available from \nthe Share Registrar or Investor Relations. \n\n**DIRECTORS**\nS Gerlach (Chairman), J C Ellice-Flint (Managing Director), P C Barnett, \nK A Dean, R M Harding, G W McGregor, M A O’Leary, C J Recny, J Sloan. \nF J Conroy (retired 14 December 2004). \n**SHAREHOLDER ENQUIRIES**\nEnquiries about shareholdings should be directed to: \n\n**SECRETARY**\nM G Roberts (retired 1 July 2004). \nW J Glanville (appointed 23 February 2004). \nMr Glanville is responsible for corporate governance, secretariat and \nlegal services. Prior to his appointment, he was Manager – Legal of \nSantos’ Legal Department and, prior to joining Santos, he practised law \nas a Barrister and Solicitor. Mr Glanville holds a Degree of Bachelor of \nLaws, a Degree of Bachelor of Arts and a Graduate Diploma in Legal \nPractice. \n\nShare Registrar, Santos Ltd, GPO Box 2455, \nAdelaide, South Australia 5001. Telephone: 08 8218 5111. \nE-mail: share.register@santos.com \n\nInvestor information, other than that relating to a shareholding, can be \nobtained from: \n\nInvestor Relations, Santos Ltd, GPO Box 2455, \nAdelaide, South Australia 5001. Telephone: 08 8218 5111. \nE-mail: investor.relations@santos.com \n\n**CHANGE OF SHAREHOLDER DETAILS**\nIssuer Sponsored Shareholders wishing to update their details must \nnotify the Share Registrar in writing. The relevant shareholder forms can \nbe obtained from the Share Registrar or via the Investor Centre on the \nSantos website, www.santos.com. \n\nElectronic enquiries can also be submitted through the Contact Us \nsection of the Santos website, www.santos.com. \n\n**SHAREHOLDERS’ CALENDAR**\n\n2004 full year results announcement 23 February 2005", + "page_start": 93, + "page_end": 93, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n**commitment to the Our Patch project.**\n\n\n \n \n \n \n [html]\n
of opportunities to use fewer greenhouse - emitting or renewable sources of energy.Partnerships continued in 2004 with the Australian School of Petroleum, the Adelatde SymphonySantos has adopted a patch of the River Torrens and employees are assisting with the remediation
To achieve these commitmentsSantos is actively pursuing anCompany of South Australia, the Art Gallecy of South Australiaa volunteering program.
emissions intensity reduction target ( greenhouse emissionsthe Lloyd McDermott : FoundationCORPORATE GOVERNANCEFor the third year running, the
per unit of production ) of 20 % in the period from 2002 to 2008.Une of the migringhts or the cu program was the establishmentIntegrity of Santos ’ corporate governance was recognised in
SUPPORTING COMMUNITIESIt brings together all of therating in the Corporate
Santos has relationships with a number of communities where itcontributions Santos makes to community - based organisationsGovernance Research Report prepared by Horwath and the
operates. Some have been long -and recognises and supports thUniversity of Newcastle.
", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the primary aim of the OSPRO cohort study ?", + "target_page": 2, + "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Abbreviations \nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of \nReferral and Outcome; OSPRO-ROS: Review of systems screening tool from \nOSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening \ntool from OSPRO cohort study \n\nReceived: 9 November 2017 Accepted: 14 August 2018 \n\nAcknowledgements \nThe authors wish to acknowledge Dr. Roger B. Fillingim and Dr. Nicole M. \nMarlow for their input on study design and analysis. OPT-IN Network \nParticipants included: University of Florida: Joel Bialosky; UF Health: Giorgio \nZeppieri, Jr., Daniel Broome, Marty Huegel, Debi Jones, Steve Emery, Mike \nHodges, Derek Miles, Jodi Davis, Charlene Stubbington, Mike Darcy; ATI \nPhysical Therapy: Ellen Shanley, Thomas Denninger, Jenna Bartsokas, Elise \nHarris, Jordan Floyd, Wade Harrell; University of Southern California: Lori \nMichener, Amy Pomrantz, Brooks Rehabilitation: Raine Osborne, Nata \nSalvatori, John Leschitz, Brian Hagist, Laura Langer, Tim Shreve, Nando \nMalaman, Michael Bourassa, Justin Zych, Tasha Mouton Shanklin; University \nof Illinois at Chicago: Aaron Keil, Brad Myers, Deb Davey, Justin Payette, \nAdam Wielechowski, Richard Severin, Erik Martinez; Indiana State University: \nRyan Hanigan, Carolina Valencia, Danielle Jena, Nicole Woodard; Arcadia \nUniversity: Angela Tate; Life’s Work Physical Therapy: Sandra Stryker, Aaron \nLeonard, Erin Courtney, Brandon Little, Kathryn Jankord, Brad Simpson, \nCharleen Hall, Paige Nixon, Julia Neufeld; University of Colorado, Denver: Paul \nMintken, Virginia Arnette, Andrea Barsch. \n\nFunding \nThis project was supported by the 2013 Clinical Research Network grant \nfrom the Orthopaedic Section, American Physical Therapy Association. The \nfunding body had no role in the design of the study or collection, analysis, \nand interpretation of the data or in writing the manuscript. TAL received \nadditional support from the Foundation for Physical Therapy with Promotion \nof Doctoral Studies I & II (PODS I& II) Awards. SZG and JMB received additional \nsupport from Brooks Rehabilitation while designing this study. JMB received \nsupport from the American National Institutes of Health (NIH) Rehabilitation \nResearch Career Development Program (K12-HD055929). \n\nAvailability of data and materials \nThe data that support the findings of this study are available from the \ncorresponding author upon reasonable request. \n\nAuthors’ contributions \nTAL provided input on study design and analysis plan, drafted the manuscript \nand approved final version of the manuscript. SZG secured funding, provided \noverall design, gave input on the analysis plan and approved final version of \nthe manuscript. JMB provided input on design and analysis plan and approved \nfinal version of the manuscript. \n\nEthics approval and consent to participate \nEthics approval for this study was granted by the University of Florida \nInstitutional Review Board-01 (Study #: 525–2012). All participants provided \nwritten consent to participate in the study. \n\nConsent for publication \nNot applicable. \n\nCompeting interests \nThe authors declare that they have no competing interests. \n\nPublisher’s Note \nSpringer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\nAuthor details \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA. 2Department of Physical Therapy, College of Public Health & \nHealth Professions, University of Florida, Box 100154, UFHSC, Gainesville, FL \n32610-0154, USA. 3Brooks Rehabilitation Clinical Research Center, 3901 \nUniversity Blvd. South, Suite 103, Jacksonville, FL 32216, USA. 4Duke Clinical \nResearch Institute, Department of Orthopaedic Surgery, Duke University, 2400 \nPratt Street, Durham, NC 27705, USA.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "physical therapy settings where \n\nIn future studies, we will embed the OSPRO tools into \nelectronic medical record (EMR) databases to refine and \ntest outcomes prediction models at the health care systems \nlevel. Importantly, we will collect clinical encounter data \nthrough the EMR and combine it with administrative or \nbilling data to confirm the results of this study with more \nobjective measures of health care use. These studies will \nalso allow us to provide better guidance on how to use the \nOSPRO tools to identify serious psychiatric involvement or \nsystemic sources of pain that require medical referral. Fi- \nnally, we will explore alternative scoring strategies for the \ntools, such as weighted scoring for the OSPRO-ROS and \nuse of predicted full-length psychological questionnaire \nscores for the OSPRO-YF. Healthcare providers could then \nuse the collective information from these studies to build \nlearning health systems that facilitate effective, real-time \nclinical decision-making support to improve value of care \nfor patients with musculoskeletal pain. \n\nConclusion \nBaseline disability and change in pain intensity were im- \nportant predictors of \nsubsequent pain-related \nany \nhealthcare utilization, while predictors of individual ser- \nvice utilization were outcome-specific. Identification of \nrisk is improved through treatment monitoring for pain \nand, in some cases, disability and pain-related psycho- \nlogical distress. Comorbidity burden was an important \npredictor of subsequent utilization of opioids and diag- \nnostic tests and imaging, both of which have been recent \ntargets of healthcare policy to constrain their unneces- \nsary use. Future research is needed to refine these pre- \ndictor variables and incorporate them into risk models \nthat support clinical decision-making so that treatment \neffectiveness and efficiency are optimized in value-based \nsystems. \n\nthe clinical encounter might \n\nThird, we were unable to adequately model the spe- \ncific effects of worker’s compensation, self-pay and some", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "The authors also distinguish between the two major principles of legislative approaches in OSH, that is, \neither setting an objective and letting the actors define how this goal can be achieved**(goal-oriented**\n**approach)**, or prescribing also quite detailed measures to reach the objective**(prescriptive**\n**approach)**:352 \n\n*‘There seems to be a general view that the Framework Directive, with its orientation towards a goal-*\n*oriented approach to OSH (rather than prescriptive) successfully lays out a suitable template for*\n*managing workplace risks – but not in itself enough to ensure that all risks are dealt with sufficiently.*\n*One criticism of the goal-setting approach is that the absence of prescriptive intermediate goals makes*\n\n*compliance harder to verify and, in the absence of that verification procedure, harder to enforce*\n*(especially in OSH cultures with a history of the prescriptive approach).’*353 \n\nRegarding the**level of compliance with the legal goals or prescriptions**, the study authors assess it \nas ‘moderate to good.’ They see major differences depending on the topic and the size of the \nenterprises:", + "page_start": 120, + "page_end": 120, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "commercial insurance coverage on utilization due to the \nlow incidence of these forms of payment in our study \nsample. Modeling these separately would have created \nthe potential for unreliable and imprecise effect esti- \nmates. Readers should consider the within-group hetero- \ngeneity caused by this approach and exercise caution \nwhen applying these results to individuals who do not \nhave traditional public or private insurance coverage. Fu- \nture studies should investigate the performance of the \nOSPRO tools in predicting outcomes for patients with \nWorker’s Compensation. \n\nHowever, explained variance estimates in our models \nranged from 34 to 61%, suggesting further research is \nnecessary to identify additional factors contributing to \nhealthcare utilization following physical therapy. \n\nThe primary limitation of the study is the high number \nof subjects lost to follow-up. We attempted to account \nfor the bias introduced by loss to follow-up in our \nmodels with IPAW, which is a robust strategy for con- \nducting analyses with missing data [41, 51]. We observed \ngood concordance between results of complete case and \nweighted analyses, giving us confidence in our findings. \nHowever, important differences in age, race, education, \nsymptom onset, baseline pain intensity, and baseline \npain-related psychological distress were noted between \nthose who did and did not complete follow-up. These \ndifferences suggest that the group lost to follow-up may \nrepresent a unique population to whom these results \nmay not apply. Different factors may predict utilization \noutcomes for this unique population. As a result, readers \nshould exercise caution when extending these findings \nto individuals and populations that substantially differ \nfrom the analytic sample in this study. Specifically, these \npredictive models may need to be adjusted for younger \nindividuals of non-white race, with lower education \nlevels, sudden onset of symptoms, and those with higher \npain intensity and pain-associated distress. \n\nA final limitation is the use of patient recall to meas- \nure utilization. To mitigate recall bias, we used two \nfollow-up points, at 6 and 12 months. However, under- \nor over-reporting of utilization is often a concern with \nstudies requiring subject recall [56–58]. Medical record \nand claims data were not available for these subjects. \nReaders should consider our inability to independently \nconfirm utilization when interpreting results. \n\nA second limitation is that we did not know about the \nsubjects’ prior experiences with physical \ntherapy, or \nwhether they arrived at physical therapy through direct \naccess or referral from another provider. These factors \ncould be associated with treatment expectations, which \nhave known effects on treatment outcomes [52, 53]. We \nalso did not collect specific information on treatment. \nBut by including changes \nin pain, disability, and \npain-related psychological distress in the models, we \nwere able to account for treatment response. The benefit \nof this approach is that models are generalizable for pre- \ndicting utilization outcomes across “real-world” prag- \nmatic \ntreatment \nvariation is expected. The drawback is that we are pro- \nhibited from making conclusions regarding which char- \ninfluence \nacteristics of \nsubsequent pain-related healthcare utilization. Important \ncharacteristics to consider would include number of \nvisits, type of interventions or whether patients com- \npleted their course of physical therapy. These have been \nproposed or identified as important contributors to \ndownstream costs following physical therapy [54, 55] \nand may be a source of unexplained variance in our \nmodels. Characteristics of the clinical encounter should \nbe considered in future studies to refine the prediction \nmodels developed in our analyses. \n\nphysical therapy settings where", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "Modelling methodology \n\nThis brief section outlines the modelling process behind the conclusion in section one, which \nstates that we might expect somewhere between 2,400 and 7,000 individuals from the original \ncohort of users in 2004 to be captured within the 2013 figure of new DIP arrestees (who test \npositive for opiates-only or who are positive-for-both). \n\nWe begin by putting in a plausible range of crime-involved OCUs through the period. This \ncombines the total OCU estimates published by Hay et al., (ranging from around 320,000 OCUs \ndown to around 295,000 in recent years) with available estimates of the percentage who are \nlikely to be committing acquisitive crime. The latter was found to be almost exactly 50% in the \nNTORS study (Gossop et al., 2003). As such, a range of between 170,000 and 100,000 crime- \ninvolved OCUs is likely to include all plausible values (see first row of table below). \n\nWe then calculate the rate at which that population is likely to be arrested and test positive by \nusing the number of individuals testing positive from 2008 (25,433), when DIP was fully up and \nrunning. This gives the second row of the table. Combining the values in the first two rows and \napplying the probability formula given in the main body of the text gives the third row: the \nprobability of first positive DIP test in 2013. Note that this assumes all these individuals continue \nto offend through the period, which may not be the case, hence final results are probably an \nupper bound. The final row simply multiples the figure in the first row by the figure in the third to \ngive our estimate of the original cohort who might appear in the 2013 DIP figures as new.", + "page_start": 41, + "page_end": 41, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Some important questions remain at the end of such a report: \n\n• The**quality of statistics and surveys fades the more irregular are the working**conditions \nbeing studied. Which research methods are adequate for a clearer and more reliable evidence \nbase on these working conditions? It might require research methods different from those used \ntoday, for example, more investigative case studies; it might also be helpful to evaluate the \n**existing national working conditions surveys or statistics**under this aspect. \n\n•**Fading employer–employee relations.**There are special research efforts necessary to study \nthe application of OSH regulations of work with weak or no employer–employee relations, for \nexample, for the self-employed and new forms of employment. \n\n•**Surveys usually suffer a participation bias, for example, for the migrant workforce.**The \nlow participation rate of migrants can contribute to a particular underestimation regarding their \noften unfavourable working conditions. \n\n•**Workers in manual occupations**report**better health than administrative workers**but**less**\n**expectations to do the job until being 60 years old**. What are the reasons behind this? Is it \nthe healthy worker effect, strong occupation-related differences regarding the perception of \nhealth and the expression of health problems? 502,503 \n\n• High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data \nsuggest that**work intensification stopped after 2005**. What might be the reasons? Are the \ncurrent indicators not specific enough to measure developments of work intensity? Has since \nthen the major burden of intensification been put on other types of workers, for example, \nsubcontracted or self-employed, temporary and seasonal workers, or on workers in the global \nsupply chain? \n\n• How much evidence is there that**dangerous work has been increasingly contracted out to**\n**small and medium-size enterprises and the self-employed**? Are there sufficiently detailed \ndata on whether a larger share of service and client-related work at atypical times or work \nrequiring long working hours has been taken over by self-employed or subcontractors? \n\n• The**influence of enterprise size**is often difficult to explain. In several aspects, the SMEs \nperform better, and in other important aspects worse. What might be the reason for this? \n•**How is it possible to overcome the ‘prevention gap’ that in general exists between mobile**\n**and stationary workplaces?**Can the solutions be technical or must there be organisational \nand legal measures, for example, a limitation of the prolonged use of ergonomically inadequate \nequipment like mobile phones? \nImpact of**international and global supply chains on OSH: Does it improve or worsen the**\n**working conditions in the EU?**Research could try to estimate the risk-reducing impact of the \nshift of some high-risk productions to enterprises outside the EU, for example, mining, base \nchemicals, recycling and so on (export of risks), and to estimate the OSH impact of EU export \nproduction, for example, vehicles, specialty chemicals, machines for risks at work inside the EU \n(import of risks). \nIt would also be a big step forward if research could achieve an agreed**standard value or a**\n**standard range**(as reliable as possible) for the**attributable fraction of work**to widespread \ndiseases, that is, cardiovascular diseases, mental and behavioural disorders, musculoskeletal \ndiseases and cancer. \n\n• \n\n•", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "example, in Sweden. 378 Meanwhile, the spectrum of guidance developed regarding work-related \npsychosocial risks is very wide; it covers aspects such as job satisfaction (overall level of wellbeing), \nengagement, performance and work-related stress,379 and also discrimination, harassment, aggression \nand violence.380 \n\n**6.2 EU and national OSH strategies**\nThe EU and many Member States**applied and apply strategic approaches**, based on EU or national \nevidence of the state of OSH. OSH strategies are a steering instrument to focus the activities of all \nactors on major recognised deficits of OSH infrastructures or processes.381 \n\nThe newest**EU Strategic Framework on Health and Safety at Work 2021-2027**puts the focus on \nchange, with the title*‘Occupational safety and health in a changing world of work’*.382 Consequently, the \nstrategic framework focuses on three key objectives for these years: \n\n•*anticipating and managing change in the new world of work brought about by the green, digital*\n*and demographic transitions;*\n\n•*improving prevention of workplace accidents and illnesses;*\n\n•*increasing preparedness for any potential future health crises.*\n\nThe proposed focus areas and actions are related to these three objectives. Under the first key objective \nthere are actions like ‘Modernising and simplifying EU OSH rules in the context of the green and digital \ntransitions’; a special focus is on psychosocial and ergonomic risks. The second objective promotes a \nvision zero approach to work-related deaths, particularly referring to hazardous substances and \ncardiovascular diseases, the promotion of health at work and inclusive workplaces for all.383 \n\nThe third objective responds to the impact of the pandemic situation in 2020 and 2021. It includes the \ndevelopment of emergency procedures for future similar situations (‘Health crisis’). The Strategic \nFramework repeats and corroborates the value of research and data-based evidence by stating: \n*‘Research and data collection, both at EU and national level, are a pre-condition for the prevention of*\n*work-related diseases and accidents. Scientific advice and the latest technological developments feed*\n*into OSH legislation and policy.’*\n\nAlso, many Member States have agreed on provision of better data as an objective in their national \nstrategies.384 The EU strategy often gives orientation for the development of national OSH strategies. \nUnder the last strategy period, 24 of the 27 Member States had applied a strategy. Many national OSH \nstrategies contained similar targets. EU-OSHA published an overview report on national strategies, and \nthe OSH Barometer contains as one indicator a harmonised overview on the aspects of national \nstrategies.385 \n\nOSH strategies are regarded as an important and innovative policy area, a chance for better \ncollaboration, and also a very relevant joint national OSH activity. Those strategies help in priority setting \nand focused action on weaknesses. Strategies were often agreed in social dialogue processes, and \nmany strategy actors also developed new and better monitoring instruments and indicators.386 Labour \ninspections play an important or essential role in most of these strategies. 387 \n\n**OSH Barometer – Steering of OSH, National strategies:**\nhttps://visualisation.osha.europa.eu/osh-barometer/osh-steering/national-strategies \n\n**OSHWiki: Section ‘OSH System at national level’, descriptions of the OSH Systems of**\n**the EU Member States:**https://oshwiki.eu/wiki/Category:OSH_systems_at_national_level \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n124", + "page_start": 123, + "page_end": 123, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "shown to identify approximately 95% of positive red-flag re- \nsponders. For statistical analyses, the “yes” responses were \nadded for each version and included in each model as a \ncontinuous independent variable. \n\n\n \n \n \n \n [html]\n
pain complaint in the time following their physical the treatment :
1.
\n\n2. \n3. Surgery \n4. Diagnostic tests or Imaging (eg. xray, MRI, CT \n\nscan, nerve conduction test, etc.) \nvalidity with pain intensity 5. Emergency room visits \n\nOSPRO Yellow Flag tool (OSPRO-YF) \nThe OSPRO-YF is a yellow flag assessment tool that in- \ncludes items from pain vulnerability domains (negative \naffect and fear-avoidance) and pain resilience domains \n(positive affect and self-efficacy) to aid with identification \nof pain-related psychological distress in outpatient ortho- \npedic physical therapy settings [37]. The OSPRO-YF has \ngood concurrent \nand \nregion-specific disability [37] and is capable of predicting \npain intensity, disability, quality of life and persistent pain \n12 months following physical therapy in patients with \nmusculoskeletal pain [20, 21]. The full-length OSPRO-YF \nhas 17-items, however a shortened 10-item version is also \navailable with an acceptable trade-off in accuracy. Like the \nOSPRO-ROS, the OSPRO-YF is designed for implementa- \ntion into electronic medical record (EMR) systems to \nquickly and accurately identify risk for a variety of clinical \noutcomes [19]. For statistical analyses, a summary score \nwas derived for each version by adding the item responses \nafter reverse-scoring items 2, 13, 14, 15 and 17 so that \nhigher scores indicate higher pain-related psychological \ndistress. The summary score was then included in each \nmodel as a continuous independent variable. \n\n“Yes” responses were followed by questions regarding \nthe quantity of services utilized (i.e. number of opioid \npainkillers, number of diagnostic tests or number of \nemergency room visits). All utilization questions were \nanswered on a categorical scale (0, 1, 2–5, 5–10, or > 10) \nindicating the quantity of a particular service received \nduring the applicable follow-up timeframe. At 6-month \nfollow-up, study participants reported their use of ser- \nvices for the previous 2 months, allowing a timeframe of \n4 months from initial evaluation for them to complete \nphysical therapy. At 12-month follow-up, study partici- \npants reported their use of services over the previous \n6 months since their last survey. This method provided \nan 8-month overall follow-up period after physical ther- \napy and two follow-up points were included to minimize \nrecall bias. \n\nIntervention \nAll physical therapy treatment was provided at the discre- \ntion of the treating clinician. The duration of the episode, \nthe number of physical therapy visits, and individual treat- \nment parameters (type, \nfrequency) \nwere not collected for pragmatic reasons. In particular, \nclinical and utilization data are not commonly collected in \na standardized format and would need to be extracted \nfrom disparate medical record databases across different \nhealth care systems to assess treatment. This was not feas- \nible given the scope and design of \nthis multisite \nsurvey-based study. However, instead of coding treatment \ntype we included baseline-to-4 week change in pain inten- \nsity, region-specific disability, and OSPRO-YF scores in \neach model as measures of treatment response. In that \nmanner the individual effects of the treatment received \nwere included in the predictive models, without directly \naccounting for the type of treatment. \n\nintensity, duration,", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed5.pdf" + }, + { + "text": "**Eurostat**is a major source of OSH-related statistics. First and foremost, Eurostat is responsible for the \nESAW.437 In addition, approximately every six to eight years it adds an ad hoc module on OSH to its \npermanent LFS (1999, 2007, 2013, 2020).438 \n\n**Eurofound**439 contributes substantially to the evidence on the state of OSH by its research on working \nconditions and industrial relations. The EWCS440 is based on interviews with more than 40,000 workers \n(2015) in all EU Member States. The interviewees respond to questions on the quality of their work, \nincluding health and safety issues (every five years). It started in 1991441 and is repeated every five \nyears. Unfortunately, the EWCS 2020 had to be cancelled due to the pandemic situation. In 2021 it was \nconducted as a phone survey with a different approach, so the comparability of the results with previous \nsurveys will be limited. \n\nEU-OSHA conducts every five years a similarly large survey on the practical management of OSH in \nenterprises, called The ‘European Survey of Enterprises on New and Emerging Risks - How European \nworkplaces manage safety and health’ (ESENER). 442 Interviewees are those managers or staff \nmembers who are responsible for, or most closely associated with OSH, or familiar with OSH. This \nsurvey provides detailed information about OSH practices in enterprises covering more than 30 \nEuropean countries. The ESENER methodology substantially changed between 2009 and 2014; in this \nreport, trend descriptions are limited to the comparable surveys of 2014 and 2019. \n\nThe Flash Eurobarometer is a large opinion poll on a large variety of topics related to EU policies and \ndaily life in all EU Member States. In 1992 and 1996, two polls on Europeans and Health and Safety at \nWork gave some insights about the situation at that time.443 In 1997 and 2014, the poll questions were \ndedicated to working conditions,444 in 2018 the poll dealt with ‘Work Life Balance’445 and in 2020 with \n‘Undeclared work’.446 \n\nThe text box below contains some major survey data to illustrate the type of provided data, their \ndevelopment and the methodological changes. \n\n\n \n \n \n \n [html]\n
1990 : 29 % of European workers think that their health could be affected by work ( EWCI 2 Summary, 2.2015 : 23 % of European workers think that their health could be affected by work, minus 6 %, DICI 4 )199E : 25 %, were about from work classic is a work - ribated health problem ( DCL21 ) a flexert ≥ 20 % 2015.40 % were at least once abort from work due to a work - related health problem during the birth 12 months, if I25 ( IPICI ). It ( DCI ) doo voulata
1995 : 15 % hav1 f0 and more days of absence ( 7 % between 10 and 19 days, 6 % more than 20 days 2015.29 % had more than five days of absence due to a health problem ( 59CS10 benefits ). 2015.20 % had more than five days of absence due to a health problem (1925 : 1925 : 1925 : 1925 : 1925 : 1925 : 1925 : 1945 : 190 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 : 000 :
\n\nMany governments, that is, their statistical institutes or the national or federal OSH institutes of EU \nMember States, perform national surveys or enquiries on working conditions and analyse data from \ndifferent sources. 447 Furthermore, data are collected at a national level from the National Labour \nInspectorates, though in many cases they are not publicly available.", + "page_start": 131, + "page_end": 131, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "There is**no strict separation between the following four types for research categories**. For \nexample, the EU-OSHA study ‘Analysis of the determinants of workplace occupational safety and health \npractice in a selection of EU Member States’ 469 includes an analysis of the systems and infrastructures \nas well as of the framework and context influence. To fully cover understanding and support of OSH \nprevention in workplaces, all these types of research are needed.", + "page_start": 133, + "page_end": 133, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the range of the pain rating scale ?", + "target_page": 3, + "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "[24–26]. Participants \n\npain imaginable) \nrated their \ncurrent pain intensity, as well as their best (lowest) and \nworst \nthe past 24 h. \nCurrent, best and worst pain ratings were averaged for \npurposes of analysis. \n\nHealthcare utilization predictors \nWe collected potential predictors by self-reported ques- \ntionnaires at initial evaluation using an online study web- \nsite. Participants were directed back to the study website \n4 weeks following initial evaluation to again complete \nquestions on pain intensity, disability, and pain-related \npsychological distress. Change in pain intensity, disability, \nand pain-related psychological distress from baseline to \n4 weeks were modeled as treatment response variables \nand included as potential predictors. \n\n(highest) pain intensity over \n\nRegion-specific disability \nSelf-reported region-specific disability was assessed with \nthe Neck Disability Index [27, 28], Oswestry Disability \nQuestionnaire [29, 30], Quick Disability of Arm Shoulder \nand Hand [31] or International Knee Documentation \nCommittee Subjective Knee Form [32] for cervical, low \nback, shoulder and knee pain, respectively. Region-specific \ndisability measures were z-transformed for purposes of \nanalysis, consistent with our prior work involving multiple \nanatomical regions [33]. \n\nComorbidities \nCharlson comorbidity index (CCI) \nThe Charlson Comorbidity Index was used to measure \nthe presence of chronic comorbid medical conditions \n[34]. It lists 19 medical conditions that participants are \nasked to indicate whether they “have ever been diag- \nnosed with by a physician”. Conditions are weighted \nand added for an overall measure of comorbidity \nburden. The CCI has demonstrated good test-retest re- \nliability (0.91) and positive but weak to modest correla- \ntions with medication use, hospitalizations, \nlength of \ntotal charges, and pharmacy and laboratory \nstay, \ncharges for older adults in general medical care and \nsurgical care settings [35]. \n\nSociodemographic and health-related information \nParticipants completed a standard intake questionnaire \nform previously used in our clinical studies that assessed \nage, sex, race, and insurance provider type. This ques- \ntionnaire also assessed health-related variables included \nanatomical region of primary pain complaint (low back, \nneck, shoulder, or knee) and whether the patient had \nundergone surgery for their primary pain complaints \n(yes or no). Due to small cell sizes for certain categories, \nrace was dichotomized as white or non-white. For insur- \nance type, participants were asked to choose one of the \nfollowing options: private, public (Medicare and/or Me- \ndicaid), uninsured/self-pay, worker’s compensation, and \nother/commercial insurance. Among the study sample, \nwe observed few with no insurance (n = 7) or worker’s \ncompensation (n = 14). The study also included relatively \nfew with ‘other/commercial insurance’ (n = 45). Within \nthis group, informal assessment of these various plans \nsuggested high heterogeneity of plan characteristics and \ncoverage. Due to the small number of subjects in these \nindividual insurance strata and to improve interpretabil- \nity of results, we collapsed those reporting no insurance, \nworker’s compensation and other/commercial insurance \ninto a single category (i.e., ‘Other’). Therefore, insurance \ntype was categorized as private, public, or other (no in- \nsurance, worker’s compensation, or other/commercial \ninsurance) for purposes of analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "0.0011.45Baseline disability0.810.18< 0.0012.250.980.19< 0.0012.66Change in pain0.340.11< 0.0011.410.370.11< 0.0011.45Emergency roomAge− 0.00.03< 0.0010.910.48− 0.060.030.030.940.50Anatomical location ( neck ) c0.540.970.581.71− 0.370.920.690.69Anatomical location ( low back ) c0.720.950.452.05− 0.040.890.970.96Anatomical location ( shoulder ) c− 2.861.490.060.06− 3.521.530.020.03Insurance ( public ) d1.89", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed5.pdf" + }, + { + "text": "Assessment tools \nOSPRO Review of Systems tool (OSPRO-ROS) \nThe OSPRO-ROS is a review-of-systems screening tool for \nuse in outpatient orthopedic physical therapy settings [36]. \nThe OSPRO-ROS has demonstrated good concurrent val- \nidity with depression and a comprehensive 97-item battery \n[36] \nof non-musculoskeletal symptoms (i.e., red flags). \nModerate \nthe \ncapabilities of \nstrong predictive \nOSPRO-ROS have been reported for persistence of pain, \nquality of life, and change in comorbidity 12 months fol- \nlowing physical therapy in patients with musculoskeletal \npain [20, 21]. The OSPRO-ROS includes standard symp- \ntom descriptors to aid with identification of systemic or \nnon-musculoskeletal origins of musculoskeletal pain. It \nincludes questions related to symptoms of the cardiovascu- \nlar, gastrointestinal, endocrine, nervous, \nintegumentary, \npulmonary, and musculoskeletal systems. The full-length \n23-item version of the OSPRO-ROS is capable of identify- \ning 100% of positive red-flag responders (i.e. \nindicating \n“yes” to at least one systemic symptom on a questionnaire) \nin outpatient orthopedic physical therapy settings. [36] A \nshorter, 10-item version is also available that has been \n\nto \n\nPain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( CISPRD ) in patients with musculoikeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George S2, Benecisk JM, Lentz TA, Vis. SS. Dai Y, Bikoky JE, Zepperi G. ItOplimal Screening for Prediction of Referral and Outcome ( OSPRO ) for Musculoskeletal Pain Conditions : Results From the Visildation Cohort. J Orthop Sports Phys Th", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, \n\nDiagnostic tests or imaging \nComorbidity index score (OR = 1.35–1.45, p < 0.05), \nbaseline disability (OR = 2.25–2.66, p < 0.001), and base- \nline to 4-week change in pain intensity (OR = 3.04–3.05, \np = 0.01) were significant predictors of diagnostic test or \nimaging utilization. Among these, baseline disability was \nthe strongest predictor. In these models, higher comor- \nbidity index, higher baseline disability and worsening \npain were associated with higher odds of utilization. \nTogether, these variables explained approximately 30% \nof the variance in utilization. \n\nEmergency room \nModels for emergency room use had the highest pseudo-R2 \nvalues of any individual service (0.48–0.50), but also had \nthe largest number of predictors (8–9). Agreement between \ncomplete case and weighted models was moderate. The \nmodels converged on the following predictors: age (OR = \n0.91–0.94, p < 0.05), insurance (OR = 8.99–13.15, p < 0.05), \nbaseline disability (OR = 3.33–4.88, p < 0.001), and change \nin pain (OR = 1.59–1.77, p < 0.05). Higher utilization was \nassociated with younger age, other insurance (e.g., self-pay,", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "[html]21.Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistentmusculoskeletal pain at 12 months : a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome ( OSPRO ) validation cohort study. Phys Ther. 2018 ; 98 : 290 - 301.22.Freburger JK, Yolmes GM, Agars RP, Jxckman AM, Dierter JD, Wollace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009 : 169.251 – 8.23.Carey ' TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain :population perspectives. J Pain Off J Am Pain Soc. 2010 ; 11 : 343 – 5024.Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999 ; 83 : 157 – 62.25.Boltton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999803.533 – 9.26.Childs JD, Piva SR, Frkz JM. Responsiveness of the numeric pain rating scale27.in pirients with low back pain. Spine. 2005 ; X01331 – 4. Venon H. The neck disability index. state - of - the - art, 1991 - 2008. J Manip Physiol Ther. 2008 ; 31491 – 502.28.Vemon H, Mlor S. The neck disability index : a study of reliability and validity. J Manip Physiol Ther. 1991 ; 14409 – 15.29.Hudon - Cook N, Tomes - Nicholson K, Breen A. A revised Oswestry disability questionnaire, In Rioland M. Jerner J. editos. Bioli pairs new approaches to rehabilitation and education. New York Manchester Uriviversity Press, 1989. p. 187 –30.Fritz. IM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001.81 : 776 – 88.31.Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group. Development of the QuidOASH : comparison of three item - reduction approaches. J Bone Joint Surg Am. 2005 ; 871038 – 46.32.Irrgang JJ, Anderson AF, Boland AL, Hamer CD, Kurosaka M, Neyret P, et al. Development and validation of the international knee documentation committee subjective knee form. Am J Sports Med 2001 ; 29 : 600 – 13.33.Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a modified STarT back screening tool across different musculoskeletal pain conditions. Phys Ther. 2016 ; 96 : 1251 – 61.34.Chirison ME, Pompei P, Alex KL, MacKenzie CR. A new method of classifying prognostic comorbidity in longitudinal studies : development and wildation. J Chronic Dis. 1987 ; 40 : 373 - 83.35.Katz. IN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be measured by questionnaire rather than medical record review? Med Care. 1996.94.36.Geoge S2, Beneckal M, Balosky JE, Limtz TA, Zeppiel G, Pir Q, et al. Development of a review - of - systems screening tool for orthopaedic physical therapists results from the Optimal Screening for Prediction of Referral and Outcome ( OSPRR37.Lenta : TA, Benecivik JM, Biakosky JIL, Zeppier G, Dix Y, Wu SS, et al. Development of a yellow flag assessment tool for orthopsedic physical therapists : results from the Optimal Screening for Prediction of Referral a Outcome ( OSRKO ) coho38.Benecivk JM, Fritz JM, George SZ. The STarT back screening tool for prediction of 6 - month clinical outcomes : relevance of change partterms in outpatient physical therapy settings. J Orthop Sports Phys Ther. 20144439.Myers RH. Classical and modern regression with applications. 2nd ed. Pacific Grove :", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed5.pdf" + }, + { + "text": "G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C, Navarro A, Saldaria MT, Wilson K, Rejai J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( OSPRD ) in patients with musculoskeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George SZ, Beneck & JM, Lentz TA, Wku SS, Dia Y, Biolosky Jf, Zeppieri G Jt. Qoltimal Screening for Prediction of Referral and Outcome ( OSRR0 ) for Musculoskeletal Pain Conditions : Results From the Vialidation Cohort. J Orthwa Sports Phys", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "R E S E A R C H A R T I C L E \n\nPrediction of healthcare utilization \nfollowing an episode of physical therapy \nfor musculoskeletal pain \nTrevor A. Lentz1* , Jason M. Beneciuk2,3 and Steven Z. George4 \n\nAbstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. \n\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical \ntherapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability \nand pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could \nenhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is \nrequired to determine how specific characteristics of the clinical encounter influence future utilization. \n\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring \n\n\n\nBackground \nMusculoskeletal pain is a prevalent and costly health \ncondition with far-reaching public health consequences \nincluding chronic pain, disability and opioid-related ad- \ndiction [1]. Clinical practice guidelines now recom- \nfrontline \nmend non-pharmacological \nmanagement for musculoskeletal pain, which will lead \n\nto increased utilization of services such as physical \ntherapy [1–3]. Physical therapy is effective for improving \ndisability and reducing costs associated with many muscu- \nloskeletal pain conditions [4–9]. However, pain-related \nhealthcare utilization beyond the physical therapy episode \n(e.g. subsequent use of surgery, injection, opioids, etc.) \nmay indicate suboptimal treatment response, the presence \nof more complex needs, or unwarranted escalation of care. \nDownstream healthcare utilization is not often considered \nas an outcome of care or indication of treatment effective- \nness for musculoskeletal pain. But the importance of \n\ntreatment as \n\n*Correspondence: trevor.lentz@duke.edu \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA \nFull list of author information is available at the end of the article", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "shown to identify approximately 95% of positive red-flag re- \nsponders. For statistical analyses, the “yes” responses were \nadded for each version and included in each model as a \ncontinuous independent variable. \n\n\n \n \n \n \n [html]\n
pain complaint in the time following their physical the treatment :
1.
\n\n2. \n3. Surgery \n4. Diagnostic tests or Imaging (eg. xray, MRI, CT \n\nscan, nerve conduction test, etc.) \nvalidity with pain intensity 5. Emergency room visits \n\nOSPRO Yellow Flag tool (OSPRO-YF) \nThe OSPRO-YF is a yellow flag assessment tool that in- \ncludes items from pain vulnerability domains (negative \naffect and fear-avoidance) and pain resilience domains \n(positive affect and self-efficacy) to aid with identification \nof pain-related psychological distress in outpatient ortho- \npedic physical therapy settings [37]. The OSPRO-YF has \ngood concurrent \nand \nregion-specific disability [37] and is capable of predicting \npain intensity, disability, quality of life and persistent pain \n12 months following physical therapy in patients with \nmusculoskeletal pain [20, 21]. The full-length OSPRO-YF \nhas 17-items, however a shortened 10-item version is also \navailable with an acceptable trade-off in accuracy. Like the \nOSPRO-ROS, the OSPRO-YF is designed for implementa- \ntion into electronic medical record (EMR) systems to \nquickly and accurately identify risk for a variety of clinical \noutcomes [19]. For statistical analyses, a summary score \nwas derived for each version by adding the item responses \nafter reverse-scoring items 2, 13, 14, 15 and 17 so that \nhigher scores indicate higher pain-related psychological \ndistress. The summary score was then included in each \nmodel as a continuous independent variable. \n\n“Yes” responses were followed by questions regarding \nthe quantity of services utilized (i.e. number of opioid \npainkillers, number of diagnostic tests or number of \nemergency room visits). All utilization questions were \nanswered on a categorical scale (0, 1, 2–5, 5–10, or > 10) \nindicating the quantity of a particular service received \nduring the applicable follow-up timeframe. At 6-month \nfollow-up, study participants reported their use of ser- \nvices for the previous 2 months, allowing a timeframe of \n4 months from initial evaluation for them to complete \nphysical therapy. At 12-month follow-up, study partici- \npants reported their use of services over the previous \n6 months since their last survey. This method provided \nan 8-month overall follow-up period after physical ther- \napy and two follow-up points were included to minimize \nrecall bias. \n\nIntervention \nAll physical therapy treatment was provided at the discre- \ntion of the treating clinician. The duration of the episode, \nthe number of physical therapy visits, and individual treat- \nment parameters (type, \nfrequency) \nwere not collected for pragmatic reasons. In particular, \nclinical and utilization data are not commonly collected in \na standardized format and would need to be extracted \nfrom disparate medical record databases across different \nhealth care systems to assess treatment. This was not feas- \nible given the scope and design of \nthis multisite \nsurvey-based study. However, instead of coding treatment \ntype we included baseline-to-4 week change in pain inten- \nsity, region-specific disability, and OSPRO-YF scores in \neach model as measures of treatment response. In that \nmanner the individual effects of the treatment received \nwere included in the predictive models, without directly \naccounting for the type of treatment. \n\nintensity, duration,", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed5.pdf" + }, + { + "text": "[html]References1.Von Korff M, Scher Al, Helmick C, Carter - Pokras O, Dodick DIN, Goulet J, et al. United states national pain strategy for population research : concepts, definitions, and pilot data. J Pain Off J Am Pain Soc. 2016 ; I7 : 1068 – 80.2.Clarke JL, Skoufalos A, Scranton R. The American opioid epidemic : population health implications and potential solutions. Report from the netional stakeholder panel. Popul Health Manag. 2016 ; 19 Ssppl 151 – 103.Dowell D, Haegerich TM, Chou R. CDC guideline for prescribing opioids for chronic pain – United States, 2016. JAMA 2016 ; 315 : 1624 – 45.4.Boyles R, Toy P, Mellon J, Hayes M, Hammer B. Effectiveness of manual physical therapy in the treatment of cervical radiopathy a systematic review. J. Man Manip Ther. 2011 ; 19 : 135 – 42.5.Biarge E, Monnin D. Berchtold A, Allet L. Cost - effectiveness of physical therapy only and of usual care for various health conditions : systematic review. Phys Ther 2016 ; 96 ; 774 – 96.6.Desly : GD, Allison SC, Matelei RL, Ryder MG, Stang JM, Gohdes DD, et al. Physical therapy treatment effectiveness for osteoarthritis of the knee a randomized comparison of supervised clinical exercise and manual therapy procedures ves7.Deyle GD, Henderson NE, Matekel RL, Ryder MG, Garber MB, Allison SC, Bfficctiveness of manual physical therapy and exercise in osteoarthritis of the knee. A randomized, controlled trial. Ann Intern Med. 2000 ; 152 : 175 – 81.8.Freburger JK, Carey TS, Holmes GM. Effectiveness of physical therapy for the management of chronic spine disorders : a propensity score approach. Phys ther. 2006 ; 86 : 381 – 949.Kuhn 8 ; Dunn WR, Sanders R, An Q, Baumgarten KM, Bishop I1, et al. Bffectiveness of physical therapy in treating atraumatic full - thickness rotator cuff tears : a multionter prospective cohort study. J Shoulder Elb Surg. 2013 ; 221371 – 9.10.Fritz. ( M. Childs ID, Wainner RS, Flynn TW. Primary care referral of patients with low back pain to physical therapy : impact on future health care utilization and costs. Spine. 2012 : 37 : 2114 – 21.11.Fitz. M., Brennan GP, Hunter SL Magel JS. Initial management decisions after a new consultation for low body pain : implications of the usage of physical therapy for subsequent health care costs and utilization. Arch Phys Med Rehabil. 20112.HIV. IC, Dunn KM, Lewis M, Mullis R, Main C3, Foster NIC, et al. A primary care back pain screening tool : identifying patient subgroups for initial treatment. Arthritis Rheum. 2008.93632 – 41.13.Traeger AC, Henschike N, Hiabscher M, Williams CM, Kamper SJ, Maher CG, et al. Estimating the risk of chronic pain : development and validation of a prognostic model ( PDISP ) for patients with acute low back pain. Plus5 Med, 2016 ; 13x19020014.Karran IS, McAuley JH, Traeger AC, Hillier SL, Grabiter I, Russek LN, et al. Can screening instruments accurately determine poor outcome risk in adults with recent onset low back pain? A systematic review and meta - analysis. BMC Med. 201715.Azevedo LT, Costa - Pereira A, Mendonca L, Dias CC, Castro - Lopes JM. Chronic pain and health services utilization : is there overuse of diagnostic tests and negurilities in nonpharmacologic treatment methods utilization? Med Care. 20116.Limgley P, Muller - Schwelle G, Nicoliaox A, Liedgens H, Pergolizz J, Varnesi G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C,", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What are the health consequences of musculoskeletal pain ?", + "target_page": 1, + "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "224 Pega et al., 2022: Global, regional and national burden of disease attributable to 19 selected occupational risk \nfactors for 183 countries, 2000–2016: A systematic analysis from the WHO/ILO Joint Estimates of the Work- \nrelated Burden of Disease and Injury, here \n225 Kauppinen et al., 1998: Occupational exposure to carcinogens in the European Union in 1990-1993: \ninternational information system on occupational exposure to carcinogens, here \nCAREX Canada \nFevotte et al., 2011: Matgéné: A Program to Develop Job-Exposure Matrices in the General Population in France \nMannetje et al., 2011: Developing a general population job-exposure matrix in the absence of sufficient exposure \nmonitoring data \n\n226 YLDs = years lived with disability, together with YLLs = years of life lost, it composes the DALY (DALY = YLL + \nYLD). \n\n227 GBD 2019 Mental Disorders Collaborators, 2022: Global, regional, and national burden of 12 mental disorders \nin 204 countries and territories, 1990–2019: a systematic analysis from the Global Burden of Disease Study 2019, \nhere \n228 WHO: Mental disorders, Key facts and \nIHME: Global Health Data Exchange (GHDx), here \n229 OECD, 2015: Sick on the Job?: Myths and Realities about Mental Health and Work \n230 OECD/European Union, 2018: Health at a Glance: Europe 2018: State of Health in the EU Cycle \n231 Andlin-Sobocki et al., 2005: Cost of disorders of the brain in Europe \n\n233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal \nstudy of employment status among production workers, here \n234 Leka & Jain, 2017: EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace \nin Europe \n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or \nlower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of \nthe musculoskeletal system and connective tissue. \n236 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n237 Graveling, 2018: Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and \nEpidemiological Analysis \n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent \nlongitudinal studies, here \n239 EU-OSHA, 2020: Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a \nliterature review (p. 15). \n240 EU-OSHA, 2019: Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in \nthe EU (p. 8). \n241 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n242 Ibid., p. 174ff. \n\n243 Eurofound, 2007: Fourth European Working Conditions Survey (2005) (p. 77). \n\n244 United Nations Economic Commission for Europe (UNECE), 2015: Handbook on measuring quality of \nemployment: A statistical framework, here \n\n245 Quinlan & Bohle, 2013: Re-invigorating industrial relations as a field of study: Changes at work, substantive \nworking conditions and the case of OHS, here (p. 8). \n\n246 The percentages of responses to this question in the European Working Conditions Survey (EWCS, 2015) are \ndisplayed. Each bar shows the percentages of the four possible responses for each EU Member State, the \naverage for the EU Member States, and the responses for Switzerland and Norway. Responses are displayed for \nthe question below: How satisfied are you with working conditions in your main paid job? Answer options were: \nNot at all satisfied; Not very satisfied; Satisfied; Very satisfied. See here", + "page_start": 149, + "page_end": 149, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "a \n\nThis study was undertaken in a nationwide, US cohort \nof patients receiving outpatient physical therapy for a \nprimary complaint of knee, shoulder, back or neck pain. \nThe primary aim of the analysis was to predict incidence \nof additional pain-related healthcare utilization in the \nyear following the episode of physical therapy for mus- \nculoskeletal pain. We considered factors not commonly \nassessed in outcomes prediction for musculoskeletal \npain, \nlike insurance, comorbidities, and treatment re- \nsponse, as well as those more often associated with \npain-related outcomes (e.g. psychological distress). This \nproject will lead to the development of potentially novel \noutcome prediction models for this population in a com- \nmon, non-pharmacological US healthcare setting. The \nresults of this study will be particularly important in \nvalue-based payment settings where enhanced clinical \ndecision-making drives treatment effectiveness and sys- \ntem efficiency. \n\nThe primary aim of the OSPRO cohort study was to de- \nvelop and validate review of systems (i.e. evidence of sys- \ntemic involvement) and yellow flag (i.e. pain-related \npsychological distress) screening tools for use in out- \npatient orthopedic physical therapy settings. These screen- \ning tools, once validated and refined for clinical decision \nmaking, may improve the value of care delivery by accur- \nately identifying individuals who 1) are appropriate for \nreferral \nof \nnon-musculoskeletal symptoms, and/or 2) would benefit \nfrom enhanced, psychologically-informed physical ther- \napy. Early identification of individuals most appropriate \nfor these modified pathways of care has the potential to \nreduce wasteful downstream health care utilization, limit \nthe risk of unwarranted and costly care escalation, and im- \nprove clinical outcomes. Results of the primary analyses \nexamining the predictive ability of the OSPRO tools for \npain, disability, health status, and comorbidity outcomes \nhave been previously published [20]. Pre-planned second- \nary analyses included prediction of persistent pain state \n[21] and this current analysis predicting future healthcare \nutilization. All subjects consented to participation in the \nstudy and ethics approval was granted by the University of \nFlorida Institutional Review Board. \n\nto other providers for management", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "The trend towards more psychosocial and emotional challenges at work**does not mean that ‘classical’**\n**exposures**or**ergonomically burdensome work has disappeared**. There is a large number of \nworkers in all sectors — between 40% and 75% in ESENER and the EWCS — who report**ergonomic**\n**risks**. These are, for example, repetitive hand and arm movements in industry and service occupations, \nwhere a particularly high percentage is reported by low-skilled manual workers; moving heavy loads in \ncraft occupations, or patients in health and care occupations, where a particularly high percentage is \nreported by high-skilled manual workers; and tiring and painful positions, where again the highest level \nis reported by high-skilled manual workers. \n\nStill a quite constant share of workers reports**exposure to physical risks like noise, vibrations, high**\n**or low temperatures and to chemical and biological agents**; depending on occupation and sector, \nbetween 15% and 30% of workers are exposed to such risks (EWCS). No or very minor decreases in \nthese risks can be seen during the past 15 years.", + "page_start": 9, + "page_end": 9, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "In a similar way,**the levels of ergonomic risks**are related with the sectoral structure of a country, \ndetermining the type of occupations and work tasks. EU-OSHA provided a detailed analysis of the \nprevalence of musculoskeletal disorders (MSDs) and the related risk factors in several studies on \nmusculoskeletal diseases, for example, ‘Work-related musculoskeletal disorders: why are they still so \nprevalent?’58 \n\nAn example of the**interrelation between sectors and risks is the connection**between the sector \naggregate ‘Trade, transport, food/accommodation and recreation activities’ and three major indicators \nof ergonomic burden, that is, ‘Painful, tiring positions’, ‘Repetitive hand or arm movements’, and \n‘Carrying or moving heavy loads’. \n\nSeven countries have a share of employees in this sector of more than 30% (Cyprus, Greece, Spain, \nMalta, Bulgaria, Croatia and Latvia), and many of them are present in two or three lists of countries with \nthe highest number of responses regarding the indicators. \n\n\n\nk \nc \no \nt \nS \ne \nb \no \nd \nA \n/ \nn \no \ns \nO \nl \n\nr \ne \ny \nT \n© \n\nl", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "therapy re-design might \n\nOpioids and diagnostic tests and imaging were the two \nmost common subsequent healthcare services utilized \nfollowing physical therapy. Of the individuals that com- \npleted follow up and had any subsequent healthcare \nutilization, approximately 42% reported opioid use and \n70% reported use of diagnostic tests and imaging. An \nimportant health-related predictor of these services was \nlevel of comorbidity burden. For those with high comor- \nbidity burden and inadequate treatment response to \nphysical therapy, use of additional diagnostic tests and \nimaging or low-dose opioids may be appropriate in some \ncases. But given the growing public health concern over \nopioid use and the desire to avoid unnecessary treat- \nment driven by imaging, our results suggest the import- \nance of considering disease burden when developing \ntreatment pathways and healthcare policy to mitigate \nrisk for avoidable use of these services. Interestingly, \nneither \npredicted \nutilization outcomes even though it has been linked to \nmental health, comorbidity, and persistent pain state in \nother analyses [20, 21]. Systemic symptom burden is a \nmeasure of patient complexity that is related to but dis- \ntinct from comorbidity burden [36, 47]. In these ana- \nlyses, the chronic condition measure (i.e. the CCI) was \na better predictor of utilization than symptom burden \n(i.e. OSPRO-ROS). The reasons for this finding are un- \nclear but may be related to providers and patients being \nmore likely to pursue follow-up medical care for mus- \nculoskeletal pain when known co-existing conditions \nare present as opposed to reporting of symptoms alone. \nThe distinction between symptom and disease burden \nin defining musculoskeletal patient complexity, and its \ninfluence on clinical decision-making and outcomes, \nshould be the subject of future research particularly re- \nlated to aging populations [48]. \n\nversions of the OSPRO-ROS \n\nthe study is longitudinal \nfollow-up at multiple time points following an episode \nof physical therapy for a variety of musculoskeletal pain \nconditions. Anatomical location of pain was not a sig- \nnificant predictor of healthcare use in all but one model, \na \nsuggesting results \nspectrum of musculoskeletal pain conditions. Another \nstrength of this cohort study is the assessment of various \nhealthcare utilization outcomes of interest for establish- \ning health policy. When considered alongside more trad- \nitional pain- or disability-related outcomes prediction \nmodels, these findings will improve the ability of health- \ncare systems and providers \nin \nvalue-based purchasing environments. The consideration \nof multiple screening tools (i.e. yellow flags and review \nof systems) and treatment monitoring variables is also a \nstrength of this study as screening and systematic treat- \nment monitoring are not routine in clinical practice. A \nfinal strength is inclusion of multiple sociodemographic, \nhealth-related and psychosocial factors as potential pre- \ndictors. Healthcare outcomes and utilization exhibit \nemergent properties that require the consideration of \nexplain [50]. \nmultiple, \n\nThe primary strength of \n\nare widely applicable across \n\nUtilization outcomes benchmarks have not been estab- \nlished to determine how the percentage of subsequent \nhealthcare use in this study compares to outcomes using \nother health services. Prior studies suggest physical ther- \napy is associated with reduced incidence of additional \nhealthcare use compared to not using physical therapy \nin patients with acute low back pain [10, 49]. Some competing factors to fully", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed5.pdf" + }, + { + "text": "G. The societal impact of pain in the European Union : health - related quality of life and healthcare resource utilization. J Med Econ. 2010 : 13 : 571 – 81.17.Perez C, Navarro A, Saldaria MT, Wilson K, Rejai J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin. I Pain. 2015 ; 31 : 273 – 9.18.Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011 ; 91.712 – 21.19.George SZ, Beneck JM, Lentz TA, Wku SS. The Optimal Screening for Prediction of Referral and Outcome ( OSPRD ) in patients with musculoskeletal pain conditions a longitudinal validation cohort from the USA. BMI Open 2017 ; 1x015188.20.George SZ, Beneck & JM, Lentz TA, Wku SS, Dia Y, Biolosky Jf, Zeppieri G Jt. Qoltimal Screening for Prediction of Referral and Outcome ( OSRR0 ) for Musculoskeletal Pain Conditions : Results From the Vialidation Cohort. J Orthwa Sports Phys", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, \n\nDiagnostic tests or imaging \nComorbidity index score (OR = 1.35–1.45, p < 0.05), \nbaseline disability (OR = 2.25–2.66, p < 0.001), and base- \nline to 4-week change in pain intensity (OR = 3.04–3.05, \np = 0.01) were significant predictors of diagnostic test or \nimaging utilization. Among these, baseline disability was \nthe strongest predictor. In these models, higher comor- \nbidity index, higher baseline disability and worsening \npain were associated with higher odds of utilization. \nTogether, these variables explained approximately 30% \nof the variance in utilization. \n\nEmergency room \nModels for emergency room use had the highest pseudo-R2 \nvalues of any individual service (0.48–0.50), but also had \nthe largest number of predictors (8–9). Agreement between \ncomplete case and weighted models was moderate. The \nmodels converged on the following predictors: age (OR = \n0.91–0.94, p < 0.05), insurance (OR = 8.99–13.15, p < 0.05), \nbaseline disability (OR = 3.33–4.88, p < 0.001), and change \nin pain (OR = 1.59–1.77, p < 0.05). Higher utilization was \nassociated with younger age, other insurance (e.g., self-pay,", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "R E S E A R C H A R T I C L E \n\nPrediction of healthcare utilization \nfollowing an episode of physical therapy \nfor musculoskeletal pain \nTrevor A. Lentz1* , Jason M. Beneciuk2,3 and Steven Z. George4 \n\nAbstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. \n\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical \ntherapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability \nand pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could \nenhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is \nrequired to determine how specific characteristics of the clinical encounter influence future utilization. \n\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring \n\n\n\nBackground \nMusculoskeletal pain is a prevalent and costly health \ncondition with far-reaching public health consequences \nincluding chronic pain, disability and opioid-related ad- \ndiction [1]. Clinical practice guidelines now recom- \nfrontline \nmend non-pharmacological \nmanagement for musculoskeletal pain, which will lead \n\nto increased utilization of services such as physical \ntherapy [1–3]. Physical therapy is effective for improving \ndisability and reducing costs associated with many muscu- \nloskeletal pain conditions [4–9]. However, pain-related \nhealthcare utilization beyond the physical therapy episode \n(e.g. subsequent use of surgery, injection, opioids, etc.) \nmay indicate suboptimal treatment response, the presence \nof more complex needs, or unwarranted escalation of care. \nDownstream healthcare utilization is not often considered \nas an outcome of care or indication of treatment effective- \nness for musculoskeletal pain. But the importance of \n\ntreatment as \n\n*Correspondence: trevor.lentz@duke.edu \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA \nFull list of author information is available at the end of the article", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "**Figure 27: Prevalence of musculoskeletal diseases – EWCS 2015**\n\n\n\nAbsence from work due to MSDs accounts for a high proportion of working days lost in EU Member \nStates. In 2015, more than half (53%) of workers with MSDs (including those with other health problems) \nreported being absent from work during the past year, which is considerably higher than the proportion \nof workers without health problems (32%). Workers with MSDs are not only more likely to be absent \nfrom work, but (given absence) on average are also absent for a longer period. For example, 26% of \nworkers with chronic MSDs and other health problems report being absent for more than eight days \nduring the past year, which is considerably higher than the 7% for workers with no health problems. 241 \n\nOverall estimates of the burden of MSDs for the EU27 seem to be difficult, due to different recognition \nand treatment schemes.242 The estimates of WHO/ILO and ICOH result in 850,000 and 950,000 DALYs \nfor the EU27, based on a fraction of 26.38% attributable to work; in total, MSDs are the cause of 15-20% \nof all DALYs. \n\n**OSH Barometer – Accidents, diseases and wellbeing – Diseases:**\nhttps://visualisation.osha.europa.eu/osh-barometer/osh-outcomes/work-related-diseases/who- \nilo/prevalence-of-diseases/all-diseases \n\n**Eurostat – Data and databases on health:**\nhttps://ec.europa.eu/eurostat/web/health/data/database \n\n**WHO – Occupational Burden of Disease Application:**\nhttps://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/", + "page_start": 87, + "page_end": 87, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "[html]Sistent Dptimal46.Harris RU. A primer of multivariate statistics. 3rd ed. Mahwah : Psychology Press ; 2001.Patients with controlled between cohort47.Piette JD, Ken f. A. The impact of comorbid chronic conditions on diabetes care. Diabetes Care. 200629.725 - 31.Mace AS, et al. 2009 ;48.Rice ASC. Smith BH, Blyth FM. Pain and the global burden of disease. Pain. 2016 / 157791 – 6.49.Fritz. IM. Cleland JA. Speckman M. Brennan GP. Hunter SJ. Physical therapy for acute low back pain : associations with subsequent healthcare costs. Spine. 2008 ; 33 : 1800 – 5.50. oility and50.Lenta : TA, Harman JS, Marlow NM, George SZ. Application of a value model for the prevention and management of chronic musculoskeletal pain by physical therapists. Phys Ther. 2017 ; 97 : 354 – 64.patients.51.Steme JAC, White IR, Carlin B, Spraitt M, Royston P, Kenward MG, et al. Multiple imputation for missing dira in epidemiological and clinical research : potential and pitMs. BMJ. 2009 ; 338 : b2393.rating scale52.Bishop MD, Mintken PE, Bialosky IE, Cleland JA. Patient expectations of benefit from interventions for neck pain and resulting influence on outcomes. J Orthop Sports Phys Ther. 2013 ; 45 : 457 – 65.and validity.53.Biakoky JE, Bishop MD, Cleliand JA. Individual expectation : an overlooked, but pertinent, factor in the treatment of individuals experiencing musculoskeletal pain. Phys Ther. 2010 ; 90 : 1345 – 55.proaches to ress ; 1989.54.“ Harmer, Wi, Marariochio M, Loa X, Kofber M. I he rrifiuence of physical therapy guideline adherence on healthcare utilization and costs among patients with low back pain : a systematic review of the literature. PLoS One. 2016.11 e015679Back pain e. Phys55.Childs JD, Fritz. M. Wv. SS, Flym TW, Wairmer RS, Robertson EX, et al. Implications of early and guideline adherent physical therapy for low back pain on utilization and costs. EMC thealth Sens Res. 2015.19.6s : 0.6 arg /Post - term56.Yu S - T, Chang H. Y, Lin M - C, Lin Y - M. Agreement between self - reported and health insurance claims on utilization of health care : a population study. Jret P, et al.57.Petrox S. Mwnsy L. Cooper P. Davidson U. L. The xcoracy of self - reported healthcare resource utilization in health economic studies. Int J Technol Assess Health Care. 2002 : 185 – 10.Percentage58.Short Mf., Goetzel R2, Pei K, Tabrizi MJ, Ozminkowski RJ, Gibson TB, et al. How accurate are self - reports? Analysis of self - reported health careof classifying d validation.utilization and absence when compared with administrative dieta. J OccupEnviron Med. 2009 ; 51 : 786 – 96.Addity be Med Care.Proportional. and experienceCtion of ar. 2015 ; 45 :4.ohysicalReferral and 7 – 43.for2014 ; 44d ed. Pacificand NT,example3 : 119 – 28.Ready to submit your research? Choose BMC and benefit from :10TableAllow• thorough peer review by experienced researchers in your field • rasid oublication an acceptanceJation study• susport for research data, including large and complex data types", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "What is Creative Commons ?", + "target_page": 2, + "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**A Note from Leadership**\n\n\n\n2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. \n\nWe also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. \n\n\n\n**Anna Tumadóttir, CEO**", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "different rightsholders and authors. Managing opt-outs for so many different interests within \none book may get overly complicated very fast. \n\nIn any event, creating an opt-out system will need some ways of authenticating whether \nsomeone has the relevant authority to make choices about inclusion of a work. \n\n*Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The \nPile. Another possible design choice is to restrict access only to authorized users and to \nenforce particular responsibilities or obligations in return for authorization. Three particular \ndimensions of permitted uses and users came up in our discussions: \n\n•**Defining and ensuring acceptable and ethical use:**Participants discussed to what \nextent restrictions should be put on use of the resource. In the case of HathiTrust, \nacceptable use is implicitly ensured by limiting access to researchers from member \ninstitutions; other forms of “gated access” are possible, allowing access only to \ncertain types of users and for certain uses. \n One can imagine more fine-grained \nmechanisms, based on a review of the purpose for which datasets are used. This \nimagined resource could become a useful lever to demand responsible development \nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that \ncould incentivize good behavior. At the same time, drawing the lines around, let alone \nenforcing, “good behavior” would constitute a significant challenge. \n\n39 \n\n•**Charging for use to support sustainability of the training corpus itself:**While wanting \nto ensure broad access to this resource, it is important to consider economic \nsustainability, including support for continuing to update the resource with new works \nand appropriate tooling for AI training. Requiring some form of payment to use the \nresource could support sustainability, perhaps with different requirements for \ndifferent types of users (e.g., differentiating between non-commercial and \ncommercial users, or high-volume, well-resourced users and others). 40 \n\n•**Ensuring benefits of AI are broadly shared, including with book authors or**\n**publishers:**The creation of a training resource might \nlower barriers to the \ndevelopment of AI tools, and in that way support broadly shared benefits by \nfacilitating greater competition and mitigating concentration of power. On the other \nhand, just as concentration of technology industries is already a significant challenge, \nAI might not look much different, and the benefits of this resource may still simply go \nto a few large firms in “winner takes all-or-most” markets. The workshops discussed \nhow, for instance, large commercial users might be expected to contribute to a fund \nthat supported contributors of training data, or more generally to fund writers, to \nensure everyone contributing to the development of AI benefits. \n\n For examples of gated access to AI models, see https://huggingface.co/docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise.", + "page_start": 18, + "page_end": 18, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "When was the first CC licence created?", + "target_page": 4, + "target_passage": "The first CC License was created in 2002.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", + "page_start": 33, + "page_end": 33, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "advantage to a competitor. Annual \ninvestments in new capabilities, \neducation and continuous improvement help to maintain and improve \nRCI’s security posture. These are focused on protection and prevention, \nrobust detection and advance preparation and planning to help prevent \na potential breach from turning into a crisis. Risk management \nresources continue to be focused in this area. services may be increased from time-to-time as a result of compliance \nwith industry or legislative initiatives to address consumer protection \nconcerns or such Internet-related issues as copyright infringement, \nunsolicited commercial e-mail, cybercrime and lawful access. Our cable, \nwireless and broadcasting licences may not generally be transferred \nwithout regulatory approval. \n\nGenerally, our licences are granted for a specified term and are subject \nto conditions on the maintenance of these licences. These licencing \nconditions may be modified at any time by the regulators. The \nregulators may decide not to renew a licence when it expires, and any \nfailure by us to comply with the conditions on the maintenance of a \nlicence could result in a revocation or forfeiture of any of our licences or \nthe imposition of fines. \n\nWe use standard industry practices for network and information \ntechnology security, survivability and disaster recovery. Our ongoing \nsuccess partly depends on protecting our corporate business-sensitive \ninformation about our customers and \ndata, \nemployees. We treat this information as intellectual property and \nprotect it from unauthorized access and compromise. We rely on our \npolicies and procedures and information technology systems to protect \nthis information. If we do not secure our data and the privacy of our \ncustomer information, we may not be in compliance with regulatory \nstandards and it could result in negative publicity, litigation and damage \nto our \nthese outcomes can cause us to lose \ncustomers or public confidence, or experience financial losses. \n\nincluding personal \n\nThe licences include conditions requiring us to comply with Canadian \nownership restrictions of the applicable legislation. We are currently in \ncompliance with all of \nthese Canadian ownership and control \nrequirements. However, if these requirements are violated, we would \nbe subject to various penalties, possibly including, in the extreme case, \nthe loss of a licence. \n\nreputation. Any of \n\n**Impact of Network Failures on Revenue and Customer Service**\nIf our networks or key network components fail, it could, in some \ncircumstances, result in a loss of service for our customers for an \nindefinite period and have an adverse effect on our results and financial \nposition. We rely on business partners to carry some traffic for some of \nour customers. If one of these carriers has a service failure, it might also \ncause a service interruption for our customers that would last until we \ncould reroute the traffic to another carrier. \n\n**The Wireless Code**\nThe CRTC’s decision to implement its wireless consumer code of \nconduct, among other things, effectively requires Canadian wireless \ncarriers to move away from offering three-year service contracts and \ninstead offer two-year contracts, and this could change our customer \nacquisition and retention costs and subscriber churn. The Wireless Code \nalso sets billing caps on data roaming and domestic data overage \ncharges, creates a prohibition on requiring customers to provide 30- \ndays’ notice of cancellation, and requires the payment of interest on \nsecurity deposits, which could also reduce our results of operations. \n\n**Unauthorized Access to Digital Boxes or Internet Modems**\nWe use encryption technology developed and supported by our vendors \nto protect our cable signals from unauthorized access and to control \naccess to programming based on subscription packages. We also use \nencryption and security technologies to prevent unauthorized access to \nour Internet service.", + "page_start": 78, + "page_end": 78, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**A Note from Leadership**\n\n\n\n2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. \n\nWe also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. \n\n\n\n**Anna Tumadóttir, CEO**", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "In July 1998, we entered into a $1.0 billion unsecured revolving credit facility with a group of banks. \n$500.0 million of the credit facility was scheduled to expire in July 2002 and the remaining $500.0 million was \nscheduled to expire in July 2003. As a result of our strong Ñnancial position and liquidity, in February 2002 we \n\n41", + "page_start": 48, + "page_end": 48, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "To what subjects Creative Commons expand its work in 2023 ?", + "target_page": 8, + "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**A Note from Leadership**\n\n\n\n2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. \n\nWe also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. \n\n\n\n**Anna Tumadóttir, CEO**", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most \npressing challenges. Today, we steer campaigns, programming, and training in \nmany areas: \n\n**Open Culture**\n2023 was quite a year for the CC \nOpen Culture Program, thanks to \ngenerous funding from**Arcadia**. \nWe grew our Open Culture team \nfrom one to two and a half staff, \nrolling out new initiatives like \nTAROC (Towards a \nRecommendation on Open \nCulture) and**Open Culture Live:**\n**A Webinar Series**. We invite you \nto read “**What did Creative**\n**Commons do for Open Culture**\n**in 2023?**” to learn more. \n\n**Open Education**\nWe delivered workshops and \npresentations on CC Licenses and \nOpen Educational Resources at \nover 16 conferences and events. \nThe CC Open Education Platform \nalso funded six global projects, \n**including work to advance the**\n**UNESCO Recommendation on**\n**OER.**\n\n\n\n**Open Journalism**\nThanks to generous funding from \nthe**John D. and Catherine T.**\n**MacArthur Foundation**, CC \nhosted its very first Open \nJournalism track at the CC Global \nSummit, including eight \npresentations, lightning talks, \npanel discussions, and \nworkshops as well as a**keynote**\n**by Anya Kamenetz**. \n\nRepresentatives from 33 news \noutlets and digital rights-focused \norganizations attended the CC \nSummit sessions. The Open \nJournalism track built on \n**numerous collaborations and**\n**workshops**throughout 2023.", + "page_start": 6, + "page_end": 6, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "From which country does Killam Properties Inc originate ?", + "target_page": 3, + "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing \nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic \nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s \nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and \nincreasing FFo per share. \n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic \nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, \nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint \nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the \nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the \nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions \nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property \noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units. \n\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: \n\n1. \nFFO per Share – A standard measure of earnings for real estate entities. Management is focused on growing FFO per share on an annual \nbasis. \n\n2. Rental Increases – Management expects to achieve increases in average rental rates on an annual basis and measures the average rental \nincreases achieved. \n\n3. Occupancy – Management is focused on maximizing occupancy levels while also managing the impact of higher rents. This measure \nconsiders units rented as a percentage of total stabilized units at a point in time. \n\n4. \nSame Store NOI Growth – This measure considers the Company’s ability to increase the NOI at properties that it has owned for equivalent \nperiods year‑over‑year, removing the impact of acquisitions, dispositions, developments and other non same store operating adjustments. \n\n5. Weighted average cost of Debt – Killam monitors the weighted average cost of its mortgage debt and total debt. \n\n6. Debt to total assets – Killam measures its debt levels as a percentage of total assets and works to ensure that the debt to total assets \nremains at a range of 55% to 65%. \n\n7. term to maturity – management monitors the average number of years to maturity on its debt.", + "page_start": 22, + "page_end": 22, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**1. Corporate Information**\n\nKillam Properties Inc (“Killam” or the “Company”) is a real estate company specializing in the acquisition, management and development of \nmulti‑residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business \nCorporations Act. Killam’s common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol “KMP”. The \nconsolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013**.**the company’s \nhead office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company’s registered office is located at \n2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4. \n\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance \nwith a resolution of the Board of Directors on Tuesday, February 18, 2014. \n\n**2. Significant Accounting Policies**\n\n**(A) Statement of Compliance**\n\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards (“IFRS”) as \nissued by the International Accounting Standards Board (“IASB”). \n\n**(B) Basis of Presentation**\n\nThe consolidated financial statements of the Company have been prepared on a historical cost basis, except for investment properties that \nhave been measured at fair value. Historical cost is generally based on the fair value of the consideration given in exchange for assets. The \nconsolidated financial statements have been prepared on a going concern basis and are presented in Canadian dollars, which is Killam’s \nfunctional currency, and all values are rounded to the nearest thousand ($000), except when otherwise noted. Standards and guidelines \nnot effective for the current accounting period are described in Note 4. \n\n**(C) Basis of Consolidation**\n\n*(i) Subsidiaries*\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non‑controlling interests represent the portion of \nprofit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive \nIncome and within equity in the Consolidated Statement of Financial Position, separately from shareholders’ equity. \n\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements \nfrom the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when \nnecessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not \nown more than 50% of the voting power.", + "page_start": 69, + "page_end": 69, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Killam properties inc \n**2013 annual report**", + "page_start": 0, + "page_end": 0, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. \n\n\n\n\n\n\n\n\n\ns2, Halifax, nova scotia", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. \n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership \nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce \nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in \ncanada. \n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013 \nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city. \nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of \n$976. \n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with \nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners \nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new \nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount \nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally \nhigher in newer buildings. \n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**27. Financial Guarantees**\n\nKillam Properties Inc. is the guarantor for borrowings held through its three equity investments. As at December 31, 2013, the maximum \npotential obligation resulting from these guarantees is $70.5 million, all related to long‑term mortgage financing (December 31, 2012 – \n$72.3 million). These loans are secured by a first ranking mortgage over the associated investment property. Management has reviewed \nthe contingent liability associated with its financial guarantee contracts and, at December 31, 2013, determined that a provision is not \nrequired to be recognized in the Statement of Financial Position. (December 31, 2012 ‑ $nil).", + "page_start": 93, + "page_end": 93, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. \n\nI would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. \n\nYours truly, \n\n\n\n\n \n \n \n \n [html]\n
for 2014Completea minimum corS75 million in acquisitions
Acquire over 20 % of 2014 acquisitions outside Atlantic Canada with a focisin Ontario.
Grow same storeNOI by up to 2 %.Continue to invest in development with two projects
underway, managing projects on schedule and on budget1.
\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. \n\nPhilip Fraser", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "How Killam Properties Inc does increase its geographic diversification ? ", + "target_page": 5, + "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. \n\nI would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. \n\nYours truly, \n\n\n\n\n \n \n \n \n [html]\n
for 2014Completea minimum corS75 million in acquisitions
Acquire over 20 % of 2014 acquisitions outside Atlantic Canada with a focisin Ontario.
Grow same storeNOI by up to 2 %.Continue to invest in development with two projects
underway, managing projects on schedule and on budget1.
\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. \n\nPhilip Fraser", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. \n\n\n\n\n\n\n\n\n\ns2, Halifax, nova scotia", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. \n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership \nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce \nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in \ncanada. \n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013 \nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city. \nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of \n$976. \n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with \nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners \nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new \nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount \nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally \nhigher in newer buildings. \n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Increased Supply Risk**\nIncreased supply risk is the risk of loss from increased competition from the addition of new rental units in Killam’s core markets. Numerous \nother residential developers and apartment owners compete for potential tenants. Although it is Killam’s strategy to own multifamily residential \nproperties in premier locations in each market in which it operates, some of the apartments or MHCs of Killam’s competitors may be newer, \nbetter located or offer lower rents. An increase in alternative housing could have a material adverse effect on Killam’s ability to lease units and \nin the rents charged and could adversely affect Killam’s revenues and ability to meet its obligations. To mitigate against this risk Killam has a \ngeographically diverse asset base. Management is expanding this diversification by increasing Killam’s investment in apartment markets outside \nAtlantic Canada. \n\n**Credit Risk**\nCredit risk arises from the possibility that tenants may experience financial difficulty and be unable to fulfill their lease term commitments. The \nCompany mitigates the risk of credit loss through the diversification of its existing portfolio and limiting its exposure to any one tenant. Credit \nassessments are conducted with respect to all new leasing and the Company also obtains a security deposit to assist in potential recovery \nrequirements. In addition, the receivable balances are monitored on an ongoing basis with the result that the Company’s exposure to bad debt is \nnot significant. The Company’s bad debt expense experience has historically been less than 0.4% of revenues. None of Killam’s tenants account \nfor more than 1% of tenant receivables. \n\n**Development Risk**\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in \nthe timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway \nat any one time. To reduce the Company’s exposure to price increases, Killam enters into fixed‑rate contracts when possible. To reduce the \nlease‑up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre‑markets its \nproperties early on in the process, to increase demand for the new developments.", + "page_start": 58, + "page_end": 58, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "opportunities for Growth \n\nKillam’s growth opportunities include increasing earnings of its existing \nportfolio and expanding the portfolio through acquisitions and development. \nacquisitions have been an important part of Killam’s growth, having completed \nover $1.1 billion in acquisitions since the first property was acquired in 2002. \nKillam began development as a complement to its acquisition program in 2010, \nand to-date has invested approximately $90 million in new developments. \n2013 was Killam’s largest year for growth since 2005, adding $191 million of \nproperties to the portfolio, including $121 million in acquisitions and $70 \nmillion in new developments. looking ahead to 2014, Killam has targeted \na minimum of $75 million in acquisitions, and the development of two new \napartment buildings totaling approximately $46 million.", + "page_start": 13, + "page_end": 13, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Continued Geographic Expansion in Ontario**\n\nKillam acquired two buildings in Ontario during 2013 including a 102‑unit building located in Ottawa for $10.4 million as well as a newly \nconstructed, 8‑storey, mixed‑use complex containing 21,242 square feet of street level retail (TD Bank, Shoppers Drug Mart and Tim Hortons) and \n179 apartment units in downtown Toronto for $40.0 million. With the completion of these two acquisitions, Killam’s future NOI generated from \nits Ontario properties is expected to increase to 15.0% from 7.5%. \n\n**Reduced Cap‑Rate Compression in 2013**\n\nDuring 2013 Killam recorded $13.1 million in fair value gains related to its portfolio compared to $37.7 million in 2012. This decrease \nyear‑over‑year was driven by a combination of reduced cap‑rate compression in 2013 and a slight uptick in cap‑rates of 25 bps in the Saint John \nmarket in the fourth quarter of 2013. The net gain in real estate valuations does not impact the Company’s FFO per share, its key measure of \nperformance. \n\n**Dividend Increase**\n\non December 23, 2013, Killam announced an increase in its annual dividend by 3.4% to $0.60 per share from $0.58 per share. the increase \nreflects Management’s expectation of earning’s growth to be generated in 2014. \n\n\n \n \n \n \n [html]Consolidation of Multi - family Residential Real Estate MarketIncrease Investment in New Properties2013 Performance\n
2013 TargetComplete approximately $ 75 -$ 125 million in acquisitions.
2013 PerformanceKillam completed $ 12.2. 1. million in acquisitions in 2013 which includes $ 12.8 million in apartment acquisitions, $ 2.4 million for 65 MHC sites and $ 6.9 million in vacant land for future developments.
2013 TargetFocus on newer properties as part of the acquisition program in 2013. Complete and lease - up Killam ’ s four developments, and commence two new development projects.
During 2012 Killam asquired SS2 units which were constructed after 2003, representing 14 % of the total units added to the portfolia staining the year. The acquisitions included three building constructed in 2013, an IEI - unit luxury bal
The Company also completed the construction of four development projects totaling. SD antisting the first haff of the year. These buildings were all ready for occupancy by the beiginning of May 2013 with leave up personsitis varying fori
Killam commenced two rewa development projects during the year. Development started on a 1203 until projects in State / s in D. don ’ t in 0.023. and a 22 and projects ' s Combige benefiele ground in December 2013. Pleus refer to the Investment
", + "page_start": 25, + "page_end": 25, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Marketing and leasing initiatives have been a priority at Killam, including increasing the number of leasing agents, investment in marketing \npromotions (including a successful radio campaign) and expanding incentive offerings at specific properties. Management was pleased with the \nimprovements realized during the second half of the year. The marketing and leasing focus will continue in 2014 and will also include programs \ntargeting tenant retention. Killam’s expanded leasing process and well‑maintained, quality asset base has enabled Killam to outperform CMHC’s \nreported averages in Killam’s core markets in Atlantic Canada. Killam’s increased investment in Ontario has also been beneficial in 2013, with \nimprovement in occupancy during each quarter of the year. \n\nHalifax, representing 45% of Killam’s apartment NOI, ended the year with 96.0% occupancy compared to 96.6% at year‑end 2012. CMHC \nreported vacancy of 3.2% in Halifax in October for its Fall 2013 Rental Market Report, compared to Killam’s vacancy of 2.7% for October. \nCompetition has increased in Halifax due to new supply with rental construction levels above the ten‑year annual average of 760 units per year, \nfor the last three years, including apartment starts of 1,565, 1,437 and 1,258 in 2011, 2012 and 2013, respectively (as reported by CMHC). CMHC \nexpects new starts to stay above the 10‑year average into 2014 and throughout 2015 and 2016. Offsetting new supply is positive net‑migration \nleading to population growth and increasing demand for rental units from an aging population that is transitioning away from home ownership \nand into the rental market. The population of Halifax grew by 4.7% (18,000 people) from 2006 to 2011, as reported by Statistics Canada. Despite \nincreased rental supply in the city, Killam continues to achieve rental rate growth, with average rents for same store properties located in Halifax \nup 1.8% over the last year. Same store revenue was up 1.7% year‑over‑year. The improved top‑line growth in Halifax reflects the marketing and \nleasing changes and the quality and central locations of Killam’s apartment portfolio. \n\nLooking to 2014 and beyond, population growth, fuelled in part by the $25 billion, 25‑year, Irving Shipbuilding Contract, is predicted to increase \ndemand for rental product and absorb the new supply. In addition, Nova Scotia’s offshore oil industry has potential for growth with BP and Shell \nboth launching seismic surveys off the province’s coast. \n\nNew Brunswick’s rental market also experienced softness over the last year. As CMHC reported in its Fall 2013 Rental Market Report, the overall \nvacancy for the province’s urban centres was 8.9% for october 2013, 200 bps higher than october 2012. cmHc reported Fredericton as the \nstrongest of the larger centres in new Brunswick, with 6.2% vacancy (compared to 4.0% for october 2012), while the weakest market was saint \nJohn, with CMHC reporting 11.4% vacancy in Fall 2013 compared to 8.7% for 2012. CMHC reported Moncton with 9.1% vacancy for October \n2013, compared to 6.7% a year earlier, with new supply to the market contributing to the vacancy rise.", + "page_start": 36, + "page_end": 36, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", + "target_page": 8, + "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Killam properties inc \n**2013 annual report**", + "page_start": 0, + "page_end": 0, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. \n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Objective** **2013 Target** **2013 Performance**\n\n**Consolidation of**\n**the Multi-family**\n**Residential Real Estate**\n**Market**\n\nTo complete $75 million \nto $125 million in \nacquisitions. \n\nTarget achieved. $121 million in acquisitions \ncompleted in 2013, including $113 million in \napartment acquisitions, $7 million for three \nparcels of land for future development and $1 \nmillion for an MHC acquisition. \n\n**Increase Investment in**\n**New Properties**\n\nAcquire new properties \nas part of the acquisition \nprogram in 2013. \n\nTarget achieved. During 2013, 74% of the total \nunits added to the portfolio were constructed \nafter 2001. These acquisitions included three \nbuildings constructed in 2013, a 179-unit \nbuilding on Queen Street West in Toronto, an \n83-unit luxury building in Halifax, and a 48-unit \nbuilding in Moncton. \n\nComplete and lease- \nup Killam's four \ndevelopments and \ncommence two new \ndevelopment projects. \n\nTarget partially achieved. The Company \ncompleted the construction of four \ndevelopment projects totaling 282 units during \nthe first half of 2013. Two of the properties, \nBennett House and Brighton House, were \nfully leased within three months of opening, \nwhile S2 and The Plaza are expected to be \nsubstantially leased by the middle of 2014. \nKillam began two new developments during \nthe second half of the year, a 101-unit building \nin St. John’s, Newfoundland, and a 122-unit \nbuilding in Cambridge, Ontario. \n\n**Geographic**\n**Diversification**\n\n2013 acquisition \nprogram to include \ninvestments in Ontario. \n\nTarget achieved. Killam acquired $55 million in \nOntario real estate in 2013, representing 45% \nof its acquisition program in the year. Assets \nacquired included a 102-unit property in \nOttawa, a newly built, 179-unit, mixed-used \nproperty in downtown Toronto and a 5.2 acre \nparcel of land for development in Cambridge, \nOntario. \n\n**Growth in Same Store**\n**Net Operating Income**\n**(NOI)**\n\nSame store NOI growth \nof 2% to 4% in 2013. \n\nTarget not achieved. Despite generating 1.8% \ngrowth in same store revenue, high natural gas \nprices in Atlantic Canada caused total same \nstore utility and fuel expenses to increase 13.8% \nduring the year, which resulted in a decrease in \nsame store NOI of 0.4% for the year.", + "page_start": 7, + "page_end": 7, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. \n\nI would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. \n\nYours truly, \n\n\n\n\n \n \n \n \n [html]\n
for 2014Completea minimum corS75 million in acquisitions
Acquire over 20 % of 2014 acquisitions outside Atlantic Canada with a focisin Ontario.
Grow same storeNOI by up to 2 %.Continue to invest in development with two projects
underway, managing projects on schedule and on budget1.
\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. \n\nPhilip Fraser", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Summary of 2013 Results and Operations**\n\n**Acquisitions and Developments Drive Revenue Growth of 5.6%**\n\nKillam completed $114.2 million in property acquisitions throughout 2013 and also completed $69.6 million of development projects in the first \nhalf of 2013, adding 1,025 apartment units and 65 MHC sites to the portfolio. $84.8 million of acquisitions completed throughout 2012 also \ncontributed to revenue growth in 2013. This growth was partially offset by the disposition of ten MHC properties located in New Brunswick for \nproceeds of $69.0 million during the fourth quarter of 2013 and the disposition of twelve MHCs during 2012 for $72.9 million. The development \nprojects completed in 2013 located in Halifax and Fredericton are expected to be substantially leased by mid‑2014 and will generate additional \nrevenue growth for the company in 2014. \n\n**Consolidated Same Store Revenue Growth of 1.8%**\n\nKillam’s same store portfolio posted a 1.8% increase in revenue growth compared to 2012, driven by an increase of 1.3% in rental rates related \nto the apartment portfolio and a 3.7% increase in rental rates related to the MHC portfolio. These rental rate gains were partially offset by higher \nvacancy during the first half of 2013, compared to 2012, and higher rental incentives due to increased competition in certain of the Company’s \ncore markets in Atlantic Canada as a result of increased supply. \n\nThe Halifax market, which comprises approximately 50% of the Company’s same store apartments, contributed to the rental growth, posting a \n2.5% increase in residential rents. The improved top‑line growth in Halifax reflects the marketing and leasing changes implemented in 2013 and \nthe quality and location of the Company’s assets in the city. Growth in Halifax offset the Charlottetown and Saint John markets, which saw flat \nrevenues year‑over‑year and a decline of 2.4% in revenue, respectively. \n\n**14% Increase in Same Store Utility Costs Due to Pressure on Natural Gas Pricing**\n\nDuring the first quarter of 2013 the Company experienced high natural gas prices as a result of supply constraints and high demand from utilities \nin New England, which drove up pricing within Atlantic Canada. Unanticipated disruptions at the Sable Offshore Energy project and delays in the \nDeep Panuke Project coming on‑line created a regional supply deficit and forced distributors to purchase the commodity at higher prices from \nthe day markets in the Northeastern United States. During the fourth quarter of 2013 Killam also saw a spike in pricing, specifically in the New \nBrunswick market, as colder than normal weather increased demand from utilities in Northeast New England and placed added pressure on \nday pricing in a market with a shortage of gas pipeline capacity. Pricing was more stable during the fourth quarter in Nova Scotia as the region’s \nlargest supplier had previously entered into a number of fixed gas‑supply contracts for the 2013‑2014 heating season. \n\n**Stability in Controllable Operating Costs**\n\nExcluding energy and property taxes, Killam delivered an impressively modest 0.3% increase in same store operating expenses in 2013 compared \nto 2012. Killam managed operating costs by renegotiating key contracts, including garbage and elevator contracts, and reducing repair and \nmaintenance and property administrative expenses through a company‑wide focus on minimizing discretionary spending. In addition, the \nincrease in same store property tax expense was managed to 2.8% as a result of successful assessment appeals. \n\n**Interest Cost Savings on Refinancings**", + "page_start": 24, + "page_end": 24, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada.", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. \n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership \nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce \nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in \ncanada. \n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013 \nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city. \nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of \n$976. \n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with \nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners \nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new \nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount \nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally \nhigher in newer buildings. \n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Continued Geographic Expansion in Ontario**\n\nKillam acquired two buildings in Ontario during 2013 including a 102‑unit building located in Ottawa for $10.4 million as well as a newly \nconstructed, 8‑storey, mixed‑use complex containing 21,242 square feet of street level retail (TD Bank, Shoppers Drug Mart and Tim Hortons) and \n179 apartment units in downtown Toronto for $40.0 million. With the completion of these two acquisitions, Killam’s future NOI generated from \nits Ontario properties is expected to increase to 15.0% from 7.5%. \n\n**Reduced Cap‑Rate Compression in 2013**\n\nDuring 2013 Killam recorded $13.1 million in fair value gains related to its portfolio compared to $37.7 million in 2012. This decrease \nyear‑over‑year was driven by a combination of reduced cap‑rate compression in 2013 and a slight uptick in cap‑rates of 25 bps in the Saint John \nmarket in the fourth quarter of 2013. The net gain in real estate valuations does not impact the Company’s FFO per share, its key measure of \nperformance. \n\n**Dividend Increase**\n\non December 23, 2013, Killam announced an increase in its annual dividend by 3.4% to $0.60 per share from $0.58 per share. the increase \nreflects Management’s expectation of earning’s growth to be generated in 2014. \n\n\n \n \n \n \n [html]Consolidation of Multi - family Residential Real Estate MarketIncrease Investment in New Properties2013 Performance\n
2013 TargetComplete approximately $ 75 -$ 125 million in acquisitions.
2013 PerformanceKillam completed $ 12.2. 1. million in acquisitions in 2013 which includes $ 12.8 million in apartment acquisitions, $ 2.4 million for 65 MHC sites and $ 6.9 million in vacant land for future developments.
2013 TargetFocus on newer properties as part of the acquisition program in 2013. Complete and lease - up Killam ’ s four developments, and commence two new development projects.
During 2012 Killam asquired SS2 units which were constructed after 2003, representing 14 % of the total units added to the portfolia staining the year. The acquisitions included three building constructed in 2013, an IEI - unit luxury bal
The Company also completed the construction of four development projects totaling. SD antisting the first haff of the year. These buildings were all ready for occupancy by the beiginning of May 2013 with leave up personsitis varying fori
Killam commenced two rewa development projects during the year. Development started on a 1203 until projects in State / s in D. don ’ t in 0.023. and a 22 and projects ' s Combige benefiele ground in December 2013. Pleus refer to the Investment
", + "page_start": 25, + "page_end": 25, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity \n\n\n\n**president’s letter** **9**\n\n**asset portfolio** **18**\n\n**MD&a** **21**\n\n**Financial Statements 66**\n\n**Five-Year Summary** **96**\n\n180 mill street, london, ontario", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. \n\n\n\n\n\n\n\n\n\ns2, Halifax, nova scotia", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "What is the conventional workflow for BERT ?", + "target_page": 1, + "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Stochastic Parrots \n\nmBERT across 29 tasks. Either way, these models do not address \nthe inclusion problems raised by [65], who note that over 90% of \nthe world’s languages used by more than a billion people currently \nhave little to no support in terms of language technology. \n\nAlongside work investigating what information the models re- \ntain from the data, we see a trend in reducing the size of these \nmodels using various techniques such as knowledge distillation \n[26, 58], quantization [118, 153], factorized embedding parame- \nterization and cross-layer parameter sharing [70], and progressive \nmodule replacing [146]. Rogers et al. [110] provide a comprehensive \ncomparison of models derived from BERT using these techniques, \nsuch as DistilBERT [113] and ALBERT [70]. While these models \nmaintain and sometimes exceed the performance of the original \nBERT model, despite their much smaller size, they ultimately still \nrely on large quantities of data and significant processing and stor- \nage capabilities to both hold and reduce the model. \n\nWe note that the change from n-gram LMs to word vectors dis- \ntilled from neural LMs to pretrained Transformer LMs is paralleled \nby an expansion and change in the types of tasks they are use- \nful for: n-gram LMs were initially typically deployed in selecting \namong the outputs of e.g. acoustical or translation models; the \nLSTM-derived word vectors were quickly picked up as more effec- \ntive representations of words (in place of bag of words features) \nin a variety of NLP tasks involving labeling and classification; and \nthe pretrained Transformer models can be retrained on very small \ndatasets (few-shot, one-shot or even zero-shot learning) to perform \napparently meaning-manipulating tasks such as summarization, \nquestion answering and the like. Nonetheless, all of these systems \nshare the property of being LMs in the sense we give above, that \nis, systems trained to predict sequences of words (or characters or \nsentences). Where they differ is in the size of the training datasets \nthey leverage and the spheres of influence they can possibly affect. \nBy scaling up in these two ways, modern very large LMs incur new \nkinds of risk, which we turn to in the following sections.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "• Alternatives to masking. Raffel et al. (2019) \nexperiment with replacing and dropping spans, \nLewis et al. (2019) explore deletion, infilling, \nsentence permutation and document rotation, \nand Sun et al. (2019c) predict whether a to- \nken is capitalized and whether it occurs in \nother segments of the same document. Yang \net al. (2019) train on different permutations \nof word order in the input sequence, maximiz- \ning the probability of the original word order \n(cf. the n-gram word order reconstruction task \n(Wang et al., 2019a)). Clark et al. (2020) de- \ntect tokens that were replaced by a generator \nnetwork rather than masked. Although BERT is already actively used as a \nsource of world knowledge (see subsection 3.3), \nthere is also work on explicitly supplying struc- \nOne approach is entity- \ntured knowledge. \nenhanced models. For example, Peters et al. \n(2019a); Zhang et al. (2019) include entity em-", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "5.4 Fine-tuning BERT \n\nPre-training + fine-tuning workflow is a crucial \npart of BERT. The former is supposed to provide \ntask-independent knowledge, and the latter would \npresumably teach the model to rely more on the \nrepresentations useful for the task at hand. \n\nKovaleva et al. (2019) did not find that to be the \ncase for BERT fine-tuned on GLUE tasks5: dur- \ning fine-tuning, the most changes for 3 epochs oc- \ncurred in the last two layers of the models, but those \nchanges caused self-attention to focus on [SEP] \nrather than on linguistically interpretable patterns. \nIt is understandable why fine-tuning would increase \nthe attention to [CLS], but not [SEP]. If Clark \net al. (2019) are correct that [SEP] serves as \"no- \nop\" indicator, fine-tuning basically tells BERT what \nto ignore. \n\nFigure 5: Pre-trained weights help BERT find wider \noptima in fine-tuning on MRPC (right) than training \nfrom scratch (left) (Hao et al., 2019) \n\nbeddings as input for training BERT, while Po- \nerner et al. (2019) adapt entity vectors to BERT \nrepresentations. As mentioned above, Wang et al. \n(2020c) integrate knowledge not through entity em- \nbeddings, but through additional pre-training ob- \njective of knowledge base completion. Sun et al. \n(2019b,c) modify the standard MLM task to mask \nnamed entities rather than random words, and Yin \net al. (2020) train with MLM objective over both \ntext and linearized table data. Wang et al. (2020a) \nenhance RoBERTa with both linguistic and factual \nknowledge with task-specific adapters. \n\nSeveral studies explored the possibilities of im- \n\nproving the fine-tuning of BERT: \n\n• Taking more layers into account: learning \na complementary representation of the infor- \nmation in deep and output layers (Yang and \nZhao, 2019), using a weighted combination \nof all layers instead of the final one (Su and \nCheng, 2019; Kondratyuk and Straka, 2019), \nand layer dropout (Kondratyuk and Straka, \n2019). \n\n• Two-stage fine-tuning introduces an inter- \nmediate supervised training stage between \npre-training and fine-tuning (Phang et al., \n2019; Garg et al., 2020; Arase and Tsujii, \n2019; Pruksachatkun et al., 2020; Glavaš and \nVuli´c, 2020). Ben-David et al. (2020) propose \na pivot-based variant of MLM to fine-tune \nBERT for domain adaptation. \n\n• Adversarial token perturbations improve \nrobustness of the model (Zhu et al., 2019). \n• Adversarial regularization in combination \nwith Bregman Proximal Point Optimization \nhelps alleviate pre-trained knowledge forget- \nting and therefore prevents BERT from overfit- \nting to downstream tasks (Jiang et al., 2019a). \n• Mixout regularization improves the stability \nof BERT fine-tuning even for a small number \nof training examples (Lee et al., 2019). \n\nPre-training is the most expensive part of train- \ning BERT, and it would be informative to know \nhow much benefit it provides. On some tasks, a \nrandomly initialized and fine-tuned BERT obtains \ncompetitive or higher results than the pre-trained \nBERT with the task classifier and frozen weights \n(Kovaleva et al., 2019). The consensus in the com- \nmunity is that pre-training does help in most situa- \ntions, but the degree and its exact contribution re- \nquires further investigation. Prasanna et al. (2020) \nfound that most weights of pre-trained BERT are \nuseful in fine-tuning, although there are \"better\" \nand \"worse\" subnetworks. One explanation is that \npre-trained weights help the fine-tuned BERT find \nwider and flatter areas with smaller generalization \nerror, which makes the model more robust to over- \nfitting (see Figure 5 from Hao et al. (2019)). \n\nGiven the large number and variety of proposed \nmodifications, one would wish to know how much \nimpact each of them has. However, due to the \noverall trend towards large model sizes, systematic \nablations have become expensive. Most new mod- \nels claim superiority on standard benchmarks, but \ngains are often marginal, and estimates of model \nstability and significance testing are very rare.", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "be successfully approximated with adapter mod- \nules. They achieve competitive performance on \n26 classification tasks at a fraction of the computa- \ntional cost. Adapters in BERT were also used for \nmulti-task learning (Stickland and Murray, 2019) \nand cross-lingual transfer (Artetxe et al., 2019). An \nalternative to fine-tuning is extracting features from \nfrozen representations, but fine-tuning works better \nfor BERT (Peters et al., 2019b). \n\nDepending on the task, some BERT heads/layers \nare not only redundant (Kao et al., 2020), but also \nharmful to the downstream task performance. Pos- \nitive effect from head disabling was reported for \nmachine translation (Michel et al., 2019), abstrac- \ntive summarization (Baan et al., 2019), and GLUE \ntasks (Kovaleva et al., 2019). Additionally, Ten- \nney et al. (2019a) examine the cumulative gains of \ntheir structural probing classifier, observing that in \n5 out of 8 probing tasks some layers cause a drop \nin scores (typically in the final layers). Gordon \net al. (2020) find that 30–40% of the weights can \nbe pruned without impact on downstream tasks. \n\nA big methodological challenge in the current \nNLP is that the reported performance improve- \nments of new models may well be within varia- \ntion induced by environment factors (Crane, 2018). \nBERT is not an exception. Dodge et al. (2020) \nreport significant variation for BERT fine-tuned \non GLUE tasks due to both weight initialization \nand training data order. They also propose early \nstopping on the less-promising seeds. \n\nIn general, larger BERT models perform better \n(Liu et al., 2019a; Roberts et al., 2020), but not \nalways: BERT-base outperformed BERT-large on \nsubject-verb agreement (Goldberg, 2019) and sen- \ntence subject detection (Lin et al., 2019). Given \nthe complexity of language, and amounts of pre- \ntraining data, it is not clear why BERT ends up with \nredundant heads and layers. Clark et al. (2019) sug- \ngest that one possible reason is the use of attention \ndropouts, which causes some attention weights to \nbe zeroed-out during training. \n\nAlthough we hope that the above observations \nmay be useful for the practitioners, this section \ndoes not exhaust the current research on fine-tuning \nand its alternatives. For example, we do not cover \nsuch topics as Siamese architectures, policy gradi- \nent training, automated curriculum learning, and \nothers. \n\nGiven the above evidence of overparameteriza- \ntion, it does not come as a surprise that BERT \ncan be efficiently compressed with minimal ac- \ncuracy loss, which would be highly desirable for \nreal-world applications. Such efforts to date are \nsummarized in Table 1. The main approaches are \nknowledge distillation, quantization, and pruning. \nThe studies in the knowledge distillation \nframework (Hinton et al., 2014) use a smaller \nstudent-network trained to mimic the behavior of \na larger teacher-network. For BERT, this has been \nachieved through experiments with loss functions \n(Sanh et al., 2019b; Jiao et al., 2019), mimicking \nthe activation patterns of individual portions of the \nteacher network (Sun et al., 2019a), and knowledge \ntransfer at the pre-training (Turc et al., 2019; Jiao \net al., 2019; Sun et al., 2020) or fine-tuning stage \n(Jiao et al., 2019). McCarley et al. (2020) suggest \nthat distillation has so far worked better for GLUE \nthan for reading comprehension, and report good \nresults for QA from a combination of structured \npruning and task-specific distillation. \n\n6.1 Overparameterization \n\nTransformer-based models keep growing by or- \nders of magnitude: the 110M parameters of base \nBERT are now dwarfed by 17B parameters of \nTuring-NLG (Microsoft, 2020), which is dwarfed \nby 175B of GPT-3 (Brown et al., 2020). This trend \nraises concerns about computational complexity \nof self-attention (Wu et al., 2019a), environmental \nissues (Strubell et al., 2019; Schwartz et al., 2019), \nfair comparison of architectures (Aßenmacher and \nHeumann, 2020), and reproducibility.", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "5.3 Pre-training BERT \n\nThe original BERT is a bidirectional Transformer \npre-trained on two tasks: next sentence prediction \n(NSP) and masked language model (MLM) (sec- \ntion 2). Multiple studies have come up with alter- \nnative training objectives to improve on BERT, \nwhich could be categorized as follows: \n\n• NSP alternatives. Removing NSP does not \nhurt or slightly improves performance (Liu \net al., 2019b; Joshi et al., 2020; Clinchant \net al., 2019). Wang et al. (2019a) and Cheng \net al. (2019) replace NSP with the task of \npredicting both the next and the previous sen- \ntences. Lan et al. (2020a) replace the negative \nNSP examples by swapped sentences from \npositive examples, rather than sentences from \ndifferent documents. ERNIE 2.0 includes sen- \ntence reordering and sentence distance pre- \ndiction. Bai et al. (2020) replace both NSP \nand token position embeddings by a combina- \ntion of paragraph, sentence, and token index \nembeddings. Li and Choi (2020) experiment \nwith utterance order prediction task for multi- \nparty dialogue (and also MLM at the level of \nutterances and the whole dialogue). \n\n• How to mask. Raffel et al. (2019) systemati- \ncally experiment with corruption rate and cor- \nrupted span length. Liu et al. (2019b) propose \ndiverse masks for training examples within \nan epoch, while Baevski et al. (2019) mask \nevery token in a sequence instead of a random \nselection. Clinchant et al. (2019) replace the \nMASK token with [UNK] token, to help the \nmodel learn a representation for unknowns \nthat could be useful for translation. Song et al. \n(2020) maximize the amount of information \navailable to the model by conditioning on both \nmasked and unmasked tokens, and letting the \nmodel see how many tokens are missing. \n• What to mask. Masks can be applied to full \nwords instead of word-pieces (Devlin et al., \n2019; Cui et al., 2019). Similarly, we can \nmask spans rather than single tokens (Joshi \net al., 2020), predicting how many are missing \n(Lewis et al., 2019). Masking phrases and \nnamed entities (Sun et al., 2019b) improves \nrepresentation of structured knowledge. \n\n• Other tasks. Sun et al. (2019c) propose si- \nmultaneous learning of 7 tasks, including dis- \ncourse relation classification and predicting \nwhether a segment is relevant for IR. Guu \net al. (2020) include a latent knowledge re- \ntriever in language model pretraining. Wang \net al. (2020c) combine MLM with knowledge \nbase completion objective. Glass et al. (2020) \nreplace MLM with span prediction task (as \nin extractive question answering), where the \nmodel is expected to provide the answer not \nfrom its own weights, but from a different pas- \nsage containing the correct answer (a relevant \nsearch engine query snippet). \n\n• Where to mask. Lample and Conneau (2019) \nuse arbitrary text streams instead of sentence \npairs and subsample frequent outputs similar \nto Mikolov et al. (2013). Bao et al. (2020) \ncombine the standard autoencoding MLM \nwith partially autoregressive LM objective us- \ning special pseudo mask tokens. \n\nAnother obvious source of improvement is pre- \ntraining data. Several studies explored the ben- \nefits of increasing the corpus volume (Liu et al., \n2019b; Conneau et al., 2019; Baevski et al., 2019) \nand longer training (Liu et al., 2019b). The data \nalso does not have to be raw text: there is a num- \nber efforts to incorporate explicit linguistic in- \nformation, both syntactic (Sundararaman et al., \n2019) and semantic (Zhang et al., 2020). Wu et al. \n(2019b) and Kumar et al. (2020) include the label \nfor a given sequence from an annotated task dataset. \nSchick and Schütze (2020) separately learn repre- \nsentations for rare words.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "He Bai, Peng Shi, \n\nJimmy Lin, Luchen \nTan, Kun Xiong, Wen Gao, and Ming Li. \n2020. SegaBERT: Pre-training of Segment- \naware BERT for Language Understanding. \narXiv:2004.14996 [cs]. \nGustavo Aguilar, Yuan Ling, Yu Zhang, Benjamin \nYao, Xing Fan, and Edward Guo. 2019. Knowl- \nedge Distillation from Internal Representations. \narXiv preprint arXiv:1910.03723. \n\nSriram Balasubramanian, Naman Jain, Gaurav Jin- \ndal, Abhijeet Awasthi, and Sunita Sarawagi. \n2020. What’s in a Name? Are BERT Named En- \ntity Representations just as Good for any other \nName? In Proceedings of the 5th Workshop on \nRepresentation Learning for NLP, pages 205– \n214, Online. Association for Computational Lin- \nguistics. \n\nAlan Akbik, Tanja Bergmann, and Roland Voll- \ngraf. 2019. Pooled Contextualized Embeddings \nfor Named Entity Recognition. In Proceedings \nof the 2019 Conference of the North Ameri- \ncan Chapter of the Association for Computa- \ntional Linguistics: Human Language Technolo- \ngies, Volume 1 (Long and Short Papers), pages \n724–728, Minneapolis, Minnesota. Association \nfor Computational Linguistics. \n\nHangbo Bao, Li Dong, Furu Wei, Wenhui Wang, \nNan Yang, Xiaodong Liu, Yu Wang, Songhao \nPiao, Jianfeng Gao, Ming Zhou, and Hsiao- \nWuen Hon. 2020. UniLMv2: Pseudo-Masked \nLanguage Models for Unified Language Model \nPre-Training. arXiv:2002.12804 [cs]. \n\nYuki Arase and Jun’ichi Tsujii. 2019. Transfer \nFine-Tuning: A BERT Case Study. In Proceed- \nings of the 2019 Conference on Empirical Meth- \nods in Natural Language Processing and the \n9th International Joint Conference on Natural \nLanguage Processing (EMNLP-IJCNLP), pages \n5393–5404, Hong Kong, China. Association for \nComputational Linguistics. \n\nEkaterina Arkhangelskaia and Sourav Dutta. 2019. \nWhatcha lookin’at? DeepLIFTing BERT’s At- \ntention in Question Answering. arXiv preprint \narXiv:1910.06431. \n\nMikel Artetxe, Sebastian Ruder, and Dani Yo- \ngatama. 2019. On the Cross-lingual Trans- \nferability of Monolingual Representations. \narXiv:1911.03310 [cs]. \n\n\n \n \n \n \n [html]\n
ysis Methods in veural Language rtocessil A Survey. Transactions of the Association β Computational Linguistics, 7 : 49 – 72.Eyal Ben - David, Carmel Rabinovitz, and Roi Fichart. 2020, PERL : Pivot - based Domain Adation for Pre - trained Deep Contextualized E bedding Models. arXiv : 2006.09075 [ cs ].Rishi Bommasani, Kelly Davis, and Claire Carc 2020. Interpreting Pretrained Contextualiz Representations via Reductions to Static E beddings. In Proceedings of the 50th Amn Meeting of the Association Jor ComparationZird Bouraoui, Jose Camacho - Collados, a Sieven Schockaer, 2019. Inducing Relation Knowledge from BERT. arXiv : 1911.127 Joj.
Samuel Broscheit. 2019. Investigating Ent Knowledge in BERT with Simple Neural Ea
\n\nMatthias Aßenmacher and Christian Heumann. \n2020. On the comparability of Pre-Trained Lan- \nguage Models. arXiv:2001.00781 [cs, stat]. \n\nJoris Baan, Maartje ter Hoeve, Marlies van der \nWees, Anne Schuth, and Maarten de Rijke. \n2019. Understanding Multi-Head Attention \nin Abstractive Summarization. arXiv preprint \narXiv:1911.03898.", + "page_start": 12, + "page_end": 12, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "this strategy often requires compatible hardware. \n\nindividual self- \nattention heads and BERT layers can be disabled \nwithout significant drop in performance (Michel \net al., 2019; Kovaleva et al., 2019; Baan et al., \n2019). Pruning is a compression technique that \ntakes advantage of that fact, typically reducing the \namount of computation via zeroing out of certain \nparts of the large model. In structured pruning, \narchitecture blocks are dropped, as in LayerDrop \n(Fan et al., 2019). In unstructured, the weights in \nthe entire model are pruned irrespective of their lo- \ncation, as in magnitude pruning (Chen et al., 2020) \nor movement pruning (Sanh et al., 2020). \n\nAs discussed in section 6, \n\nPrasanna et al. (2020) and Chen et al. (2020) \nexplore BERT from the perspective of the lottery \nticket hypothesis (Frankle and Carbin, 2019), look- \ning specifically at the \"winning\" subnetworks in \npre-trained BERT. They independently find that \nsuch subnetworks do exist, and that transferability \nbetween subnetworks for different tasks varies. \n\nmodels and compressing them heavily rather than \ncompressing smaller models lightly. \n\nOther techniques include decomposing BERT’s \nembedding matrix into smaller matrices (Lan et al., \n2020a), progressive module replacing (Xu et al., \n2020) and dynamic elimination of intermediate en- \ncoder outputs (Goyal et al., 2020). See Ganesh et al. \n(2020) for a more detailed discussion of compres- \nsion methods. \n\n6.3 Pruning and model analysis \n\nThere is a nascent discussion around pruning as a \nmodel analysis technique. The basic idea is that \na compressed model a priori consists of elements \nthat are useful for prediction; therefore by finding \nout what they do we may find out what the whole \nnetwork does. For instance, BERT has heads that \nseem to encode frame-semantic relations, but dis- \nabling them might not hurt downstream task per- \nformance Kovaleva et al. (2019); this suggests that \nthis knowledge is not actually used. \n\nIf the ultimate goal of training BERT is compres- \nsion, Li et al. (2020) recommend training larger For the base Transformer, Voita et al. (2019b) \nidentify the functions of self-attention heads and", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "David Vilares, Michalina Strzyz, Anders Søgaard, \nand Carlos Gómez-Rodríguez. 2020. Parsing as \npretraining. In Thirty-Fourth AAAI Conference \non Artificial Intelligence (AAAI-20). Wei Wang, Bin Bi, Ming Yan, Chen Wu, Zuyi \nBao, Liwei Peng, and Luo Si. 2019a. Struct- \nBERT: Incorporating Language Structures into", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Data. In Proceedings of the 58th Annual Meet- \ning of the Association for Computational Lin- \nguistics, pages 8413–8426, Online. Association \nfor Computational Linguistics. \n\nYiyun Zhao and Steven Bethard. 2020. How does \nBERT’s attention change when you fine-tune? \nAn analysis methodology and a case study in \nnegation scope. In Proceedings of the 58th An- \nnual Meeting of the Association for Computa- \ntional Linguistics, pages 4729–4747, Online. As- \nsociation for Computational Linguistics. \n\nDani Yogatama, Cyprien de Masson d’Autume, \nJerome Connor, Tomas Kocisky, Mike \nChrzanowski, Lingpeng Kong, Angeliki Lazari- \ndou, Wang Ling, Lei Yu, Chris Dyer, and Phil \nBlunsom. 2019. Learning and Evaluating Gen- \neral Linguistic Intelligence. arXiv:1901.11373 \n[cs, stat]. \n\nWenxuan Zhou, \n\nJunyi Du, and Xiang Ren. \nImproving BERT Fine-tuning with \narXiv preprint \n\n2019. \nEmbedding Normalization. \narXiv:1911.03918. \n\nXuhui Zhou, Yue Zhang, Leyang Cui, and Dandan \nHuang. 2020. Evaluating Commonsense in Pre- \nTrained Language Models. In AAAI 2020. \n\nYang You, Jing Li, Sashank Reddi, Jonathan Hseu, \nSanjiv Kumar, Srinadh Bhojanapalli, Xiaodan \nSong, James Demmel, and Cho-Jui Hsieh. 2019. \nLarge Batch Optimization for Deep Learning: \nTraining BERT in 76 Minutes. arXiv preprint \narXiv:1904.00962, 1(5). \n\nChen Zhu, Yu Cheng, Zhe Gan, Siqi Sun, Tom \nGoldstein, and Jingjing Liu. 2019. FreeLB: En- \nhanced Adversarial Training for Language Un- \nderstanding. arXiv:1909.11764 [cs]. \n\nAli Hadi Zadeh and Andreas Moshovos. 2020. \nGOBO: Quantizing Attention-Based NLP Mod- \nels for Low Latency and Energy Efficient Infer- \nence. arXiv:2005.03842 [cs, stat]. \n\nOfir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe \nWasserblat. 2019. Q8BERT: Quantized 8bit \nBERT. arXiv preprint arXiv:1910.06188. \n\nRowan Zellers, Ari Holtzman, Yonatan Bisk, Ali \nFarhadi, and Yejin Choi. 2019. HellaSwag: Can \na Machine Really Finish Your Sentence? In Pro- \nceedings of the 57th Annual Meeting of the As- \nsociation for Computational Linguistics, pages \n4791–4800. \n\nZhengyan Zhang, Xu Han, Zhiyuan Liu, Xin Jiang, \nMaosong Sun, and Qun Liu. 2019. ERNIE: En- \nhanced Language Representation with Informa- \ntive Entities. In Proceedings of the 57th Annual \nMeeting of the Association for Computational \nLinguistics, pages 1441–1451, Florence, Italy. \nAssociation for Computational Linguistics. \n\nZhuosheng Zhang, Yuwei Wu, Hai Zhao, Zuchao \nLi, Shuailiang Zhang, Xi Zhou, and Xiang Zhou. \n2020. Semantics-aware BERT for Language \nUnderstanding. In AAAI 2020. \n\nSanqiang Zhao, Raghav Gupta, Yang Song, \nand Denny Zhou. 2019. \nExtreme Lan- \nguage Model Compression with Optimal Sub- \nwords and Shared Projections. arXiv preprint \narXiv:1909.11687.", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is syntaxis encoded with Bert model ?", + "target_page": 2, + "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "David Vilares, Michalina Strzyz, Anders Søgaard, \nand Carlos Gómez-Rodríguez. 2020. Parsing as \npretraining. In Thirty-Fourth AAAI Conference \non Artificial Intelligence (AAAI-20). Wei Wang, Bin Bi, Ming Yan, Chen Wu, Zuyi \nBao, Liwei Peng, and Luo Si. 2019a. Struct- \nBERT: Incorporating Language Structures into", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. \n\nBut this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. \n\nSince BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. \n\n4 Localizing linguistic knowledge \n\n4.1 BERT embeddings", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "3 What knowledge does BERT have? \n\nA number of studies have looked at the knowledge \nencoded in BERT weights. The popular approaches \ninclude fill-in-the-gap probes of MLM, analysis of \nself-attention weights, and probing classifiers with \ndifferent BERT representations as inputs. \n\n3.1 Syntactic knowledge \n\nLin et al. (2019) showed that BERT represen- \ntations are hierarchical rather than linear, i.e. \nthere is something akin to syntactic tree structure \nin addition to the word order information. Ten- \nney et al. (2019b) and Liu et al. (2019a) also \nshowed that BERT embeddings encode informa- \ntion about parts of speech, syntactic chunks \nand roles. Enough syntactic information seems \nto be captured in the token embeddings themselves \nto recover syntactic trees (Vilares et al., 2020; Kim \net al., 2020; Rosa and Mareˇcek, 2019), although \nprobing classifiers could not recover the labels of \ndistant parent nodes in the syntactic tree (Liu et al., \n2019a). Warstadt and Bowman (2020) report evi- \ndence of hierarchical structure in three out of four \nprobing tasks. \n\nFigure 1: Parameter-free probe for syntactic knowledge: \nwords sharing syntactic subtrees have larger impact on \neach other in the MLM prediction (Wu et al., 2020) \n\nparameter-free approach based on measuring the \nimpact that one word has on predicting another \nword within a sequence in the MLM task (Figure 1). \nThey concluded that BERT \"naturally\" learns \nsome syntactic information, although it is not \nvery similar to linguistic annotated resources. \n\nAs far as how syntax is represented, it seems \nthat syntactic structure is not directly encoded \nin self-attention weights. Htut et al. (2019) were \nunable to extract full parse trees from BERT heads \neven with the gold annotations for the root. Jawahar \net al. (2019) include a brief illustration of a depen- \ndency tree extracted directly from self-attention \nweights, but provide no quantitative evaluation. \n\nThe fill-in-the-gap probes of MLM showed that \nBERT takes subject-predicate agreement into \naccount when performing the cloze task (Gold- \nberg, 2019; van Schijndel et al., 2019), even for \nmeaningless sentences and sentences with distrac- \ntor clauses between the subject and the verb (Gold- \nberg, 2019). A study of negative polarity items \n(NPIs) by Warstadt et al. (2019) showed that BERT \nis better able to detect the presence of NPIs (e.g. \n\"ever\") and the words that allow their use (e.g. \n\"whether\") than scope violations. \n\nThe above claims of syntactic knowledge are be- \nlied by the evidence that BERT does not \"under- \nstand\" negation and is insensitive to malformed \ninput. In particular, its predictions were not al- \ntered2 even with shuffled word order, truncated \nsentences, removed subjects and objects (Ettinger, \n2019). This could mean that either BERT’s syn- \ntactic knowledge is incomplete, or it does not \nneed to rely on it for solving its tasks. The latter \nseems more likely, since Glavaš and Vuli´c (2020) \n\n2See also the recent findings on adversarial triggers, which \nget the model to produce a certain output even though they \nare not well-formed from the point of view of a human reader \n(Wallace et al., 2019a). \n\nHowever, syntactic information can be recov- \nered from BERT token representations. Hewitt \nand Manning (2019) were able to learn transfor- \nmation matrices that successfully recovered syn- \ntactic dependencies in PennTreebank data from \nBERT’s token embeddings (see also Manning et al., \n2020). Jawahar et al. (2019) experimented with \ntransformations of the [CLS] token using Tensor \nProduct Decomposition Networks (McCoy et al., \n2019a), concluding that dependency trees are the \nbest match among 5 decomposition schemes (al- \nthough the reported MSE differences are very \nsmall). Miaschi and Dell’Orletta (2020) performs \na range of syntactic probing experiments with con- \ncatenated token representations as input.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "4.2.2 Attention to special tokens \nKovaleva et al. (2019) show that most self- \nattention heads do not directly encode any non- \ntrivial linguistic information, at least when fine- \ntuned on GLUE (Wang et al., 2018), since only less \nthan 50% of heads exhibit the \"heterogeneous\" pat- \ntern. Much of the model produced the vertical pat- \ntern (attention to [CLS], [SEP], and punctuation \ntokens), consistent with the observations by Clark \net al. (2019). This redundancy is likely related to \nthe overparameterization issue (see section 6). Both Clark et al. (2019) and Htut et al. (2019) \nconclude that no single head has the complete \nsyntactic tree information, in line with evidence \nof partial knowledge of syntax (cf. subsection 3.1). \nHowever, Clark et al. (2019) identify a BERT head", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "[html]ModelFinetunedLanguage# paramsSize ( Gb )Seq. Len.Emb. dim.LicenseSentence simbert - base - multilingual - casedNomultilingual1.78e + 080.71512768Apache - 2.0Nobert - base - multilingual - uncasedNomultilingual1.67e + 080.67512768Apache - 2.0Nocamembert - baseNofrench1.11e + 080.44514768MITNocamembert - lorgeNofrench3.37e + 081.355141024MITNosentence - camembert - baseYesfrench1.11e + 080.44128768Apache - 2.0Yessentence - camembert - largeYesfrench3.37e + 081.355141024Apache - 2.0Yessentence - flaubert - baseYesfrench1.37e + 080.55512768Apache - 2.0Yesembed - multilingual - light - v3.0N / AmultilingualN / AN / A512384Closed sourceN / Acmbed - multilingual - v3.0N / AmultilingualN / AN / A5121024Closed sourceN / Aflashen - base - casedNofrench1.38e + 080.55512768MITNoflashert - base - uncasedNofrench1.37e + 080.55512768MITNoflaubert - large - casedNofrench3.73e + 081.495121024MITNodistilbert - base - 25lang - casedNomultifingxil1J38e + 080.43512768Apache - 2.0Nodistilbert - base - en - fr - casedNobilingual6.86c + 070.27512768Apache - 2.0Nodistilbert - base - fr - casedNofrench6.17e + 070.25512768Apache - 2.0Nomultilingual - c5 - baseNomultilingual2.78e + 081.11512768MITYesmultilingual - c5 - largeNomultilingxal5.60e + 082.245121024MITYesmultilingual - c5 - smallNomultilingxal1.18e + 080.47512384MITYesc5 - mistral - 7b - instructYesenglish - plus7.11e + 0928.44327684096MITYesundever - bloom - 1b1Yesmultilingxol1J07e + 094.2620481536bloom - rail - 1.0Yesudever - bloom - 560mYesmultilingxal5.59e + 082.2420481024bloom - rail - 1.0Yeslaser2Yesmultilingxal4.46e + 070.18N / A1024BSD LicenseYesall - MiniLM - L12 - v2Yesenglish - plus3.34e + 070.13128384Apache - 2.0Yesall - MiniLM - L6 - v2Yesenglish - plus2.27e +", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv4.pdf" + }, + { + "text": "Sofia Serrano and Noah A. Smith. 2019. Is Atten- \ntion Interpretable? arXiv:1906.03731 [cs]. \n\nYu Sun, Shuohuan Wang, Yukun Li, Shikun \nFeng, Hao Tian, Hua Wu, and Haifeng Wang. \n2019c. \nERNIE 2.0: A Continual Pre- \nTraining Framework for Language Understand- \ning. arXiv:1907.12412 [cs]. \n\nSheng Shen, Zhen Dong, Jiayu Ye, Linjian Ma, \nZhewei Yao, Amir Gholami, Michael W Ma- \nhoney, and Kurt Keutzer. 2019. Q-BERT: Hes- \nsian Based Ultra Low Precision Quantization of \nBERT. arXiv preprint arXiv:1909.05840. \n\nZhiqing Sun, Hongkun Yu, Xiaodan Song, Ren- \njie Liu, Yiming Yang, and Denny Zhou. 2020. \nMobileBERT: Task-Agnostic Compression of \nBERT for Resource Limited Devices. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019a. What does BERT learn \nfrom multiple-choice reading comprehension \ndatasets? arXiv preprint arXiv:1910.12391. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019b. What does BERT Learn \nfrom Multiple-Choice Reading Comprehension \nDatasets? arXiv:1910.12391 [cs]. \n\nKaitao Song, Xu Tan, Tao Qin, Jianfeng Lu, and \nTie-Yan Liu. 2020. MPNet: Masked and Per- \nmuted Pre-training for Language Understanding. \narXiv:2004.09297 [cs]. \n\nAsa Cooper Stickland and Iain Murray. 2019. \nBERT and PALs: Projected Attention Layers for \nEfficient Adaptation in Multi-Task Learning. In \nInternational Conference on Machine Learning, \npages 5986–5995. \n\nEmma Strubell, Ananya Ganesh, and Andrew Mc- \nCallum. 2019. Energy and Policy Considera- \ntions for Deep Learning in NLP. In ACL 2019. \n\n\n \n \n \n \n [html]\n
TableInfused Tansformer and BEK1 Tiodeis IOITablechine Translation and Natural Language U standing, arXiv : 1911.06156 [ cs, stat ].TableTableTableTailmor, Yanai Elazar, Yoav Gold and Jonathan Berant. 2019. oLMpics - what Language Model Pre - Training Capt arXiv : 1912.13283 [ cs ].TableTanaka, Hiroyaki Shimos, Rui Cao, Bai, and Wen Ma, 2020. Document Class tion by Word Embeddings of HERT, In Cstational Linguistics, Communications in Oputer and Information Science, pages 145 - Singapore. Springer.TableLili Olga Vechtomova, and Jimmy Lin. 2019. tilling Task - Specific Knowledge from Binto Simple Neural Networks. arXiv pny, pny, and Networks. arXiv pny, pny,
\n\nSaku Sugawara, Pontus Stenetorp, Kentaro Inui, \nand Akiko Aizawa. 2020. Assessing the Bench- \nmarking Capacity of Machine Reading Compre- \nhension Datasets. In AAAI. \n\nTa-Chun Su and Hsiang-Chih Cheng. 2019. \nfor Anywhere. \n\nSesameBERT: Attention \narXiv:1910.03176 [cs]. \n\nIan Tenney, Dipanjan Das, and Ellie Pavlick. 2019a. \nBERT Rediscovers the Classical NLP Pipeline. \nIn Proceedings of the 57th Annual Meeting of \nthe Association for Computational Linguistics, \npages 4593–4601. \n\nSiqi Sun, Yu Cheng, Zhe Gan, and Jingjing Liu. \n2019a. Patient Knowledge Distillation for BERT \nModel Compression. In Proceedings of the 2019 \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4314–4323. \n\nIan Tenney, Patrick Xia, Berlin Chen, Alex Wang, \nAdam Poliak, R. Thomas McCoy, Najoung Kim, \nBenjamin Van Durme, Samuel R. Bowman, Di- \npanjan Das, and Ellie Pavlick. 2019b. What do \nyou learn from context? Probing for sentence \nstructure in contextualized word representations. \nIn International Conference on Learning Repre- \nsentations.", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Benchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion \n\nIn a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "then check which of them survive the pruning, find- \ning that the syntactic and positional heads are the \nlast ones to go. For BERT, Prasanna et al. (2020) \ngo in the opposite direction: pruning on the basis of \nimportance scores, and interpreting the remaining \n\"good\" subnetwork. With respect to self-attention \nheads specifically, it does not seem to be the case \nthat only the heads that potentially encode non- \ntrivial linguistic patterns survive the pruning. \n\nthe data, we have no reason to expect BERT to not \nlearn it. But harder datasets that cannot be resolved \nwith shallow heuristics are unlikely to emerge if \ntheir development is not as valued as modeling \nwork. \n\nBenchmarks for the full range of linguistic \ncompetence. While the language models seem to \nacquire a great deal of knowledge about language, \nwe do not currently have comprehensive stress tests \nfor different aspects of linguistic knowledge. A \nstep in this direction is the \"Checklist\" behavioral \ntesting (Ribeiro et al., 2020), the best paper at ACL \n2020. Ideally, such tests would measure not only \nerrors, but also sensitivity (Ettinger, 2019). \n\nThe models and methodology in these studies \ndiffer, so the evidence is inconclusive. In particular, \nVoita et al. (2019b) find that before pruning the \nmajority of heads are syntactic, and Prasanna et al. \n(2020) – that the majority of heads do not have \npotentially non-trivial attention patterns. \n\nDeveloping methods \nto \"teach\" reasoning. \nWhile large pre-trained models have a lot of knowl- \nedge, they often fail if any reasoning needs to be \nperformed on top of the facts they possess (Tal- \nmor et al., 2019, see also subsection 3.3). For in- \nstance, Richardson et al. (2020) propose a method \nto \"teach\" BERT quantification, conditionals, com- \nparatives, and boolean coordination. \n\nAn important limitation of the current head and \nlayer ablation studies (Michel et al., 2019; Koval- \neva et al., 2019) is that they inherently assume \nthat certain knowledge is contained in heads/layers. \nHowever, there is evidence of more diffuse rep- \nresentations spread across the full network, such \nas the gradual increase in accuracy on difficult se- \nmantic parsing tasks (Tenney et al., 2019a) or the \nabsence of heads that would perform parsing \"in \ngeneral\" (Clark et al., 2019; Htut et al., 2019). If so, \nablating individual components harms the weight- \nsharing mechanism. Conclusions from component \nablations are also problematic if the same informa- \ntion is duplicated elsewhere in the network. \n\ninference time. \nLearning what happens at \nMost BERT analysis papers focus on different \nprobes of the model, with the goal to find what \nthe language model \"knows\". However, probing \nstudies have limitations (subsection 3.4), and to this \npoint, far fewer papers have focused on discovering \nwhat knowledge actually gets used. Several promis- \ning directions are the \"amnesic probing\" (Elazar \net al., 2020), identifying features important for pre- \ndiction for a given task (Arkhangelskaia and Dutta, \n2019), and pruning the model to remove the non- \nimportant components (Voita et al., 2019b; Michel \net al., 2019; Prasanna et al., 2020). \n\n7 Directions for further research \n\nBERTology has clearly come a long way, but it \nis fair to say we still have more questions than \nanswers about how BERT works. In this section, \nwe list what we believe to be the most promising \ndirections for further research.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Question : What is the name of the Russian mercenary group?
Answer : Wagner group.
Qpestion : Where is the Wagner group?
Answer : In Syria.
\n\nshe primarily had n-gram models in mind, the conclusions remain \napt and relevant. \n\nThere are interesting linguistic questions to ask about what ex- \nactly BERT, GPT-3 and their kin are learning about linguistic struc- \nture from the unsupervised language modeling task, as studied in \nthe emerging field of ‘BERTology’ [e.g. 110, 133]. However, from \nthe perspective of work on language technology, it is far from clear \nthat all of the effort being put into using large LMs to ‘beat’ tasks \ndesigned to test natural language understanding, and all of the \neffort to create new such tasks, once the existing ones have been \nbulldozed by the LMs, brings us any closer to long-term goals of \ngeneral language understanding systems. If a large LM, endowed \nwith hundreds of billions of parameters and trained on a very large \ndataset, can manipulate linguistic form well enough to cheat its \nway through tests meant to require language understanding, have \nwe learned anything of value about how to build machine language \nunderstanding or have we been led down the garden path? \n\n6 STOCHASTIC PARROTS \nIn this section, we explore the ways in which the factors laid out in \n§4 and §5 — the tendency of training data ingested from the Internet \nto encode hegemonic worldviews, the tendency of LMs to amplify \nbiases and other issues in the training data, and the tendency of re- \nsearchers and other people to mistake LM-driven performance gains \nfor actual natural language understanding — present real-world \nrisks of harm, as these technologies are deployed. After exploring \nsome reasons why humans mistake LM output for meaningful text, \nwe turn to the risks and harms from deploying such a model at \nscale. We find that the mix of human biases and seemingly coherent \nlanguage heightens the potential for automation bias, deliberate \nmisuse, and amplification of a hegemonic worldview. We focus \nprimarily on cases where LMs are used in generating text, but we \nwill also touch on risks that arise when LMs or word embeddings \nderived from them are components of systems for classification, \nquery expansion, or other tasks, or when users can query LMs for \ninformation memorized from their training data. \n\ntakes place between individuals who share common ground and are \nmutually aware of that sharing (and its extent), who have commu- \nnicative intents which they use language to convey, and who model \neach others’ mental states as they communicate. As such, human \ncommunication relies on the interpretation of implicit meaning \nconveyed between individuals. The fact that human-human com- \nmunication is a jointly constructed activity [29, 128] is most clearly \ntrue in co-situated spoken or signed communication, but we use \nthe same facilities for producing language that is intended for au- \ndiences not co-present with us (readers, listeners, watchers at a \ndistance in time or space) and in interpreting such language when \nwe encounter it. It must follow that even when we don’t know the \nperson who generated the language we are interpreting, we build a \npartial model of who they are and what common ground we think \nthey share with us, and use this in interpreting their words.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is BERT good with numbers representations ?", + "target_page": 3, + "target_passage": " BERTstruggles with representations of numbers. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. \n\nBERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. \n\nOut-of-the-box BERT is surprisingly brittle to \nnamed entity replacements: e.g. replacing names \nin the coreference task changes 85% of predictions \n(Balasubramanian et al., 2020). This suggests that \nthe model does not actually form a generic idea of \nnamed entities, although its F1 scores on NER prob- \ning tasks are high (Tenney et al., 2019a). Broscheit \n(2019) find that ��ne-tuning BERT on Wikipedia \nentity linking \"teaches\" it additional entity knowl- \nedge, which would suggest that it did not absorb all \nthe relevant entity information during pre-training \non Wikipedia. \n\n3.4 Limitations \n\nMultiple probing studies in section 3 and section 4 \nreport that BERT possesses a surprising amount of \nsyntactic, semantic, and world knowledge. How- \never, Tenney et al. (2019a) remarks, “the fact that \na linguistic pattern is not observed by our probing \nclassifier does not guarantee that it is not there, and \nthe observation of a pattern does not tell us how it \nis used.\" There is also the issue of how complex a \nprobe should be allowed to be (Liu et al., 2019a). If \na more complex probe recovers more information, \nto what extent are we still relying on the original \nmodel? \n\n3.3 World knowledge", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Anna Rogers \nCenter for Social Data Science \nUniversity of Copenhagen \narogers@sodas.ku.dk Olga Kovaleva \nDept. of Computer Science \nUniversity of Massachusetts Lowell \nokovalev@cs.uml.edu Anna Rumshisky \nDept. of Computer Science \nUniversity of Massachusetts Lowell \narum@cs.uml.edu \n\nimprove BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. \n\nAbstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. \n\n0 \n2 \n0 \n2 \n\nv \no \nN \n9 \n\n] \nL \nC \n. \ns \nc \n[ \n\n3 \nv \n7 \n2 \n3 \n2 \n1 \n. \n2 \n0 \n0 \n2 \n: \nv \ni \nX \nr \na \n\nFundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. \n\nGoogle1 and HuggingFace (Wolf et al., 2020) \nprovide many variants of BERT, including the orig- \ninal \"base\" and \"large\" versions. They vary in the \nnumber of heads, layers, and hidden state size. \n\n1https://github.com/ \ngoogle-research/bert \n\nSince their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "avenue for future work. \n\nThe above discussion concerns token embed- \ndings, but BERT is typically used as a sentence or \ntext encoder. The standard way to generate sen- \ntence or text representations for classification is \nto use the [CLS] token, but alternatives are also \nbeing discussed, including concatenation of token \nrepresentations (Tanaka et al., 2020), normalized \nmean (Tanaka et al., 2020), and layer activations \n(Ma et al., 2019). See Toshniwal et al. (2020) for a \nsystematic comparison of several methods across \ntasks and sentence encoders. \n\nLin et al. (2019) present evidence that atten- \ntion weights are weak indicators of subject- \nverb agreement and reflexive anaphora. Instead \nof serving as strong pointers between tokens that \nshould be related, BERT’s self-attention weights \nwere close to a uniform attention baseline, but there \nwas some sensitivity to different types of distrac- \ntors coherent with psycholinguistic data. This is \nconsistent with conclusions by Ettinger (2019). \n4.2 Self-attention heads \n\nTo our knowledge, morphological information \nin BERT heads has not been addressed, but with \nthe sparse attention variant by Correia et al. (2019) \nin the base Transformer, some attention heads ap- \npear to merge BPE-tokenized words. For semantic \nrelations, there are reports of self-attention heads \nencoding core frame-semantic relations (Kovaleva \net al., 2019), as well as lexicographic and common- \nsense relations (Cui et al., 2020). Several studies proposed classification of attention \nhead types. Raganato and Tiedemann (2018) dis- \ncuss attending to the token itself, previous/next \ntokens and the sentence end. Clark et al. (2019) \ndistinguish between attending to previous/next to- \nkens, [CLS], [SEP], punctuation, and \"attending \nbroadly\" over the sequence. Kovaleva et al. (2019) \npropose 5 patterns shown in Figure 3. \n\nThe overall popularity of self-attention as an in- \nterpretability mechanism is due to the idea that \n\"attention weight has a clear meaning: how much \na particular word will be weighted when comput- \ning the next representation for the current word\" \n(Clark et al., 2019). This view is currently debated \n(Jain and Wallace, 2019; Serrano and Smith, 2019; \nWiegreffe and Pinter, 2019; Brunner et al., 2020), \nand in a multi-layer model where attention is fol- \nlowed by non-linear transformations, the patterns \nin individual heads do not provide a full picture. \nAlso, while many current papers are accompanied \nby attention visualizations, and there is a growing \nnumber of visualization tools (Vig, 2019; Hoover \net al., 2019), the visualization is typically limited \nto qualitative analysis (often with cherry-picked \nexamples) (Belinkov and Glass, 2019), and should \nnot be interpreted as definitive evidence. \n\n4.2.1 Heads with linguistic functions \nThe \"heterogeneous\" attention pattern shown in \nFigure 3 could potentially be linguistically inter- \npretable, and a number of studies focused on iden- \nIn \ntifying the functions of self-attention heads. \nparticular, some BERT heads seem to specialize \nin certain types of syntactic relations. Htut et al. \n(2019) and Clark et al. (2019) report that there \nare BERT heads that attended significantly more \nthan a random baseline to words in certain syntac- \ntic positions. The datasets and methods used in \nthese studies differ, but they both find that there are \nheads that attend to words in obj role more than \nthe positional baseline. The evidence for nsubj, \nadvmod, and amod varies between these two stud- \nies. The overall conclusion is also supported by \nVoita et al. (2019b)’s study of the base Transformer \nin machine translation context. Hoover et al. (2019) \nhypothesize that even complex dependencies like \ndobj are encoded by a combination of heads \nrather than a single head, but this work is limited \nto qualitative analysis. Zhao and Bethard (2020) \nlooked specifically for the heads encoding negation \nscope.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "layers are more transferable (Liu et al., 2019a). In \nfine-tuning, it explains why the final layers change \nthe most (Kovaleva et al., 2019), and why restoring \nthe weights of lower layers of fine-tuned BERT to \ntheir original values does not dramatically hurt the \nmodel performance (Hao et al., 2019). \n\nsistently better, but the gains varied by setting. \n\nAll in all, changes in the number of heads \nand layers appear to perform different func- \ntions. The issue of model depth must be related to \nthe information flow from the most task-specific \nlayers closer to the classifier (Liu et al., 2019a), \nto the initial layers which appear to be the most \ntask-invariant (Hao et al., 2019), and where the \ntokens resemble the input tokens the most (Brun- \nner et al., 2020) (see subsection 4.3). If that is the \ncase, a deeper model has more capacity to encode \ninformation that is not task-specific. \n\nTenney et al. (2019a) suggest that while syntactic \ninformation appears early in the model and can be \nlocalized, semantics is spread across the entire \nmodel, which explains why certain non-trivial ex- \namples get solved incorrectly at first but correctly \nat the later layers. This is rather to be expected: \nsemantics permeates all language, and linguists de- \nbate whether meaningless structures can exist at \nall (Goldberg, 2006, p.166-182). But this raises \nthe question of what stacking more Transformer \nlayers in BERT actually achieves in terms of the \nspread of semantic knowledge, and whether that \nis beneficial. Tenney et al. compared BERT-base \nand BERT-large, and found that the overall pattern \nof cumulative score gains is the same, only more \nspread out in the larger model. \n\nOn the other head, many self-attention heads \nin vanilla BERT seem to naturally learn the same \npatterns (Kovaleva et al., 2019). This explains \nwhy pruning them does not have too much impact. \nThe question that arises from this is how far we \ncould get with intentionally encouraging diverse \nself-attention patterns: \ntheoretically, this would \nmean increasing the amount of information in the \nmodel with the same number of weights. Raganato \net al. (2020) show for Transformer-based machine \ntranslation we can simply pre-set the patterns that \nwe already know the model would learn, instead of \nlearning them from scratch. \n\nNote that Tenney et al. (2019a)’s experiments \nconcern sentence-level semantic relations; Cui et al. \n(2020) report that the encoding of ConceptNet se- \nmantic relations is the worst in the early layers and \nincreases towards the top. Jawahar et al. (2019) \nplace \"surface features in lower layers, syntactic \nfeatures in middle layers and semantic features in \nhigher layers\", but their conclusion is surprising, \ngiven that only one semantic task in this study actu- \nally topped at the last layer, and three others peaked \naround the middle and then considerably degraded \nby the final layers. \n\nVanilla BERT is symmetric and balanced in \nterms of self-attention and feed-forward layers, but \nit may not have to be. For the base Transformer, \nPress et al. (2020) report benefits from more self- \nattention sublayers at the bottom and more feedfor- \nward sublayers at the top. \n\n5.2 Improvements to the training regime \n\nLiu et al. (2019b) demonstrate the benefits of \nlarge-batch training: with 8k examples both the \nlanguage model perplexity and downstream task \nperformance are improved. They also publish their \nrecommendations for other parameters. You et al. \n(2019) report that with a batch size of 32k BERT’s \ntraining time can be significantly reduced with no \ndegradation in performance. Zhou et al. (2019) ob- \nserve that the normalization of the trained [CLS] \ntoken stabilizes the training and slightly improves \nperformance on text classification tasks. \n\n5 Training BERT \n\nThis section reviews the proposals to optimize the \ntraining and architecture of the original BERT.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "be successfully approximated with adapter mod- \nules. They achieve competitive performance on \n26 classification tasks at a fraction of the computa- \ntional cost. Adapters in BERT were also used for \nmulti-task learning (Stickland and Murray, 2019) \nand cross-lingual transfer (Artetxe et al., 2019). An \nalternative to fine-tuning is extracting features from \nfrozen representations, but fine-tuning works better \nfor BERT (Peters et al., 2019b). \n\nDepending on the task, some BERT heads/layers \nare not only redundant (Kao et al., 2020), but also \nharmful to the downstream task performance. Pos- \nitive effect from head disabling was reported for \nmachine translation (Michel et al., 2019), abstrac- \ntive summarization (Baan et al., 2019), and GLUE \ntasks (Kovaleva et al., 2019). Additionally, Ten- \nney et al. (2019a) examine the cumulative gains of \ntheir structural probing classifier, observing that in \n5 out of 8 probing tasks some layers cause a drop \nin scores (typically in the final layers). Gordon \net al. (2020) find that 30–40% of the weights can \nbe pruned without impact on downstream tasks. \n\nA big methodological challenge in the current \nNLP is that the reported performance improve- \nments of new models may well be within varia- \ntion induced by environment factors (Crane, 2018). \nBERT is not an exception. Dodge et al. (2020) \nreport significant variation for BERT fine-tuned \non GLUE tasks due to both weight initialization \nand training data order. They also propose early \nstopping on the less-promising seeds. \n\nIn general, larger BERT models perform better \n(Liu et al., 2019a; Roberts et al., 2020), but not \nalways: BERT-base outperformed BERT-large on \nsubject-verb agreement (Goldberg, 2019) and sen- \ntence subject detection (Lin et al., 2019). Given \nthe complexity of language, and amounts of pre- \ntraining data, it is not clear why BERT ends up with \nredundant heads and layers. Clark et al. (2019) sug- \ngest that one possible reason is the use of attention \ndropouts, which causes some attention weights to \nbe zeroed-out during training. \n\nAlthough we hope that the above observations \nmay be useful for the practitioners, this section \ndoes not exhaust the current research on fine-tuning \nand its alternatives. For example, we do not cover \nsuch topics as Siamese architectures, policy gradi- \nent training, automated curriculum learning, and \nothers. \n\nGiven the above evidence of overparameteriza- \ntion, it does not come as a surprise that BERT \ncan be efficiently compressed with minimal ac- \ncuracy loss, which would be highly desirable for \nreal-world applications. Such efforts to date are \nsummarized in Table 1. The main approaches are \nknowledge distillation, quantization, and pruning. \nThe studies in the knowledge distillation \nframework (Hinton et al., 2014) use a smaller \nstudent-network trained to mimic the behavior of \na larger teacher-network. For BERT, this has been \nachieved through experiments with loss functions \n(Sanh et al., 2019b; Jiao et al., 2019), mimicking \nthe activation patterns of individual portions of the \nteacher network (Sun et al., 2019a), and knowledge \ntransfer at the pre-training (Turc et al., 2019; Jiao \net al., 2019; Sun et al., 2020) or fine-tuning stage \n(Jiao et al., 2019). McCarley et al. (2020) suggest \nthat distillation has so far worked better for GLUE \nthan for reading comprehension, and report good \nresults for QA from a combination of structured \npruning and task-specific distillation. \n\n6.1 Overparameterization \n\nTransformer-based models keep growing by or- \nders of magnitude: the 110M parameters of base \nBERT are now dwarfed by 17B parameters of \nTuring-NLG (Microsoft, 2020), which is dwarfed \nby 175B of GPT-3 (Brown et al., 2020). This trend \nraises concerns about computational complexity \nof self-attention (Wu et al., 2019a), environmental \nissues (Strubell et al., 2019; Schwartz et al., 2019), \nfair comparison of architectures (Aßenmacher and \nHeumann, 2020), and reproducibility.", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Benchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion \n\nIn a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Sofia Serrano and Noah A. Smith. 2019. Is Atten- \ntion Interpretable? arXiv:1906.03731 [cs]. \n\nYu Sun, Shuohuan Wang, Yukun Li, Shikun \nFeng, Hao Tian, Hua Wu, and Haifeng Wang. \n2019c. \nERNIE 2.0: A Continual Pre- \nTraining Framework for Language Understand- \ning. arXiv:1907.12412 [cs]. \n\nSheng Shen, Zhen Dong, Jiayu Ye, Linjian Ma, \nZhewei Yao, Amir Gholami, Michael W Ma- \nhoney, and Kurt Keutzer. 2019. Q-BERT: Hes- \nsian Based Ultra Low Precision Quantization of \nBERT. arXiv preprint arXiv:1909.05840. \n\nZhiqing Sun, Hongkun Yu, Xiaodan Song, Ren- \njie Liu, Yiming Yang, and Denny Zhou. 2020. \nMobileBERT: Task-Agnostic Compression of \nBERT for Resource Limited Devices. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019a. What does BERT learn \nfrom multiple-choice reading comprehension \ndatasets? arXiv preprint arXiv:1910.12391. \n\nChenglei Si, Shuohang Wang, Min-Yen Kan, and \nJing Jiang. 2019b. What does BERT Learn \nfrom Multiple-Choice Reading Comprehension \nDatasets? arXiv:1910.12391 [cs]. \n\nKaitao Song, Xu Tan, Tao Qin, Jianfeng Lu, and \nTie-Yan Liu. 2020. MPNet: Masked and Per- \nmuted Pre-training for Language Understanding. \narXiv:2004.09297 [cs]. \n\nAsa Cooper Stickland and Iain Murray. 2019. \nBERT and PALs: Projected Attention Layers for \nEfficient Adaptation in Multi-Task Learning. In \nInternational Conference on Machine Learning, \npages 5986–5995. \n\nEmma Strubell, Ananya Ganesh, and Andrew Mc- \nCallum. 2019. Energy and Policy Considera- \ntions for Deep Learning in NLP. In ACL 2019. \n\n\n \n \n \n \n [html]\n
TableInfused Tansformer and BEK1 Tiodeis IOITablechine Translation and Natural Language U standing, arXiv : 1911.06156 [ cs, stat ].TableTableTableTailmor, Yanai Elazar, Yoav Gold and Jonathan Berant. 2019. oLMpics - what Language Model Pre - Training Capt arXiv : 1912.13283 [ cs ].TableTanaka, Hiroyaki Shimos, Rui Cao, Bai, and Wen Ma, 2020. Document Class tion by Word Embeddings of HERT, In Cstational Linguistics, Communications in Oputer and Information Science, pages 145 - Singapore. Springer.TableLili Olga Vechtomova, and Jimmy Lin. 2019. tilling Task - Specific Knowledge from Binto Simple Neural Networks. arXiv pny, pny, and Networks. arXiv pny, pny,
\n\nSaku Sugawara, Pontus Stenetorp, Kentaro Inui, \nand Akiko Aizawa. 2020. Assessing the Bench- \nmarking Capacity of Machine Reading Compre- \nhension Datasets. In AAAI. \n\nTa-Chun Su and Hsiang-Chih Cheng. 2019. \nfor Anywhere. \n\nSesameBERT: Attention \narXiv:1910.03176 [cs]. \n\nIan Tenney, Dipanjan Das, and Ellie Pavlick. 2019a. \nBERT Rediscovers the Classical NLP Pipeline. \nIn Proceedings of the 57th Annual Meeting of \nthe Association for Computational Linguistics, \npages 4593–4601. \n\nSiqi Sun, Yu Cheng, Zhe Gan, and Jingjing Liu. \n2019a. Patient Knowledge Distillation for BERT \nModel Compression. In Proceedings of the 2019 \nConference on Empirical Methods in Natural \nLanguage Processing and the 9th International \nJoint Conference on Natural Language Process- \ning (EMNLP-IJCNLP), pages 4314–4323. \n\nIan Tenney, Patrick Xia, Berlin Chen, Alex Wang, \nAdam Poliak, R. Thomas McCoy, Najoung Kim, \nBenjamin Van Durme, Samuel R. Bowman, Di- \npanjan Das, and Ellie Pavlick. 2019b. What do \nyou learn from context? Probing for sentence \nstructure in contextualized word representations. \nIn International Conference on Learning Repre- \nsentations.", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Stochastic Parrots \n\nmBERT across 29 tasks. Either way, these models do not address \nthe inclusion problems raised by [65], who note that over 90% of \nthe world’s languages used by more than a billion people currently \nhave little to no support in terms of language technology. \n\nAlongside work investigating what information the models re- \ntain from the data, we see a trend in reducing the size of these \nmodels using various techniques such as knowledge distillation \n[26, 58], quantization [118, 153], factorized embedding parame- \nterization and cross-layer parameter sharing [70], and progressive \nmodule replacing [146]. Rogers et al. [110] provide a comprehensive \ncomparison of models derived from BERT using these techniques, \nsuch as DistilBERT [113] and ALBERT [70]. While these models \nmaintain and sometimes exceed the performance of the original \nBERT model, despite their much smaller size, they ultimately still \nrely on large quantities of data and significant processing and stor- \nage capabilities to both hold and reduce the model. \n\nWe note that the change from n-gram LMs to word vectors dis- \ntilled from neural LMs to pretrained Transformer LMs is paralleled \nby an expansion and change in the types of tasks they are use- \nful for: n-gram LMs were initially typically deployed in selecting \namong the outputs of e.g. acoustical or translation models; the \nLSTM-derived word vectors were quickly picked up as more effec- \ntive representations of words (in place of bag of words features) \nin a variety of NLP tasks involving labeling and classification; and \nthe pretrained Transformer models can be retrained on very small \ndatasets (few-shot, one-shot or even zero-shot learning) to perform \napparently meaning-manipulating tasks such as summarization, \nquestion answering and the like. Nonetheless, all of these systems \nshare the property of being LMs in the sense we give above, that \nis, systems trained to predict sequences of words (or characters or \nsentences). Where they differ is in the size of the training datasets \nthey leverage and the spheres of influence they can possibly affect. \nBy scaling up in these two ways, modern very large LMs incur new \nkinds of risk, which we turn to in the following sections.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "5 Training BERT \n\nThis section reviews the proposals to optimize the \ntraining and architecture of the original BERT. \n\nTo date, the most systematic study of BERT archi- \ntecture was performed by Wang et al. (2019b), who \nexperimented with the number of layers, heads, and \nmodel parameters, varying one option and freez- \ning the others. They concluded that the number \nof heads was not as significant as the number \nof layers. That is consistent with the findings \nof Voita et al. (2019b) and Michel et al. (2019) \n(section 6), and also the observation by Liu et al. \n(2019a) that the middle layers were the most trans- \nferable. Larger hidden representation size was con- \n\nGong et al. (2019) note that, since self-attention \npatterns in higher and lower layers are similar, the \nmodel training can be done in a recursive man- \nner, where the shallower version is trained first and \nthen the trained parameters are copied to deeper \nlayers. Such a \"warm-start\" can lead to a 25% faster \ntraining without sacrificing performance.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. \n\nBut this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. \n\nSince BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. \n\n4 Localizing linguistic knowledge \n\n4.1 BERT embeddings", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "How many affiliate banks has First Financial Bankshares ?", + "target_page": 4, + "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT AUDITORS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheet of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2002, and the related consolidated statements of earnings, \ncomprehensive earnings, shareholders’ equity, and cash flows for the year then ended. These financial statements \nare the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial \nstatements based on our audit. The consolidated financial statements of First Financial Bankshares, Inc. and \nsubsidiaries as of December 31, 2001 and for each of the two years then ended, were audited by other auditors who \nhave ceased operations and whose report dated January 11, 2002, expressed an unqualified opinion on those \nstatements. \n\nWe conducted our audit in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audit provides a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries at December 31, 2002, and the consolidated results of their \noperations and their cash flows for the year then ended in conformity with accounting principles generally accepted \nin the United States. \n\nAs discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the \ntwo years then ended were audited by other auditors who have ceased operations. As described in Note 1, these \nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial \nAccounting Standards No. 142,*Goodwill and Other Intangible Assets*, which was adopted by the Company as of \nJanuary 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000 \nincluded (a) agreeing the previously reported net income to the previously issued financial statements and the \nadjustments to reported net income representing amortization expense including related tax effects recognized in \nthose periods related to goodwill to the Company’s underlying records obtained from management, and (b) testing \nthe mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related \nearnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were \nnot engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company \nother than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of \nassurance on the 2001 and 2000 financial statements taken as a whole.", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. \n\nUse of Estimates in Preparation of Financial Statements \n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United \nStates of America requires management to make estimates and assumptions that affect the reported amounts of \nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and \nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those \nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the \ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets, \nand the fair value of financial instruments. \n\nConsolidation \n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of \nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated. \n\nInvestment Securities \n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its \nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held- \nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are \nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity \nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses, \nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity. \nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in \nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000. \n\nLoans and Allowance for Loan Losses", + "page_start": 72, + "page_end": 72, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS \nNo. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill \nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years \nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows: \n\n 2001 2000 \n\nReported net earnings \nAdd back: goodwill amortization \n$ 29,354,505 $ 28,316,047 \n\nGoodwill amortization, before income tax \nIncome tax benefit \nAdjusted net earnings 1,641,367 \n1,641,367 \n (420,000) \n (420,000) \n $ 30,575,872 $ 29,537,414 \n\nBasic earnings per share: \nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.38 \n .10 \n $ 2.48 $ 2.28 \n .10 \n$ 2.38 Adjusted net earnings \n\nEarnings per share, assuming dilution: \n\nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.37 \n .10 \n $ 2.47 $ 2.27 \n .10 \n $ 2.37 Adjusted net earnings \n\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to \n$13,000,000, is deductible for federal income tax purposes. \n\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the \nacquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing \na method that approximates the expected attrition of the deposits. \n\nSecurities Sold Under Agreements To Repurchase \n\nSecurities sold under agreements to repurchase, which are classified as secured borrowings, generally mature within \none to four days from the transaction date. Securities sold under agreements to repurchase are reflected at the \namount of the cash received in connection with the transaction. The Company may be required to provide additional \ncollateral based on the estimated fair value of the underlying securities. \n\nSegment Reporting \n\nThe Company has determined that it operates one line of business (community banking) located in a single \ngeographic area (Texas). \n\nStatements of Cash Flows \n\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and \nfederal funds sold. \n\nAccounting for Income Taxes \n\nThe Company’s provision for income taxes is based on income before income taxes adjusted for permanent \ndifferences between financial reporting and taxable income. Deferred tax assets and liabilities are determined using \nthe liability (or balance sheet) method. Under this method, the net deferred tax asset or liability is determined based \non the tax effects of the temporary differences between the book and tax bases of the various balance sheet assets \nand liabilities and gives current recognition to changes in tax rates and laws.", + "page_start": 74, + "page_end": 74, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n4. BANK PREMISES AND EQUIPMENT: \n\nThe following is a summary of bank premises and equipment: \n\n Useful Life \n December 31, \n 2001 \n 2002 \n\nLand \nBuildings \nFurniture and equipment \nLeasehold improvements – \n20 to 40 years \n3 to 10 years \nLesser of lease term or 5 to 15 years $ 7,362,814 \n50,560,723 \n26,347,819 \n 4,385,288 $ 7,104,759 \n49,885,954 \n27,249,965 \n 4,105,350 \n\n88,656,644 88,346,028 \n\nLess- accumulated depreciation and amortization (48,051,243) (46,333,597) \n\n$40,605,401 $42,012,431 \n\nDepreciation expense for the years ended December 31, 2002, 2001 and 2000 amounted to $4,284,473, $3,755,878, \nand $3,700,474, respectively and is included in the captions net occupancy expense and equipment expense in the \naccompanying consolidated statements of earnings. \n\nThe Company is lessor for portions of its banking premises. Total rental income for all leases included in net \noccupancy expense is approximately $1,578,000, $1,432,000 and $1,387,000, for the years ended December 31, \n2002, 2001, and 2000, respectively. \n\n5. TIME DEPOSITS \n\nTime deposits of $100,000 or more totaled approximately $195,754,000 and $196,905,000 at December 31, 2002 \nand 2001, respectively. Interest expense on these deposits was approximately $11,559,000, $10,163,000, and \n$10,022,000 during 2002, 2001, and 2000, respectively. \n\nAt December 31, 2002, the scheduled maturities of time deposits were, as follows: \n\nYear ending December 31, \n\n2003 \n2004 \n2005 \n2006 \n2007 $466,285,411 \n42,007,875 \n12,232,334 \n2,222,764 \n 10,878,020 \n\n$533,626,404 \n\n6. LINE OF CREDIT \n\nThe Company has a line of credit with a nonaffiliated bank under which it could borrow up to $25,000,000. The \nline of credit is unsecured and matures on June 30, 2003. Bankshares paid no fee to secure the unused line of credit \nand, accordingly, did not estimate a fair value of the unused line of credit at December 31, 2002 and 2001. The line \nof credit carries an interest rate of the London Interbank Offering Rate plus 1.0%. There was no outstanding balance \nunder the line of credit as of December 31, 2002 and 2001.", + "page_start": 80, + "page_end": 80, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT PUBLIC ACCOUNTANTS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheets of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2001 and 2000, and the related consolidated statements of \nearnings, comprehensive earnings, shareholders’ equity, and cash flows for each of the three years in the period \nended December 31, 2001. These financial statements are the responsibility of the Company’s management. Our \nresponsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries as of December 31, 2001 and 2000, and the results of their \noperations and their cash flows for each of the three years in the period ended December 31, 2001, in conformity \nwith accounting principles generally accepted in the United States. \n\nNOTE: THIS IS A COPY OF A REPORT PREVIOUSLY ISSUED BY ARTHUR \n\nANDERSEN LLP WHICH CEASED OPERATIONS. THIS REPORT \n\nADDRESSES CERTAIN FINANCIAL STATEMENTS FOR PERIODS \n\nTHAT ARE NOT OTHERWISE REQUIRED TO BE INCLUDED IN THIS \n\nFORM 10-K.", + "page_start": 65, + "page_end": 65, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. \n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would \nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related \nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are \naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are \naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including \ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to \ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws \nwhich we describe in greater detail below. \n\n**Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. \nOur management believes that our employee relations have been and will continue to be good. \n\n**Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and \nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the \ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also \nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding \ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory \nprovisions. A change in any of these laws or regulations may have a material effect on our business and the \nbusiness of our subsidiary banks. \n\n*Bank Holding Companies and Financial Holding Companies*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "As discussed in Note 10, the Company has provided a guaranty for up to 50% of \nthe interest and principal payment obligations on the construction financing of the \nfirst tower as well as a completion guaranty. \n\nThe Company recorded its share of the results of operations of the unconsolidated \naffiliates as follows: \n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Income from unconsolidated affiliates..................$ 119.658$ 53.612$ 32.361
Preopening and start - up expenses.................( 19.326 )( 7.757 )
Non - operating items from unconsolidated affiliates...( 12.298 )( 10.401 )( 1.335 )
\n\n\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Payroll and related.......................................................................................................................................................................................$162.943
$ 163.842Casino outstanding chip liability...85.086
75.079Casino front money deposits67.621
45.642Other gaming related accruals50.186
46.313Advance deposits and ticket sales65.810
39.499Taxes, other than income taxes47.311
43.206Amounts due to City of Detroit...17.500
22.344Other111.468
123.520$
\n\n\n \n \n \n \n [html]\n
Currer$126.791$
81.193Property and other assets, net.....1.388.811
1.309.242Current liabilities103.892
81.526Long - term debt and other liabilities531.112
622.701Equity880.598
\n\n\n \n \n \n \n [html]\n
Current*126.791$
81.19Property1.388.811
1.309.24Current103,81.52
Long - term531,622.70Equity
880,686.20
\n\nSummarized results of operations of the unconsolidated affiliates are as follows:", + "page_start": 64, + "page_end": 64, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Plans for the formation of a First Financial Bankshares \n\ntrust company are moving forward with regulatory approval \n\nanticipated in late Spring or early Summer. This will permit \n\nyour Company to provide quality, locally delivered trust \n\nservices to additional markets. \n\nWith skilled trust professionals offering a complete range \n\nof financial products and services, the future of our trust \n\ndepartments look bright. Through dedication to individu- \n\nalized portfolio design and personalized service, our trust \n\ndepartments stand ready to meet the needs of our pres- \n\nent and future clients. \n\n\nRobert S. Patterson \nSenior Vice President, Trust Services \n\nTRUST FEES in millions \n\n9 \n8 \n. \n5 \n$ 3 \n8 \n. \n5 \n$ \n$6 \n0 \n5 \n. \n5 \n$ \n0 \n1 \n. \n5 \n$ \n5 \n7 \n. \n4 \n$ $5 \n\nAssets managed by the Trust Departments at First National \n\nBank of Abilene, San Angelo National Bank, Stephenville \n\nBank & Trust Co. and First National Bank, Sweetwater, \n\nincreased $27.3 million during the past year to a \n\nDecember 31, 2002 book value of $986.2 million. However, \n\ndue to depressed stock market values and volumes, trust \n\ndepartment revenue declined in 2002. Trust combined \n\nrevenues for the year were down slightly from $5.89 mil- \n\nlion in 2001 to $5.83 million for 2002. In 2003, we anticipate \n\na return to improved income growth. \n\nThe performance of the stock market the past three years \n\nhas been a challenge that our trust investment profes- \n\nsionals have managed well. Not since 1939-1941 have \n\nwe seen the S&P 500 drop 35% in a three-year period. Our \n\nportfolio managers outperformed their indices in Large \n\nCap stocks by 83 basis points and Fixed Income securi- \n\nties by 168 basis points. This performance bodes well for \n\nthe present and future of our client accounts. \n\nDuring 2002, we saw a successful conversion of \n\nStephenville Bank & Trust to the SEI Corporation account- \n\ning system. In March 2003, we will be converting First \n\nNational Bank, Sweetwater, to this system as well. This will \n\nTRUST ASSETS in millions \nprovide all First Financial Bankshares trust clients with the \n\nstrength and advantages of a uniform accounting system. \n6 \n8 \n9 \n$ \n9 \n5 \n9 \n$ \n$1000 \nOther operational systems have been examined and con- \n1 \n1 \n9 \n$ \n5 \n4 \n8 \n$ \nsistent practices and procedures have been implemented. \n$900 \n\n4 \n7 \n7 \n$ $800 \nTo further enhance our risk management assessments in \n$700 \n2003, we will be introducing an Operational Peer Review \n\n$600 \nTeam similar to the successful peer review teams used in \n\nthe Personal Trust areas of our four locations. $500", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Cleburne \n\nMain Office \n403 N. Main \nCleburne, Texas 76033 \n*Chartered 1927*\nBranches \n200 N. Ridgeway \nCleburne, Texas 76033 \n1900 S.W. Wilshire \nBurleson, Texas 76028 \n201 E. Highway 67 \nAlvarado, Texas 76009 \n\nHomer S. Pittman, Jr. \n*Senior Vice President and Cashier*\nCraig Beskow \n*Senior Vice President*\nDerek Schmidt \n*Senior Vice President*\n\nJim Easdon \n*Investments*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nHollis E. (Gene) Joslin \n*Investments*\nBrent D. Magers \n*Chief Executive Officer and Administrator,*\n*Walls Regional Hospital*\nGeorge Marti \n*Marti Enterprises*\n\nDirectors \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nAlbert A. Archer \n*Chairman of the Board, Walls Industries, Inc.*\nGary Bennett \n*Bennett Printing & Office Supply*\nRobert T. Childress \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\n\nSenior Officers \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nPerry Ginn \n*Executive Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 205.591$ 209.159
< underline > Loans 106.755108.607
< underline > Deposits 182.715189.597
Equity20.36418.040
< underline > Net Income 3.4513.120
< underline > Return on Average Assets 1.72 %1.62 %
Return on Average Equity17.6617.08
", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What was the net income of First Financial Bankshares in 1995 ?", + "target_page": 14, + "target_passage": " 16,355", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS \nNo. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill \nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years \nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows: \n\n 2001 2000 \n\nReported net earnings \nAdd back: goodwill amortization \n$ 29,354,505 $ 28,316,047 \n\nGoodwill amortization, before income tax \nIncome tax benefit \nAdjusted net earnings 1,641,367 \n1,641,367 \n (420,000) \n (420,000) \n $ 30,575,872 $ 29,537,414 \n\nBasic earnings per share: \nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.38 \n .10 \n $ 2.48 $ 2.28 \n .10 \n$ 2.38 Adjusted net earnings \n\nEarnings per share, assuming dilution: \n\nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.37 \n .10 \n $ 2.47 $ 2.27 \n .10 \n $ 2.37 Adjusted net earnings \n\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to \n$13,000,000, is deductible for federal income tax purposes. \n\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the \nacquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing \na method that approximates the expected attrition of the deposits. \n\nSecurities Sold Under Agreements To Repurchase \n\nSecurities sold under agreements to repurchase, which are classified as secured borrowings, generally mature within \none to four days from the transaction date. Securities sold under agreements to repurchase are reflected at the \namount of the cash received in connection with the transaction. The Company may be required to provide additional \ncollateral based on the estimated fair value of the underlying securities. \n\nSegment Reporting \n\nThe Company has determined that it operates one line of business (community banking) located in a single \ngeographic area (Texas). \n\nStatements of Cash Flows \n\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and \nfederal funds sold. \n\nAccounting for Income Taxes \n\nThe Company’s provision for income taxes is based on income before income taxes adjusted for permanent \ndifferences between financial reporting and taxable income. Deferred tax assets and liabilities are determined using \nthe liability (or balance sheet) method. Under this method, the net deferred tax asset or liability is determined based \non the tax effects of the temporary differences between the book and tax bases of the various balance sheet assets \nand liabilities and gives current recognition to changes in tax rates and laws.", + "page_start": 74, + "page_end": 74, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT AUDITORS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheet of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2002, and the related consolidated statements of earnings, \ncomprehensive earnings, shareholders’ equity, and cash flows for the year then ended. These financial statements \nare the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial \nstatements based on our audit. The consolidated financial statements of First Financial Bankshares, Inc. and \nsubsidiaries as of December 31, 2001 and for each of the two years then ended, were audited by other auditors who \nhave ceased operations and whose report dated January 11, 2002, expressed an unqualified opinion on those \nstatements. \n\nWe conducted our audit in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audit provides a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries at December 31, 2002, and the consolidated results of their \noperations and their cash flows for the year then ended in conformity with accounting principles generally accepted \nin the United States. \n\nAs discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the \ntwo years then ended were audited by other auditors who have ceased operations. As described in Note 1, these \nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial \nAccounting Standards No. 142,*Goodwill and Other Intangible Assets*, which was adopted by the Company as of \nJanuary 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000 \nincluded (a) agreeing the previously reported net income to the previously issued financial statements and the \nadjustments to reported net income representing amortization expense including related tax effects recognized in \nthose periods related to goodwill to the Company’s underlying records obtained from management, and (b) testing \nthe mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related \nearnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were \nnot engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company \nother than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of \nassurance on the 2001 and 2000 financial statements taken as a whole.", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Share Data :Net earnings per share, basic$0.61$0.61$0.59$0.57Net earnings per share, assuming dilution0.610.610.590.56Cash dividends declared0.300.300.300.264Book value at period - end17.3217.3116.7716.40Common stock sales price : ( 1 )High$31.88$32.91$31.44$27.15Low27.2027.0025.0023.40Close30.1029.0331.0026.60", + "page_start": 56, + "page_end": 56, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT PUBLIC ACCOUNTANTS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheets of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2001 and 2000, and the related consolidated statements of \nearnings, comprehensive earnings, shareholders’ equity, and cash flows for each of the three years in the period \nended December 31, 2001. These financial statements are the responsibility of the Company’s management. Our \nresponsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries as of December 31, 2001 and 2000, and the results of their \noperations and their cash flows for each of the three years in the period ended December 31, 2001, in conformity \nwith accounting principles generally accepted in the United States. \n\nNOTE: THIS IS A COPY OF A REPORT PREVIOUSLY ISSUED BY ARTHUR \n\nANDERSEN LLP WHICH CEASED OPERATIONS. THIS REPORT \n\nADDRESSES CERTAIN FINANCIAL STATEMENTS FOR PERIODS \n\nTHAT ARE NOT OTHERWISE REQUIRED TO BE INCLUDED IN THIS \n\nFORM 10-K.", + "page_start": 65, + "page_end": 65, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n4. BANK PREMISES AND EQUIPMENT: \n\nThe following is a summary of bank premises and equipment: \n\n Useful Life \n December 31, \n 2001 \n 2002 \n\nLand \nBuildings \nFurniture and equipment \nLeasehold improvements – \n20 to 40 years \n3 to 10 years \nLesser of lease term or 5 to 15 years $ 7,362,814 \n50,560,723 \n26,347,819 \n 4,385,288 $ 7,104,759 \n49,885,954 \n27,249,965 \n 4,105,350 \n\n88,656,644 88,346,028 \n\nLess- accumulated depreciation and amortization (48,051,243) (46,333,597) \n\n$40,605,401 $42,012,431 \n\nDepreciation expense for the years ended December 31, 2002, 2001 and 2000 amounted to $4,284,473, $3,755,878, \nand $3,700,474, respectively and is included in the captions net occupancy expense and equipment expense in the \naccompanying consolidated statements of earnings. \n\nThe Company is lessor for portions of its banking premises. Total rental income for all leases included in net \noccupancy expense is approximately $1,578,000, $1,432,000 and $1,387,000, for the years ended December 31, \n2002, 2001, and 2000, respectively. \n\n5. TIME DEPOSITS \n\nTime deposits of $100,000 or more totaled approximately $195,754,000 and $196,905,000 at December 31, 2002 \nand 2001, respectively. Interest expense on these deposits was approximately $11,559,000, $10,163,000, and \n$10,022,000 during 2002, 2001, and 2000, respectively. \n\nAt December 31, 2002, the scheduled maturities of time deposits were, as follows: \n\nYear ending December 31, \n\n2003 \n2004 \n2005 \n2006 \n2007 $466,285,411 \n42,007,875 \n12,232,334 \n2,222,764 \n 10,878,020 \n\n$533,626,404 \n\n6. LINE OF CREDIT \n\nThe Company has a line of credit with a nonaffiliated bank under which it could borrow up to $25,000,000. The \nline of credit is unsecured and matures on June 30, 2003. Bankshares paid no fee to secure the unused line of credit \nand, accordingly, did not estimate a fair value of the unused line of credit at December 31, 2002 and 2001. The line \nof credit carries an interest rate of the London Interbank Offering Rate plus 1.0%. There was no outstanding balance \nunder the line of credit as of December 31, 2002 and 2001.", + "page_start": 80, + "page_end": 80, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "18. AMOUNTS PER SHARE \n\n2004 \n*Mar. 31, 2005* *For the years ended*\n\nNet income: \n\nBasic ...................................................................................................................................................................................... ¥125.16 \nDiluted .................................................................................................................................................................................. 124.01 \n24.00 \n¥122.02 \n120.74 \n19.00 ¥117.75 \n116.88 \n14.00 Cash dividends applicable to the year................................................................................................................. \n\n*Yen*\n\n*U.S. dollars*\n2004 \n*Mar. 31, 2005* 2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* *As of*\n\nNet assets .................................................................................................................................................................................................................. ¥604.49 \n$5.649 \n¥493.85 \n\nBasic net income per share was computed based on the net income available for distribution to shareholders of common stock and the weighted \naverage number of shares of common stock outstanding during the year, and diluted net income per share was computed based on the net \nincome available for distribution to the shareholders and the weighted average number of shares of common stock outstanding during each year \nafter giving effect to the dilutive potential of shares of common stock to be issued upon the exercise of warrants and stock subscription rights. \nAmounts per share of net assets are computed based on net assets available for distribution to the shareholders and the number of shares of \ncommon stock outstanding at the year end. \nCash dividends per share represent the cash dividends proposed by the Board of Directors as applicable to the respective years together with \nthe interim cash dividends paid. \n\n\n \n \n \n \n [html]Marketable held - to - maturity debt securitiesMillions of yen\n
Fiscal year 2004 ( As of Mw. 31.2005 )Carrying valueEstimated fair value
Unrealized gain ( loss )Securities whose carrying value exceeds their fair value : Corporate bonds — exercise¥ 201¥ 201
¥ 0T ( Off )]-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------¥ 201¥ 201
¥ 0Fiscal year 2003 ( As of Mw. 31.2004 )Carrying valueEstimated fair value
Unrealized gain ( loss )Securities whose carrying value exceeds their fair value : Corporate bonds........................................................................................................................................¥ 249¥ 249
¥ 0T ( Off )]-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------¥ 249¥ 249
", + "page_start": 88, + "page_end": 88, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n17. BUSINESS COMBINATION: \n\nIn July 2001, the Company purchased all of the outstanding stock of City Bancshares, Inc. (“City”) and its \nsubsidiary, City National Bank for $16,500,000 in cash. The total purchase price exceeded the estimated fair market \nvalue of net assets acquired by approximately $7,800,000, of which approximately $950,000 was assigned to an \nidentifiable intangible asset with the balance recorded by the Company as goodwill. The identifiable intangible \nasset represents the future benefit associated with the acquisition of the core deposits of City and is being amortized \nover seven years utilizing a method that approximates the expected attrition of the deposits. \n\nThe primary purpose of the acquisition was to expand the Company’s market share in areas with close proximity to \nDallas/Ft. Worth, Texas. Factors that contributed to a purchase price resulting in goodwill include City’s \nhistorically stable record of earnings, capable management and its geographic location, which complements the \nCompany’s existing service locations. Subsequent to the acquisition, the Company liquidated the stock of City and \nCity National Bank is operating as a subsidiary of the Company. The results of operations of City National Bank are \nincluded in the consolidated earnings of the Company commencing July 1, 2001. \n\n\n \n \n \n \n [html]LIABILITIES AND SHAREHOLDER ’ S EQUITY\n
Cash and cash equivalents$ 9.651.769
Investment securities29.717.834
Loans, net51.061.735
Goodwill6.891.959
Identifiable intangible asset946.073
Other assets___1.465.727
Total assets$ _99.735.097
Noninterest - bearing deposits$ 11.949.766
Interest - bearing deposits70.575.256
Other liabilities710.075
Shareholders ' equity16.500.000
Total liabilities and shareholder ’ s equity$ _99.735.097
\n\nGoodwill recorded in the acquisition of City has been accounted for in accordance with SFAS No. 142. \nAccordingly, goodwill has not been amortized, rather it has been tested for impairment. The goodwill and \nidentifiable intangible asset recorded are not deductible for federal income tax purposes. The proforma impact of \nCity is insignificant to the Company's financial statements. \n\nCash flow information relative to the acquisition of City is, as follows: \n\nFair value of assets acquired \nCash paid for the capital stock of City $ 99,735,097 \n 16,500,000 \n\nLiabilities assumed $ 83,235,097", + "page_start": 92, + "page_end": 92, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. \n\nUse of Estimates in Preparation of Financial Statements \n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United \nStates of America requires management to make estimates and assumptions that affect the reported amounts of \nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and \nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those \nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the \ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets, \nand the fair value of financial instruments. \n\nConsolidation \n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of \nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated. \n\nInvestment Securities \n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its \nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held- \nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are \nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity \nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses, \nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity. \nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in \nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000. \n\nLoans and Allowance for Loan Losses", + "page_start": 72, + "page_end": 72, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n18. CASH FLOW INFORMATION: \n\nSupplemental information on cash flows and noncash transactions is as follows: \n\n Year Ended December 31, \n 2000 \n 2001 \n 2002 \n\nSupplemental cash flow information: \n\nInterest paid \nFederal income taxes paid $25,704,950 \n14,682,343 $46,243,602 \n13,227,101 $48,123,200 \n13,227,192 \n\nSchedule of noncash investing and financing activities: \n\nAssets acquired through foreclosure \nRetirement of treasury stock 553,840 \n- 628,797 \n4,240,119 285,195 \n-", + "page_start": 93, + "page_end": 93, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What is the address of the San Angelo National Bank main office ?", + "target_page": 21, + "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "San Angelo National Bank \n\nMain Office \n301 W. Beauregard \nSan Angelo, Texas 76903 \n*Chartered 1997*\nBranch \n3471 Knickerbocker \nSan Angelo, Texas 76904 \n\nDirectors \nDal DeWees \n*Chairman of the Board*\nGeorge Alexander \n*Partner, Alexander Construction Company*\nMichael L. Boyd \n*President and Chief Executive Officer*\nW. Dan Cravy, M.D. \n*Physician*\nDavid B. Drake \n*Investment Advisor*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDoug Eakman \n*Owner, Pecos Street Pharmacy*\nJoe Henderson \n*President, Porter Henderson Implement*\n*Company, Inc.*\n\nSenior Officers \nMichael L. Boyd \n*President and Chief Executive Officer*\nDavid Byrd \n*Executive Vice President and Trust Officer*\nRobert Pate \n*Executive Vice President*\nKatherine Reeves \n*Executive Vice President and Cashier*\n\nRobert D. Housley \n*President and Owner,*\n*Housley Communications*\nJim Johnson \n*Shannon, Porter, Johnson, Pfluger,*\n*Davis & Joynton, LLP*\nDavid F. Lupton \n*President, Angelo Glass & Mirror*\n*Company, Inc.*\nKenneth T. Murphy \n*First Financial Bankshares, Inc.*\nBill Pfluger \n*Rancher*\nRichard W. Salmon \n*Investments*\nJohn E. Schwartz, Sr. \n*Farmer/Rancher*\nF.L. (Steve) Stephens \n*Retired Chairman and Chief Executive Officer,*\n*Town & Country Food Stores, Inc.*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 303.124$ 299.808
< underline > Loans 115.450110.685
< underline > Deposits 251.931257.212
Equity30.63427.986
< underline > Net Income 4.9174.167
< underline > Trust Assets 144.047129.471
Return on Average Assets1.70 %1.46 %
< underline > Return on Average Equity 16.4815.13
", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. \n\n**First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables \nthem to improve or expand their banking services while continuing their local activity and identity. Each of our \nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with \nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service \ncharges. We provide resources and policy direction in, among other things, the following areas: \n\n• \n• \n• \n• \n\nasset and liability management; \n\naccounting, budgeting, planning and insurance; \n\ncapitalization; and \n\nregulatory compliance. \n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital \nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and \nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or \nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National \nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, \nadvertising, public relations, and computer services. \n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we \nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate \npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be \nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of \ncredit and future debt or equity offerings. \n\n**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Cleburne \n\nMain Office \n403 N. Main \nCleburne, Texas 76033 \n*Chartered 1927*\nBranches \n200 N. Ridgeway \nCleburne, Texas 76033 \n1900 S.W. Wilshire \nBurleson, Texas 76028 \n201 E. Highway 67 \nAlvarado, Texas 76009 \n\nHomer S. Pittman, Jr. \n*Senior Vice President and Cashier*\nCraig Beskow \n*Senior Vice President*\nDerek Schmidt \n*Senior Vice President*\n\nJim Easdon \n*Investments*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nHollis E. (Gene) Joslin \n*Investments*\nBrent D. Magers \n*Chief Executive Officer and Administrator,*\n*Walls Regional Hospital*\nGeorge Marti \n*Marti Enterprises*\n\nDirectors \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nAlbert A. Archer \n*Chairman of the Board, Walls Industries, Inc.*\nGary Bennett \n*Bennett Printing & Office Supply*\nRobert T. Childress \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\n\nSenior Officers \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nPerry Ginn \n*Executive Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 205.591$ 209.159
< underline > Loans 106.755108.607
< underline > Deposits 182.715189.597
Equity20.36418.040
< underline > Net Income 3.4513.120
< underline > Return on Average Assets 1.72 %1.62 %
Return on Average Equity17.6617.08
", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "City National Bank, Mineral Wells \n\nOffice \n1800 E. Hubbard \nMineral Wells, Texas 76068 \n*Chartered 1925*\n\nDirectors \nKen A. Williamson \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nTerry L. Murphy \n*President and Chief Executive Officer,*\n*Murphy and Murphy, Inc.*\nDon O’Neal \n*Don O’Neal Distributing Company, Inc.,*\n*O’Neal Enterprises, Inc.*\nDavid Ramsey, M.D. \n*Family Practice Center*\n\nBrad Seay \n*Executive Vice President*\nJimmy Seay \n*Investments and Ranching*\nWalter Joe Thomas, D.D.S. \n*Dentist*\n\nSenior Officers \nKen A. Williamson \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nBrad Seay \n*Executive Vice President, Lending*\nEddie Gregory \n*Vice President*\nKay Hudspeth \n*Cashier*\nMike Mearse \n*Vice President*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 93.969$ 91.252
< underline > Loans 51.22448.838
< underline > Deposits 84.04382.339
Equity9.5388.433
< underline > Net Income 1.659574
< underline > Return on Average Assets 1.79 %1.25 %
Return on Average Equity18.0213.22
", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First National Bank, Sweetwater \n\nMain Office \n201 Elm Street \nSweetwater, Texas 79556 \n*Chartered 1948*\nBranches \n123 N. Concho \nRoby, Texas 79543 \n117 N. Main \nTrent, Texas 79561 \n\nRodney Foster \n*Senior Vice President, Lending*\nJanis McDowell \n*Senior Vice President, Trust Officer*\nDonnie Ruppert \n*Senior Vice President and Controller*\n\nBill W. Burns \n*President, Bill Burns Oil Co., Inc.*\nRonnie Cox \n*Owner, Cox Jewelry*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nCecil J. King \n*Retired President, Citizens State Bank, Roby*\nThomas L. Rees, Sr. \n*Rees and Rees, Attorneys*\n\nDirectors \nJ.V. Martin \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nGlenn D. Bennett \n*Bennett & Associates*\nLouis Brooks, Jr. \n*Ranching, Brooks-Maberry, Inc.*\nSenior Officers \nJ.V. Martin \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nKirby Andrews \n*Senior Vice President, Lending*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 112.079$ 104.968
< underline > Loans 49.48746.666
< underline > Deposits 100.30690.100
Equity11.11410.204
< underline > Net Income 2.0781.605
Trust Assets64.85466.118
Return on Average Assets1.99 %1.53 %
< underline > Return on Average Equity 19.1515.82
", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Stephenville Bank & Trust Co. \n\nMain Office \n2201 W. South Loop \nStephenville, Texas 76401 \n*Chartered 1923*\nBranches \n1875 Lingleville Road \nStephenville, Texas 76401 \n199 N. Columbia \nStephenville, Texas 76401 \n\nTerry McCoy \n*Senior Vice President*\nRobert Reeves \n*Senior Vice President*\n\nBill Parham \n*Parham & Parham, CPAs*\nJerry Parham \n*Investments*\nJack Parks \n*Farmer*\nRonald E. Schneider \n*First Financial Bank, Cleburne*\nFrank Terrell, M.D. \n*Ophthalmologist*\nJohn Terrill \n*Attorney*\n\nDirectors \nJames C. Terrell, Jr., M.D. \n*Chairman of the Board*\nPerry D. Elliott \n*Vice Chairman*\nRon Butler \n*President and Chief Executive Officer*\nWilliam L. Corbin \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nCharles P. Gillespie, Jr. \n*Engineer*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nWilliam H. Oxford \n*Attorney*\n\nSenior Officers \nRon Butler \n*President and Chief Executive Officer*\nPerry D. Elliott \n*Vice Chairman*\nKen Luker \n*Executive Vice President*\nMonty Bedwell \n*Senior Vice President*\nDereece Howell \n*Senior Vice President and Cashier*\n\nAdvisory \nW.L. Nix \n*Investments*\n\n\n\n\n \n \n \n \n [html]\n
JIN THOUSANDSDecember 31.2002December 31.2001
Assets$ 138.260$ 130.186
< underline > Loans 75.45471.367
< underline > Deposits 125.226118.903
Equity12.75510.954
< underline > Net Income 2.3132.151
< underline > Trust Assets 36.57840.859
Return on Average Assets1.75 %1.79 %
< underline > Return on Average Equity 19.0619.88
", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Southlake \n\nMain Office \n3205 E. Highway 114 \nSouthlake, Texas 76092 \n*Chartered 1985*\nBranches \n95 Trophy Club Drive \nTrophy Club, Texas 76262 \n891 E. Keller Parkway \nSuite 100 \nKeller, Texas 76248 \n\nSenior Officers \nPerry D. Elliott \n*Chairman of the Board*\nMark L. Jones \n*President and Chief Executive Officer*\nF. Mills Shallene \n*Senior Vice President*\nJ. Sean Shope \n*Senior Vice President*\nMichele P. Stevens \n*Senior Vice President and Cashier*\n\nJack Dortch \n*Jack Dortch Insurance Agency*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDerrell Johnson \n*President, American Council of Engineering*\n*Companies Life Health Trust*\nMark L. Jones \n*President and Chief Executive Officer*\nK. Wayne Lee \n*President, DDFW Properties*\nRobert S. Mundlin \n*Owner, Lifetime Benefits Insurance*\nJim Ridenour \n*President, Sunbelt Station Service*\n\nDirectors \nPerry D. Elliott \n*Chairman of the Board*\nJames E. Burger \n*Burger Construction*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 67.750$ 65.554
Loans45.13242.366
< underline > Deposits 61.53259.672
Equity6.2955.845
Net Income412652
Return on Average Assets0.62 %1.07 %
Return on Average Equity6.7410.97
", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. \n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would \nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related \nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are \naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are \naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including \ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to \ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws \nwhich we describe in greater detail below. \n\n**Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. \nOur management believes that our employee relations have been and will continue to be good. \n\n**Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and \nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the \ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also \nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding \ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory \nprovisions. A change in any of these laws or regulations may have a material effect on our business and the \nbusiness of our subsidiary banks. \n\n*Bank Holding Companies and Financial Holding Companies*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Bynum Miers \n*Rancher*\nWilliam D. Minter \n*Vice President, CameraMouse*\nStanley Morris, Jr. \n*Investments*\nKenneth T. Murphy \n*First Financial Bankshares, Inc.*\nJames Parker \n*President, Parker Properties, Inc.*\nJack D. Ramsey, M.D. \n*Physician*\nDian Graves Stai \n*Investments*\nMichael C. Waters, F.A.C.H.E. \n*President, Hendrick Health System*\n\nFirst National Bank of Abilene \n\nMain Office \n400 Pine Street \nAbilene, Texas 79601 \n*Chartered 1890*\nBranches \n4400 Buffalo Gap Road \nAbilene, Texas 79606 \n4350 Southwest Drive \nAbilene, Texas 79606 \n920 N. Willis \nAbilene, Texas 79603 \n3300 S. 14th Street \nAbilene, Texas 79605 \n1010 N. Judge Ely Blvd. \nAbilene, Texas 79601 \n701 Pine Street \nAbilene, Texas 79601 \n1345 Barrow Street \nAbilene, Texas 79605 \n\nAdvisory \nBob J. Surovik \n*McMahon, Surovik, Suttle, Buhrmann,*\n*Hicks and Gill, P.C.*\nSteve Suttle \n*McMahon, Surovik, Suttle, Buhrmann,*\n*Hicks and Gill, P.C.*\n\nSenior Officers \nF. Scott Dueser \n*Chairman of the Board*\nChuck A. Cowell \n*President and Chief Executive Officer*\nRon Fogle \n*Executive Vice President, Commercial Loans*\nRobert S. Patterson \n*Executive Vice President and*\n*Senior Trust Officer*\nJohn Prince \n*Executive Vice President, Personal Loans*\n\nMario A. Luppino \n*Executive Vice President, Marketing and Retail*\nGary Tucker, CDP \n*Executive Vice President and*\n*Chief Information Officer*\nLeo Dennis \n*Executive Vice President, Chief Financial*\n*Officer and Cashier*\n\nDirectors \nChuck A. Cowell \n*President and Chief Executive Officer*\nJ. Michael Alexander \n*President, James M. Alexander & Co.*\nTucker S. Bridwell \n*President and Chief Executive Officer,*\n*Mansefeldt Investments, Inc.*\nJoseph E. Canon \n*Executive Director, Dodge Jones Foundation*\nDavid Copeland \n*President, Shelton Family Foundation*\nJoe Crawford \n*President, Abilene Aero, Inc.*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nCharles Ezzell \n*Investments*\nAllan D. Frizzell \n*Executive Vice President,*\n*Enrich Oil Corporation*\nRaymond A. McDaniel, Jr. \n*Investments*\n\n\n\n\n \n \n \n \n [html]\n
IN 1HOUSANUSDecember 31.2002Llecerriber 31.2001
Assets$ 705.468$ 670.959
Loans353.564344.341
< underline > Deposits 624.262598.310
Equity68.67063.276
< underline > Net Income 14.27713.051
Trust Assets740.745722.504
Return on Average Assets2.12 %1.98 %
< underline > Return on Average Equity 21.0520.19
", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Weatherford National Bank \n\nMain Office \n101 N. Main Street \nWeatherford, Texas 76086 \n*Chartered 1984*\nBranches \n101 College Park Drive \nWeatherford, Texas 76086 \n1214 N. Main Street \nWeatherford, Texas 76086 \n505 Farm Road 1187 \nAledo, Texas 76008 \n\nSenior Officers \nDoyle Lee \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nBob Bradberry \n*Executive Vice President*\nJay Gibbs \n*Executive Vice President*\nPaul Baker \n*Senior Vice President*\nJean Bryan \n*Senior Vice President*\nLarry Mangrem \n*Senior Vice President and Cashier*\nLouis Sneed \n*Senior Vice President*\n\nDirectors \nDoyle Lee \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nStephen G. Brogdon, D.D.S. \n*General and Cosmetic Dentistry*\nMac A. Coalson \n*Real Estate and Ranching*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nBob Kingsley \n*Host and Producer, American Country*\n*Countdown*\nDave Lang \n*President, Dralco, Inc.*\nKenneth T. Murphy \n*First Financial Bankshares, Inc.*\n\n\n\n\n \n \n \n \n [html]\n
IN THOUSANDSDecember 31.2002December 31.2001
Assets$ 211.235$ 201.768
Loans96.66091.096
< underline > Deposits 189.630182.696
Equity20.52618.595
Net Income3.8623.721
< underline > Return on Average Assets 1.97 %1.99 %
Return on Average Equity19.4320.83
", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What kind of scholarship programs are available to start a financial career?", + "target_page": 1, + "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. \n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "FINANCIAL SECTION", + "page_start": 69, + "page_end": 69, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Support for companies creating \nSupport for companies creating \ngrowth platforms in fields such \ngrowth platforms in fields such \nas medical and nursing care, \nas medical and nursing care, \nenvironmental and energy tech- \nenvironmental and energy tech \nnologies, and businesses in Asia \nnologies, and businesses in Asia \n\n**Financial education**\n**through teaching of**\n**investment skills**\n\nPromoting environmentally-aware \n\nmanagement and supporting business \n\nventures in China through the fund \n\nSMBC Friend Securities runs an online \nSMBC Friend Securities runs an online \n\neducation program, “You・You Toshi” \nYou Toshi” \neducation program, “You \ninexperi- \n(Self-composed Investment), for inexperi \n(Self-composed Investment), for \n\nenced investors. \nenced investors. \n\nThe service is free and includes a training \nThe service is free and includes a training \n\nprogram that can be used as a tool for \nprogram that can be used as a tool for \n\nlifelong study of investment skills. \nlifelong study of investment skills. \n\nbusinesses have been assigned to the head \nbusinesses have been assigned to the head \n\noffice. \noffice. \n\nTo strengthen these measures, it set up the \nTo strengthen these measures, it set up the \n\nKansai Genki Fund in September 2010, tapping \nKansai Genki Fund in September 2010, tapping \n\ns “Fund-supply measure to \nthe Bank of Japan’s “Fund-supply measure to \nthe Bank of Japan \n\nsupport strengthening the foundations for \nsupport strengthening the foundations for \n\neconomic growth” loan program. The bank \neconomic growth” loan program. The bank \n\nresponds proactively to funding demand \nresponds proactively to funding demand \n\nlocal companies wishing to expand \nfrom local companies wishing to expand \nfrom \n\n areas such as medical and nursing care, \nintointo areas such as medical and nursing care, \n\ntechnologies, and \nenvironment and energy technologies, and \nenvironment and energy \n\nAsia-related businesses, on a priority basis. \nAsia-related businesses, on a priority basis. \n\nAs of June 30, 2011, loans totaling ¥8.8 billion \nAs of June 30, 2011, loans totaling ¥8.8 billion \n\nhad been made from the Kansai Genki Fund \nhad been made from the Kansai Genki Fund \n\nfor 38 projects, of which 76.3% fell into the \nfor 38 projects, of which 76.3% fell into the \n\nabove three priority categories. The Kansai \nabove three priority categories. The Kansai \n\n\n\nIn the past, SMBC also worked to provide \nIn the past, SMBC also worked to provide \n\nfunding to the support creation of platforms \nfunding to the support creation of platforms \n\nfor growth in Japan. Now, working through \nfor growth in Japan. Now, working through \n\nthe Bank of Japan’s “Fund-supply measure \nthe Bank of Japan’s “Fund-supply measure \n\nto support strengthening the foundations \nto support strengthening the foundations \n\nfor economic growth” loan program, it \nfor economic growth” loan program, it \n\nhas established the Environmentally \nhas established the Environmentally \n\nResponsible Company Support Fund and \nResponsible Company Support Fund and \n\nthe Environmental Facilities Suppor t \nthe Environmental Facilities Suppor t \n\nFund, in suppor t of companies with \nFund, in suppor t of companies with \n\nenvironmentally-conscious managements, \nenvironmentally-conscious managements, \n\nand which invest in environmental facilities. \nand which invest in environmental facilities. \n\nGiven the wave of Japanese companies \nGiven the wave of Japanese companies \n\ns fast-growing \nsetting up operations in China’s fast-growing \nsetting up operations in China \n\nmarket, the bank has also established a China \nmarket, the bank has also established a China \n\nBusiness Support Fund to meet the funding \nBusiness Support Fund to meet the funding \n\n\n\n\n\nglobal warming and ozone layer protection, \nglobal warming and ozone layer protection, \n\nto specific campaigns for designated \nto specific campaigns for designated \n\nenvironments and ecosystems (turtle and \nenvironments and ecosystems (turtle and", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Transition alternatives.**There are two allowable transition alternatives – the modified- \nprospective transition or the modified-retrospective transition. Under the modified- \nprospective transition, we would begin applying the valuation and other criteria to \nstock options granted beginning July 1, 2005. We would begin recognizing expense for \nthe unvested portion of previously issued grants at the same time, based on the valua- \ntion and attribution methods originally used to calculate the disclosures. Under the \nmodified-retrospective transition, we would restate prior periods to reflect the previous- \nly calculated amounts in the pro forma disclosures as actual expenses of the prior \nperiod (with no change in valuation or attribution methods). Future accounting would", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**Providing work**\n**experience to students**\nSMBC \ns Hanoi Branch provided \nSMBC’s Hanoi Branch provided \ninternational school students \ninternational school students \nwith vocational experiences. \nwith vocational experiences. \n\n**International cooperation begins at home**\n\n**Thailand**\n**5**\n\n**Supporting farming**\n**villages in the northeast**\nSMBC \ns Bangkok Branch assisted \nSMBC’s Bangkok Branch assisted \nfarmers by donating underground \nfarmers by donating underground \nwater storage tanks and assisting \nwater storage tanks and assisting \nwith vegetable planting and \nwith vegetable planting and \nharvesting. \nharvesting. \n\nPerforming a Japanese-language drama \n\n\n\n**China**\n**2**\n\n**Scholarships at major universities**\n\nSumitomo Mitsui Banking Corporation (China) Limited \nSumitomo Mitsui Banking Corporation (China) Limited \nestablished a scholarship program for students of Zhejiang \nestablished a scholarship program for students of Zhejiang \nUniversity, Shanghai Inter \nUniversity, Shanghai Inter- \nnational Studies University, \nnational Studies University, \nSun Yat-sen University, \nSun Yat-sen University, \nand other universities. \nand other universities. \n\n\n\n**Employees put school meals on the table**\n**through their purchases in staff canteens**\n\nSMBC and Sumitomo Mitsui Finance and Leasing \nSMBC and Sumitomo Mitsui Finance and Leasing \nhave a program that provides donations to the non \nhave a program that provides donations to the non- \nprofit organization TABLE FOR TWO International to \nprofit organization TABLE FOR TWO International to \nfund school meals in developing \nfund school meals in developing \ncountries, for every low-calorie \ncountries, for every low-calorie \nmeal ordered for lunch. SMBC \nmeal ordered for lunch. SMBC \nF r i e n d S e c u r i t i e s h a s a l s o \nF r i e n d S e c u r i t i e s h a s a l s o \nins t alled vending machines \nins t alled vending machines \nselling healthy drinks, donating \nselling healthy drinks, donating \npart of their sales to TABLE FOR \npart of their sales to TABLE FOR \nTWO International. \nTWO International. \n\n**Donation boxes for foreign currency coins**\nSMBC places donation boxes for foreign currency \nSMBC places donation boxes for foreign currency \ncoins at the entrances of all manned branches and \ncoins at the entrances of all manned branches and \noffices in Japan, and sorts such collected coins by \noffices in Japan, and sorts such collected coins by \ncurrency for delivery to UNICEF. \ncurrency for delivery to UNICEF. \n\n\n\n**Malaysia**\n**6**\n\n**Donating furniture to**\n**welfare facilities**\n\nS M B C \ns L a b u a n B r a n c h i n \nS M B C ’ s L a b u a n B r a n c h i n \nMalaysia, following its relocation, \nMalaysia, following its relocation, \nd o na t e d de s k s , cha ir s a n d \nd o na t e d de s k s , cha ir s a n d \ncabinets to occupational training \ncabinets to occupational training \ncenters for the disabled. \ncenters for the disabled.", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Providing Profit and Supporting Sales**\n\n\n\n“Sales finance is a core business in the auto world. Automotive financing supports car \n\nsales and provides additional income, which translates into increased profit for the Group. \n\nAll Nissan finance companies operate under strict risk management control policies and \n\nmust balance the drive for profit with active sales support. \n\nIn Japan, about fifty percent of customers use cash when buying a car. Corporate \n\nsales account for another 20 percent of the total, while the remaining 30 percent of \n\ncustomers use automotive financing. Therefore, we focus on capturing that 30 percent \n\nmarket, in addition to penetrating the cash customer segment. Nissan Financial Services, \n\nNAOTOMO UCHIMURA \nPresident \nNissan Financial Services \nor NFS, has the highest level of market penetration in Japan, and our centralized \n\ncustomer center gives us a clear advantage over other finance companies. \n\nA sales finance company is exposed to various forms of risk. One risk is interest rate fluctuation. \n\nNFS mitigates this risk by matching interest as much as possible. Almost seventy percent of our \n\nportfolio is on a match-funding basis. Another risk is credit risk. Fortunately, our portfolio is \n\nimproving. The economy is getting better, and we’ve had success with a low-interest, 2.9 percent \n\nAPR program. Because this is a competitive rate, it has attracted customers with good credit \n\nratings who otherwise would have opted for bank financing. \n\nWe have also improved our scoring system for credit analysis. We have a new system that \n\ncan automatically process 60 percent of all credit applications. Turnaround time for the credit \n\ndecision used to take three to four hours, but with continuous improvement of our system it \n\ntakes just 14 minutes. If the dealer submits the data online, turnaround is reduced to four \n\nminutes. This has really increased customer satisfaction. In addition, having a centralized system \n\nensures that our credit standards are consistently applied. \n\nThe above improvements have reduced our loss ratio to below 0.3 percent. More importantly, 95 \n\npercent of applicants are approved for financing. The challenge is to reduce the loss ratio and rejection \n\nrate at the same time. We want to support sales by providing financing, and keep the loss ratio low. \n\nIn the past, NFS depended on the parent company for funding. Since Nissan and NFS had \n\ntheir financial ratings upgraded, we issued our first public bond in September 2003. We have also \n\nissued commercial paper and diversified our funding sources. As a result, our reliance on the parent \n\ncompany for funding has been reduced to almost zero. \n\nSales finance became actively involved in sales support during NISSAN 180. We have always \n\nbeen a source of profit, but now we are aiming to enhance the value chain as well. We have the \n\nlargest number of business lines of any finance company, including credit loans, corporate and \n\nprivate leasing, car rentals, credit cards, insurance, maintenance and much more. Because we have \n\nmore touch points with the customer, we have a great opportunity to easily cross-sell our products. \n\nNissan is allocating more resources to light commercial vehicles, which is a perfect platform for us \n\nas well. And two years ago we created a fleet division with Nissan that provides both vehicles and \n\na full range of services including total outsourcing of fleet management. \n\nThe Alliance with Renault has played a central role in our development over the past few years.", + "page_start": 29, + "page_end": 29, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "qualifications]. I did not go to university, \nqualifications]. I did not go to university, scope of operations in Asia, Europe and \nscope of operations in Asia, Europe and \n\nnor receive any professional training. \nnor receive any professional training. the Americas. In that regard, we need to \nthe Americas. In that regard, we need to \n\nNonet heless, I wa nted to become a n \nNonet heless, I wa nted to become a n consider ou r g loba l com mu n icat ion \nconsider ou r g loba l com mu n icat ion \n\nof 10 years. I was hoping to persuade \nof 10 years. I was hoping to persuade \n\n10,000 people to pay ¥10,000 each year \n10,000 people to pay ¥10,000 each year \n\nfor 10 years, and about 150 people have \nfor 10 years, and about 150 people have \n\nbeen sig n i ng up ever y day. However, \nbeen sig n i ng up ever y day. However, \n\nmost of them are people over 60. People \nmost of them are people over 60. People \n\nof that generat ion st i l l th i nk f irst of \nof that generat ion st i l l th i nk f irst of \n\nf a m i ly a nd cou nt r y, a nd t he n a bout \nf a m i ly a nd cou nt r y, a nd t he n a bout \n\ns what people used to \nthemselves. That’s what people used to \nthemselves. That \n\nbe like. We have to consider how we can \nbe like. We have to consider how we can \n\ninduce people in their thirties today to \ninduce people in their thirties today to \n\narchitect and set up shop in Osaka. I \narchitect and set up shop in Osaka. I capabilities. That is to say, mastering \ncapabilities. That is to say, mastering \n\nfound an entrepreneur willing to take a \nfound an entrepreneur willing to take a languages such as English and Chinese, \nlanguages such as English and Chinese, \n\nchance on someone like me, and here I \nchance on someone like me, and here I and acquiring an international perspective, \nand acquiring an international perspective, \n\nam today. But this leeway has now grown \nam today. But this leeway has now grown so we ca n ex press a nd advocate ou r \nso we ca n ex press a nd advocate ou r \n\nmuch narrower. I think we must review \nmuch narrower. I think we must review opi n ions more clea rly. I t h i nk t hese \nopi n ions more clea rly. I t h i nk t hese \n\nwhere we stand now. I think we must view \nwhere we stand now. I think we must view things will be important. I do not think \nthings will be important. I do not think \n\nJa p a n a nd A s i a a s for m i ng a s i ng le \nJa p a n a nd A s i a a s for m i ng a s i ng le \n\nwe will be able to achieve our vision of \nwe will be able to achieve our vision of \n\neconomic bloc in the world. \neconomic bloc in the world. becoming a global corporation unless we \nbecoming a global corporation unless we \n\n**Kunibe**: For SMBC to continue growing \n: For SMBC to continue growing can work effectively in foreign languages \ncan work effectively in foreign languages \n\nin the longer term, I think we do indeed \nin the longer term, I think we do indeed as we expand operations. For this reason, \nas we expand operations. For this reason, \n\nh a ve to foc u s on t he g loba l m a rket, \nh a ve to foc u s on t he g loba l m a rket, we are strengthening our foreign language \nwe are strengthening our foreign language \n\ni n p a r t i c u l a r t h e A s i a n m a r k e t . \ni n p a r t i c u l a r t h e A s i a n m a r k e t . programs and increasing the number of \nprograms and increasing the number of \n\nGeographically and culturally, Asia is \nGeographically and culturally, Asia is employees capable of working around the \nemployees capable of working around the \n\n\n\nhave this kind of mentality. \nhave this kind of mentality. \n\n**Kunibe**: I bel ie ve “hu m a n t ie s” a re \n: I bel ie ve “hu ma n t ie s” a re \n\nimportant not only in the reconstruction \nimportant not only in the reconstruction \n\nof the areas affected by the disaster, but \nof the areas affected by the disaster, but \n\nalso in the issue of our shrinking, aging \nalso in the issue of our shrinking, aging \n\npopulation. \npopulation.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. \n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would \nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related \nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are \naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are \naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including \ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to \ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws \nwhich we describe in greater detail below. \n\n**Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. \nOur management believes that our employee relations have been and will continue to be good. \n\n**Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and \nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the \ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also \nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding \ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory \nprovisions. A change in any of these laws or regulations may have a material effect on our business and the \nbusiness of our subsidiary banks. \n\n*Bank Holding Companies and Financial Holding Companies*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Plans for the formation of a First Financial Bankshares \n\ntrust company are moving forward with regulatory approval \n\nanticipated in late Spring or early Summer. This will permit \n\nyour Company to provide quality, locally delivered trust \n\nservices to additional markets. \n\nWith skilled trust professionals offering a complete range \n\nof financial products and services, the future of our trust \n\ndepartments look bright. Through dedication to individu- \n\nalized portfolio design and personalized service, our trust \n\ndepartments stand ready to meet the needs of our pres- \n\nent and future clients. \n\n\nRobert S. Patterson \nSenior Vice President, Trust Services \n\nTRUST FEES in millions \n\n9 \n8 \n. \n5 \n$ 3 \n8 \n. \n5 \n$ \n$6 \n0 \n5 \n. \n5 \n$ \n0 \n1 \n. \n5 \n$ \n5 \n7 \n. \n4 \n$ $5 \n\nAssets managed by the Trust Departments at First National \n\nBank of Abilene, San Angelo National Bank, Stephenville \n\nBank & Trust Co. and First National Bank, Sweetwater, \n\nincreased $27.3 million during the past year to a \n\nDecember 31, 2002 book value of $986.2 million. However, \n\ndue to depressed stock market values and volumes, trust \n\ndepartment revenue declined in 2002. Trust combined \n\nrevenues for the year were down slightly from $5.89 mil- \n\nlion in 2001 to $5.83 million for 2002. In 2003, we anticipate \n\na return to improved income growth. \n\nThe performance of the stock market the past three years \n\nhas been a challenge that our trust investment profes- \n\nsionals have managed well. Not since 1939-1941 have \n\nwe seen the S&P 500 drop 35% in a three-year period. Our \n\nportfolio managers outperformed their indices in Large \n\nCap stocks by 83 basis points and Fixed Income securi- \n\nties by 168 basis points. This performance bodes well for \n\nthe present and future of our client accounts. \n\nDuring 2002, we saw a successful conversion of \n\nStephenville Bank & Trust to the SEI Corporation account- \n\ning system. In March 2003, we will be converting First \n\nNational Bank, Sweetwater, to this system as well. This will \n\nTRUST ASSETS in millions \nprovide all First Financial Bankshares trust clients with the \n\nstrength and advantages of a uniform accounting system. \n6 \n8 \n9 \n$ \n9 \n5 \n9 \n$ \n$1000 \nOther operational systems have been examined and con- \n1 \n1 \n9 \n$ \n5 \n4 \n8 \n$ \nsistent practices and procedures have been implemented. \n$900 \n\n4 \n7 \n7 \n$ $800 \nTo further enhance our risk management assessments in \n$700 \n2003, we will be introducing an Operational Peer Review \n\n$600 \nTeam similar to the successful peer review teams used in \n\nthe Personal Trust areas of our four locations. $500", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "NFS and Nissan Motor Acceptance Corporation join with our counterparts from Renault and RCI \n\nBanque once a year for the Global Finance Synergy Meeting. We exchange ideas and best \n\npractices at this session, which has proved beneficial for both companies. The concept of offering \n\nfleet services, for example, originated with RCI Banque, which has been doing it in Europe. \n\nOur performance is measured not only by volume, but also by return on assets. We will \n\ncontinue to increase revenues, reduce costs through process integration, and enhance the \n\nfunctions of our centralized call center and IT activities. We aim to diversify our sources of income \n\nthrough other business activities, such as insurance and maintenance, while improving the \n\ncustomer experience. We want to be the best sales finance company in Japan.” \n\nNNoorrtthh AAmmeerriiccaa \n\nN O R T H A M E R I C A", + "page_start": 30, + "page_end": 30, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "what are career fairs for?", + "target_page": 1, + "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. \n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "When we think about our careers, and what we need to do to establish them, we \noften forget about the need to develop an essential skill: communication. If you \nstart reading through the job descriptions in a industry, you will find that the vast \nmajority of jobs require one or more of the following: \n\nIn a career context, good language skills can also: \n\n• Affect your credibility. Poor grammar indicates to a prospective \n\nemployer that you are sloppy, while flawless grammar indicates that \n\nyou pay attention to detail. \n\nImprove your relationships with your co- workers. If you are able \nto express yourself clearly, you can eliminate the confusion and \nmisunderstanding that often leads to conflict. \n\n• \n\nIncrease your chances of being promoted. \n• \n\n• Help you to create a good impression. \n\nImprove your ability to persuade others (which is a valuable skill in the \nworking world). \n\n• \n\n• Develop your basic English language skills. \n\n• Improve your English grammar. \n\n Apply your language and communication skills in a business contexT. \n(www.oxbridgeacademy.co.za/find-a- course/business-administration- \ncourses/)", + "page_start": 4, + "page_end": 4, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you’ve ever applied for a job, you’ll know that writing \nthe cover letter is the most difficult part of almost any job \napplication. Your cover letter creates the first impression, and \noften determines whether an employer will even look at your CV. \n\nYou need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job.", + "page_start": 44, + "page_end": 44, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Environmental**\n**Activities**\n\n\n\n**Committed to supporting environmental businesses, a CSR priority,**\n**through our core businesses**\n\n**A new venue for confabs:**\n**SMFG Environmental**\n**Business Forum**\n**at Eco-Products**\n\n\n\n**The eco japan cup:**\n**“A Contest for Unearthing**\n**and Growing Seeds of**\n**New Businesses”**\n\n\n\nSMBC jointly organizes the “eco japan cup,” an \nSMBC jointly organizes the “eco japan cup,” an \n\nenvironmental business contest, together with \nenvironmental business contest, together with \n\nthe Ministry of the Environment, the Ministry \nthe Ministry of the Environment, the Ministry \n\nof Internal Affairs and Communi \nof Internal Affairs and cations, \n Communications, \n\n Trans- \nhe Ministry of Land, Infrastructure, Trans \nthe Ministry of Land, Infrastructure, \n\nport and Tourism, Development Bank of \nport and Tourism, Development Bank of \n\nJapan Inc. and Environmental Business \nJapan Inc. and Environmental Business \n\nWomen. The competition has four major \nWomen. The competition has four major \n\ncategories – business, culture, lifestyle, and \ncategories – business, culture, lifestyle, and \n\npolicy-making. \npolicy-making. \n\nIn eco japan cup 2010, the “SMBC Eco-Banking \nIn eco japan cup 2010, the “SMBC Eco-Banking \n\nOffice Prize” was launched in the cultural \nOffice Prize” was launched in the cultural \n\ndivision. Entries were solicited on creating \ndivision. Entries were solicited on creating \n\neco-friendly bank branches through envi- \neco-friendly bank branches through envi \n\nThe Eco-Products exhibition, held each \nThe Eco-Products exhibition, held each \n\ns largest envi- \nDecember, is one of Japan’s largest envi \nDecember, is one of Japan \n\nronmental exhibitions. Under it, SMFG held \nronmental exhibitions. Under it, SMFG held \n\nthe SMFG Environmental Business Forum, \nthe SMFG Environmental Business Forum, \n\na unique event to which the whole SMFG \na unique event to which the whole SMFG \n\nGroup contributed. \nGroup contributed. \n\nThe SMFG Environmental Business Forum \nThe SMFG Environmental Business Forum \n\nenables encounters and information \nenables encounters and information \n\nexchange in the field of environmental \nexchange in the field of environmental \n\nbusiness. SMFG and its Group companies \nbusiness. SMFG and its Group companies \n\nprovide various platforms, including business \nprovide various platforms, including business \n\n**Sumitomo Mitsui**\n**Finance & Leasing:**\n**Promoting recycling**\n**and reuse**\n\nmatching events, stands and catalogue \nmatching events, stands and catalogue \n\nexhibitions, and lectures and seminars, \nexhibitions, and lectures and seminars, \n\nwith the aim of giving new business \nwith the aim of giving new business \n\nopportunities to companies and other \nopportunities to companies and other \n\norganizations that are considering entering \norganizations that are considering entering \n\nAs part of its core leasing operations, \nAs part of its core leasing operations, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nhelping reduce customers’ environmental \nhelping reduce customers’ environmental \n\nronment protection measures including \nronment protection measures including \n\nadvanced energy initiatives and reduction \nadvanced energy initiatives and reduction \n\nof carbon dioxide. Some of the prize-winning \nof carbon dioxide. Some of the prize-winning \n\nproposals (for example, efficient use of \nproposals (for example, efficient use of \n\ntimber from forest thinning) have been \ntimber from forest thinning) have been \n\nadopted at environment-friendly model \nadopted at environment-friendly model \n\nbranches that the bank is developing. \nbranches that the bank is developing. \n\nfrom cards without IC chips. Both types are \nfrom cards without IC chips. Both types are \n\ns Shimura Center \npulverized at the company’s Shimura Center \npulverized at the company \n\nin Tokyo and sealed separately in recycling \nin Tokyo and sealed separately in recycling", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "H U M A N R E S O U R C E S \n\n\n\n**Dynamism and Diversity**\n\nH I T O S H I K A W A G U C H I \nSenior Vice President \n\n“Once perceived as bureaucratic and slow to change, \n\nHuman Resources changed dramatically during the \n\nNISSAN 180 period. Now, in fact, people occasionally \n\nsay that we’re changing too rapidly. That may be true, \n\nbut a positive dynamism is emerging as a result, and \n\nNissan is stronger because of it. \n\nThe impetus for many of the modifications comes \n\nfrom top management. Mr. Ghosn, for one, takes a \n\ndirect and abiding interest in this area of operations. \n\nThere is also a cross-functional team dedicated to \n\norganizational issues that recommends changes to \n\nHR policy. And because half the people on our HR \n\nstaff come from other companies, many suggestions \n\nare coming from within as well. The latter is very \n\nunusual for a major Japanese company such as \n\nNissan, and is a direct result of a new policy we call \n\nMid-Career Scouting, which actively seeks talent \n\nfrom outside Nissan. All of these activities are \n\nwe had many foreign executives working at Nissan \n\nheadquarters, and the majority of communications were in \n\nEnglish as well as Japanese. As a result, more employees, \n\nincluding non-management staff, are being assigned to \n\nwork outside of Japan. In addition, proficiency in English is \n\nnow a prerequisite for all managers at Nissan. These efforts \n\nto promote diversity are transforming our corporate culture. \n\nOne of the most interesting developments of NISSAN \n\n180 was the advent of the Career Coach system, which we \n\nimported from our Alliance partner, Renault. In a modern \n\nbusiness structure, HR is in charge of structural and \n\nsystem functions such as compensation. The Career Coach \n\nsystem provides career development for the individual \n\nemployee. There are five career coaches at this time, one \n\nfor each of the major functions. Their collective task is to \n\nidentify people of high potential and create career plans for \n\nthem. In a sense, they work outside of HR, although they \n\nreport to me. The coaches gather once a month for the \n\nNissan Assignment Committee, headed by Mr. Ghosn, to \n\nreport on their activities. \n\nEmployees at Nissan also have the chance to control \n\ntheir career paths through our internal “self-career” system \n\non the Company’s intranet. Managers can search for \n\nemployees registered on the system for open positions \n\nthey have and proactively post job vacancies on the open- \n\nentry system portal. Although the open-entry system has a \n\nlonger history, the self-career system began in early fiscal \n\n2005 in Japan. We plan to expand both these programs on \n\na global basis. \n\n\n\n\n \n \n \n \n [html]\n
diversity a
There is no
evolution. W
particular : w
and embrac
more oppor
the Diversity
of female exposure
served as a
of work - hor
and outside
The sec
still an unco
have found
have experi
Nissan, and
those insigh
The thir
more pression
", + "page_start": 57, + "page_end": 57, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "The benefits of using mind maps include the following: \n\n• They help you to see how the different bits of information fit into the \n\nbigger picture. \n\n• They help you to understand the relationships between concepts. \n\n• They help you to memorise information more quickly (by engaging \n\nboth hemispheres of your brain). \n\nTips for making mind maps: \n\n• Use different colours to distinguish between concepts. \n\n• Use key words and phrases, instead of writing in full sentences. \n\n• Include images/drawings that are relevant to the topic(s). \n\n• Use arrows to show how different concepts are related. \n\n**HR Manager’s Duties**\n\nContracts Training \n\n• Establish staff training \n• Pay salaries on time • Draft employment \n\nneeds \n• Make necessary contracts \n\n• Establish skills gaps \ndeductions • Ensure safekeeping of \n\n• Take responsibility for \n• Calculate overtime employment contracts \n\nsuccession planning", + "page_start": 29, + "page_end": 29, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Next Steps**\n\n**Share knowledge**\n\nYou will**get the most out of Teams**when you get to truly connect with your team and \ncollaborate together. Keep practicing until each step of your workflow feels natural. \n\nTeamwork is all about collaboration!**Share with your team**\n**best practices**you learn along the way, tips and tricks for \nhow you can best organize your workflows and ask for their \nown advice to define how you can best use Teams together. \n\n**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions.", + "page_start": 5, + "page_end": 5, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "When we saw Get SetTM it was love at first \n\nsight. Then we got to know everything else \n\nyou have to offer, and realized you’re more \n\nthan just a pretty face — you’re a brand with a \n\nhead for business and uplifting products that \n\nset the standard for functionality, durability, \n\nand style. Of course we know we Fortune 500 \n\ntypes are not the only ones in your life — \n\ncorporate, government, and institutional \n\ncustomers are excited about you, too, since \n\nyou match everyone’s workplace furniture \n\nand service needs with energy, confidence, \n\nand great customer relationships. That’s ok, \n\nAllsteel; you’re worth sharing. \n\n\n\nP E R F E C T M A T C H # 1 \n\n\n\nT H E F O R T U N E 5 0 0 \n\nA N D A L L S T E E L", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "decisions. Ideally, this training should be provided at a local level with local programs, in a way that \n\nmakes it possible to use it on local issues, for the reasons and in the ways discussed in the next \n\nparagraph. For example, visualization techniques like those used by ABC News to show the effects \n\nof the March 2011 Japan Earthquake, in which all the user has to do to compare scenes from before \n\nand after the earthquake is to move a slider, should be routinely used to explain proposals about \n\nurban planning, zoning and related topics. \n\n**4.6. Focus on local, specific issues to raise interest for Open**\n**Data**\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens \n\nto use Open Data in their political, economic and professional decisions, one of the final \n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be \n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of \n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the \n\nrecommendations of this report*at the local level*, \n\nMost people encounter their local governments much more often then their national ones. When \n\nworking within a single city or region it is much easier to inform citizens, raise their interest and \n\ninvolve them, because they would be searching*local*solutions to improve*local*services and/or \n\nsave*local*money. There may also be much more opportunities to do so, especially in this period of \n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in \n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" \n\nmust be the keys for local activists and public employees working on local Open Data: \n\n• work on specific issues and with precise objectives \n\n• focus on immediate usefulness \n\n• work on demand, on the*services*that people want. Required services define what data must \n\nbe open, not the contrary \n\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data: \n\n*\"how do we get people to use the data that we publish?\"*. The right question, instead, is \"what data \n\ndo people want?\". Even if citizens don't realize yet that what they actually want is more Open Data, \n\nor that what they need can be done more quickly and cheaply by releasing some information in that \n\nway. \n\n\n \n \n \n \n [html]\n
A genat example of what all this means is the < underline > Great Enjtish Public Tuiliet Magc a public participation31 / 34Cagvright 2013 LIDR, Sourkin Segerion Sint Rime, This work is released ander o Cinotive Commers atribution Acrease ( htp :// creativecomerung / liceners / hy5.01 )
", + "page_start": 30, + "page_end": 30, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What are the priorities for job seekers ?", + "target_page": 1, + "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*\n\n*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment*", + "page_start": 115, + "page_end": 115, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "When we think about our careers, and what we need to do to establish them, we \noften forget about the need to develop an essential skill: communication. If you \nstart reading through the job descriptions in a industry, you will find that the vast \nmajority of jobs require one or more of the following: \n\nIn a career context, good language skills can also: \n\n• Affect your credibility. Poor grammar indicates to a prospective \n\nemployer that you are sloppy, while flawless grammar indicates that \n\nyou pay attention to detail. \n\nImprove your relationships with your co- workers. If you are able \nto express yourself clearly, you can eliminate the confusion and \nmisunderstanding that often leads to conflict. \n\n• \n\nIncrease your chances of being promoted. \n• \n\n• Help you to create a good impression. \n\nImprove your ability to persuade others (which is a valuable skill in the \nworking world). \n\n• \n\n• Develop your basic English language skills. \n\n• Improve your English grammar. \n\n Apply your language and communication skills in a business contexT. \n(www.oxbridgeacademy.co.za/find-a- course/business-administration- \ncourses/)", + "page_start": 4, + "page_end": 4, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Only include this if you are sincere, and don’t make any promises \nthat you won’t be able to keep. You could, for example, assure your \nemployer that you will finish your current projects or hand them over to \na colleague. You could also offer to train the person who will be replacing \nyou. \n\n6. \nA suitable closing. \nIt is important to use a closing that is appropriate in the circumstances. \nIf you have a good relationship with your employer, you may want to \nwish him/her well for the future, and provide contact details that he/she \ncan use to get in touch with you once you have left the organisation. You \ncan then end your letter with a greeting such as “Kind regards,” followed \nby your signature.", + "page_start": 49, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**E-mail address**\nPlease provide a valid e-mail address that you check on a regular \nbasis, as we’ll be using this address to communicate with you \nthroughout your studies. \n**Occupation**\nRefers to your current job (if you are employed). If you are \nunemployed, you can simply write “unemployed” or “not applicable”. \n**Delivery address**\nRefers to the address at which you want your study material to be \ndelivered. The reason why we prefer you to select your work address \nis so that there will always be someone available to receive your \nstudy material, even if you are not there when the courier arrives.", + "page_start": 22, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "decisions. Ideally, this training should be provided at a local level with local programs, in a way that \n\nmakes it possible to use it on local issues, for the reasons and in the ways discussed in the next \n\nparagraph. For example, visualization techniques like those used by ABC News to show the effects \n\nof the March 2011 Japan Earthquake, in which all the user has to do to compare scenes from before \n\nand after the earthquake is to move a slider, should be routinely used to explain proposals about \n\nurban planning, zoning and related topics. \n\n**4.6. Focus on local, specific issues to raise interest for Open**\n**Data**\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens \n\nto use Open Data in their political, economic and professional decisions, one of the final \n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be \n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of \n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the \n\nrecommendations of this report*at the local level*, \n\nMost people encounter their local governments much more often then their national ones. When \n\nworking within a single city or region it is much easier to inform citizens, raise their interest and \n\ninvolve them, because they would be searching*local*solutions to improve*local*services and/or \n\nsave*local*money. There may also be much more opportunities to do so, especially in this period of \n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in \n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" \n\nmust be the keys for local activists and public employees working on local Open Data: \n\n• work on specific issues and with precise objectives \n\n• focus on immediate usefulness \n\n• work on demand, on the*services*that people want. Required services define what data must \n\nbe open, not the contrary \n\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data: \n\n*\"how do we get people to use the data that we publish?\"*. The right question, instead, is \"what data \n\ndo people want?\". Even if citizens don't realize yet that what they actually want is more Open Data, \n\nor that what they need can be done more quickly and cheaply by releasing some information in that \n\nway. \n\n\n \n \n \n \n [html]\n
A genat example of what all this means is the < underline > Great Enjtish Public Tuiliet Magc a public participation31 / 34Cagvright 2013 LIDR, Sourkin Segerion Sint Rime, This work is released ander o Cinotive Commers atribution Acrease ( htp :// creativecomerung / liceners / hy5.01 )
", + "page_start": 30, + "page_end": 30, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "qualifications]. I did not go to university, \nqualifications]. I did not go to university, scope of operations in Asia, Europe and \nscope of operations in Asia, Europe and \n\nnor receive any professional training. \nnor receive any professional training. the Americas. In that regard, we need to \nthe Americas. In that regard, we need to \n\nNonet heless, I wa nted to become a n \nNonet heless, I wa nted to become a n consider ou r g loba l com mu n icat ion \nconsider ou r g loba l com mu n icat ion \n\nof 10 years. I was hoping to persuade \nof 10 years. I was hoping to persuade \n\n10,000 people to pay ¥10,000 each year \n10,000 people to pay ¥10,000 each year \n\nfor 10 years, and about 150 people have \nfor 10 years, and about 150 people have \n\nbeen sig n i ng up ever y day. However, \nbeen sig n i ng up ever y day. However, \n\nmost of them are people over 60. People \nmost of them are people over 60. People \n\nof that generat ion st i l l th i nk f irst of \nof that generat ion st i l l th i nk f irst of \n\nf a m i ly a nd cou nt r y, a nd t he n a bout \nf a m i ly a nd cou nt r y, a nd t he n a bout \n\ns what people used to \nthemselves. That’s what people used to \nthemselves. That \n\nbe like. We have to consider how we can \nbe like. We have to consider how we can \n\ninduce people in their thirties today to \ninduce people in their thirties today to \n\narchitect and set up shop in Osaka. I \narchitect and set up shop in Osaka. I capabilities. That is to say, mastering \ncapabilities. That is to say, mastering \n\nfound an entrepreneur willing to take a \nfound an entrepreneur willing to take a languages such as English and Chinese, \nlanguages such as English and Chinese, \n\nchance on someone like me, and here I \nchance on someone like me, and here I and acquiring an international perspective, \nand acquiring an international perspective, \n\nam today. But this leeway has now grown \nam today. But this leeway has now grown so we ca n ex press a nd advocate ou r \nso we ca n ex press a nd advocate ou r \n\nmuch narrower. I think we must review \nmuch narrower. I think we must review opi n ions more clea rly. I t h i nk t hese \nopi n ions more clea rly. I t h i nk t hese \n\nwhere we stand now. I think we must view \nwhere we stand now. I think we must view things will be important. I do not think \nthings will be important. I do not think \n\nJa p a n a nd A s i a a s for m i ng a s i ng le \nJa p a n a nd A s i a a s for m i ng a s i ng le \n\nwe will be able to achieve our vision of \nwe will be able to achieve our vision of \n\neconomic bloc in the world. \neconomic bloc in the world. becoming a global corporation unless we \nbecoming a global corporation unless we \n\n**Kunibe**: For SMBC to continue growing \n: For SMBC to continue growing can work effectively in foreign languages \ncan work effectively in foreign languages \n\nin the longer term, I think we do indeed \nin the longer term, I think we do indeed as we expand operations. For this reason, \nas we expand operations. For this reason, \n\nh a ve to foc u s on t he g loba l m a rket, \nh a ve to foc u s on t he g loba l m a rket, we are strengthening our foreign language \nwe are strengthening our foreign language \n\ni n p a r t i c u l a r t h e A s i a n m a r k e t . \ni n p a r t i c u l a r t h e A s i a n m a r k e t . programs and increasing the number of \nprograms and increasing the number of \n\nGeographically and culturally, Asia is \nGeographically and culturally, Asia is employees capable of working around the \nemployees capable of working around the \n\n\n\nhave this kind of mentality. \nhave this kind of mentality. \n\n**Kunibe**: I bel ie ve “hu m a n t ie s” a re \n: I bel ie ve “hu ma n t ie s” a re \n\nimportant not only in the reconstruction \nimportant not only in the reconstruction \n\nof the areas affected by the disaster, but \nof the areas affected by the disaster, but \n\nalso in the issue of our shrinking, aging \nalso in the issue of our shrinking, aging \n\npopulation. \npopulation.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "***4.3.4 Working life perspective – health***\nThis EWCS 2015 question on the**working life perspective**(*‘Will you be able to do this or a similar job*\n*at 60 years of age?’*) gives quite a good hint to the individual long-term prospects, which might even be \nmore valuable than the question on currently affected health because it is a personal assessment of the \noverall status of health. \n\n**Differences between countries are significant but not as significant as between other categories,**\n**for example, between sectors and occupations**. The EU average of ‘No’ responses to the question \n*‘Do you think you will be able to do your current job or a similar one until you are 60 years old?’*is at \n27%; the eight countries with the highest rates of ‘No’ responses (between 44% and 33%) are France, \nSlovenia, Poland, Slovakia, Croatia, Belgium, Malta and Bulgaria. Under 25% of ‘No’ responses were \ngiven in eight countries, starting from Portugal (16%) over Germany, Denmark, Ireland, Sweden, Italy, \nEstonia and Lithuania (24%).263 \n\n**Figure 35: Opinion on work until the age of 60 – EWCS 2015**\n\n\n\n**Young workers under 35 are much more sceptic**than those over 50; 38% say that they will not be \nable, a much higher percentage than the 22% of workers aged over 50. The employment status is also \nvery important; 26% of the permanently employed respond with a ‘No’ compared to 39% of those with \n‘Other arrangements’. Remarkably, only 19% of the self-employed do not believe that they will be able \nto do their job at 60 years. \n\n**Large differences can be seen between occupation levels.**37% per cent of the low-skilled manual \nworkers respond with ‘No’, and 30% of the highly skilled manual workers respond ‘No’, as do 27% of \nthe low-skilled clerical workers and only 21% of the high-skilled clerical workers, a 16% difference \nbetween high-skilled clerical workers and low-skilled manual workers. In some countries only 10% to \n15% of the highly skilled clerical workers respond with ‘No’ while in a number of countries more than \n50% of the low-skilled manual workers respond with ‘No’, for example, in Slovenia, Croatia, Slovakia \nand Czechia. \n\nThe authors of the Senior Working Life study describe these differences as follows:264 \n\n*‘For ISCO groups 1–4 (seated work) main expected reasons for retiring were freedom to choose and*\n*desire for more leisure time, but many would consider staying longer if there were better possibilities for*\n*additional senior days, longer vacations and flexible working hours. For ISCO groups 5–9 (physical*\n*work), poor physical health and not being capable of doing the job were common expected reasons for*\n*retiring, but many would consider staying longer if the work were less physically demanding and there*\n*were more senior days. Possibility for pension was a general expected reason for retiring. Expected*\n*reasons differed to a less extent between genders than between ISCO groups, e.g. economic factors*\n*were more important for men and high work demands more important for women.*", + "page_start": 95, + "page_end": 95, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "If you’ve ever applied for a job, you’ll know that writing \nthe cover letter is the most difficult part of almost any job \napplication. Your cover letter creates the first impression, and \noften determines whether an employer will even look at your CV. \n\nYou need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job.", + "page_start": 44, + "page_end": 44, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Some important questions remain at the end of such a report: \n\n• The**quality of statistics and surveys fades the more irregular are the working**conditions \nbeing studied. Which research methods are adequate for a clearer and more reliable evidence \nbase on these working conditions? It might require research methods different from those used \ntoday, for example, more investigative case studies; it might also be helpful to evaluate the \n**existing national working conditions surveys or statistics**under this aspect. \n\n•**Fading employer–employee relations.**There are special research efforts necessary to study \nthe application of OSH regulations of work with weak or no employer–employee relations, for \nexample, for the self-employed and new forms of employment. \n\n•**Surveys usually suffer a participation bias, for example, for the migrant workforce.**The \nlow participation rate of migrants can contribute to a particular underestimation regarding their \noften unfavourable working conditions. \n\n•**Workers in manual occupations**report**better health than administrative workers**but**less**\n**expectations to do the job until being 60 years old**. What are the reasons behind this? Is it \nthe healthy worker effect, strong occupation-related differences regarding the perception of \nhealth and the expression of health problems? 502,503 \n\n• High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data \nsuggest that**work intensification stopped after 2005**. What might be the reasons? Are the \ncurrent indicators not specific enough to measure developments of work intensity? Has since \nthen the major burden of intensification been put on other types of workers, for example, \nsubcontracted or self-employed, temporary and seasonal workers, or on workers in the global \nsupply chain? \n\n• How much evidence is there that**dangerous work has been increasingly contracted out to**\n**small and medium-size enterprises and the self-employed**? Are there sufficiently detailed \ndata on whether a larger share of service and client-related work at atypical times or work \nrequiring long working hours has been taken over by self-employed or subcontractors? \n\n• The**influence of enterprise size**is often difficult to explain. In several aspects, the SMEs \nperform better, and in other important aspects worse. What might be the reason for this? \n•**How is it possible to overcome the ‘prevention gap’ that in general exists between mobile**\n**and stationary workplaces?**Can the solutions be technical or must there be organisational \nand legal measures, for example, a limitation of the prolonged use of ergonomically inadequate \nequipment like mobile phones? \nImpact of**international and global supply chains on OSH: Does it improve or worsen the**\n**working conditions in the EU?**Research could try to estimate the risk-reducing impact of the \nshift of some high-risk productions to enterprises outside the EU, for example, mining, base \nchemicals, recycling and so on (export of risks), and to estimate the OSH impact of EU export \nproduction, for example, vehicles, specialty chemicals, machines for risks at work inside the EU \n(import of risks). \nIt would also be a big step forward if research could achieve an agreed**standard value or a**\n**standard range**(as reliable as possible) for the**attributable fraction of work**to widespread \ndiseases, that is, cardiovascular diseases, mental and behavioural disorders, musculoskeletal \ndiseases and cancer. \n\n• \n\n•", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 40: Workforce structure, mobility and migration – European Commission**\n\nRegarding OSH, it is important to consider that**migrants from non-EU countries are over-**\n**represented in certain sectors and occupations**like cleaners and helpers, personal services and \ncare, building workers, mining, manufacturing, transport, food and agriculture. The next table shows the \npercentage of non-EU citizens in the workforce of certain occupations compared to the share of \nworkforce of EU citizens in the same occupations.310", + "page_start": 111, + "page_end": 111, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What does ShareAlike mean in terms of licencing ?", + "target_page": 1, + "target_passage": "adaptations based on this work must be licensed under the same license.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "I am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] \nconcerning intellectual property rights and exploitation of the results and I confirm that I \ntransferred all the relevant rights to [*insert name of contractor or other intermediary right*\n*holder*]. \n\nI declare that [I have received full remuneration] [I agreed to receive remuneration by \n[*insert date*]]. \n\n[As creator, I also confirm that I do not object to the following: \n\n(a) that my name be mentioned or not mentioned when the results are presented to \n\nthe public; \n\n(b) that the results be divulged or not after they have been delivered in their final \n\nversion to the contracting authority; \n\n(c) that the results be adapted, provided that this is done in a manner which is not \nprejudicial to my honour or reputation.] \n\nDate, place, signature", + "page_start": 48, + "page_end": 48, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "per share from continuing operations8asic$ 3.24$3.32$2.93S2.66$Diluted3.223.302.912.642.41Earnings per shareBasic$ 3.24$3.26$2.88$2.61$2.38Diluted3.223.242.862.592.38Adjusted earnings per share from continuing operations 1Basic$ 3.43$3.43$3.20S2.96$2.53Diluted3.423.413.172.942.53Balance Sheet :AssetsProperty, plant and equipment, net$ 10.255$9.576$9.114$ 8.43$8.197Goodwill3.7513.2153.2803.1083.018Intangible assets3.2112.9512.7212.5912.643Investments1.4871.4841.107933563Other assets4.897", + "page_start": 90, + "page_end": 90, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": " modifying the content, the dimensions; \n\n making technical changes to the content (necessary correction of technical errors), \nadding new parts or functionalities, changing functionalities, providing third parties \nwith additional information concerning the*result*(e.g. source code) with a view to \nmaking modifications; \n\n addition of new elements, paragraphs, titles, leads, bolds, legend, table of content, \nsummary, graphics, subtitles, sound; \n\n addition of metadata, for text and data-mining purposes; addition of right- \nmanagement information; addition of technological protection measures; \n\n preparation in audio form, preparation as a presentation, animation, pictograms \nstory, slide-show, public presentation; \n\n extracting a part or dividing into parts; \n\n \nincorporating, including by cropping and cutting, the*results*or parts thereof in other \nworks, such as on websites and webpages; \n\n translating, inserting subtitles, dubbing in different language versions: \n\nEnglish, French, German; \nall official languages of EU; \nlanguages used within EU; \nlanguages of candidate countries; \n\n- \n- \n- \n- \n- \n\n(f)rights to authorise or license the modes of exploitation set out in any of the points (a) \nto (e) to third parties, provided however that this does not apply to*pre-existing rights*and \n*pre-existing materials*, if they are only licensed to the Agency, except as foreseen by \nArticle II.13.2.; \n\n(g) other adaptations which the parties may later agree; in such case, the following rules \napply: the contracting authority must consult the contractor. If necessary, the contractor \nmust in turn seek the agreement of any*creator*or other right holder and must reply to the \ncontracting authority within one month by providing its agreement, including any \nsuggestions of modifications, free of charge. The contractor may refuse the intended \nmodification only if a*creator*can demonstrate that the intended modification may harm \nhis/her honour or reputation, thereby violating his/her moral rights. \n\nThe modes of exploitation may be defined in more details in the specific contract. \n\nThe list above is in addition to whatever rights already accrue to the contracting authority \non the basis of existing exceptions in the applicable legislation, such as the copyright \nexception to ensure the proper performance or reporting of administrative proceedings, in \ncases where such exceptions apply. \n\n**I.10.2. Licence or transfer of pre-existing rights**\n\nAll*pre-existing rights*incorporated in the*results*, if any, are licensed to the Agency as set \nout in Article II.13.2. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 9, + "page_end": 9, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "‚***Share Repurchases.***\n\nIf we are unable to identify opportunities that satisfy our growth strategy, we \nintend to continue to use our free cash Öow to repurchase shares of our common stock at prices that \nprovide value to our stockholders. As of December 31, 2004, we had repurchased a total of 35.2 million \nshares, or approximately 20% of our common stock outstanding at the commencement of our share \nrepurchase program in 2000, for $750.4 million. In October 2004, our board of directors authorized the \nrepurchase of up to an additional $275.0 million of our common stock, of which $274.6 million \nremained available at December 31, 2004. We believe that our share repurchase program will continue \nto enhance stockholder value. \n\n‚***Dividends.***\n\nIn July 2003, our board of directors initiated a quarterly cash dividend of $.06 per share. \nEÅective October 2004, our quarterly cash dividend was increased to $.12 per share. We may consider \nincreasing our quarterly cash dividend if we believe it will enhance stockholder value. \n\n‚***Minimize Borrowings.***To the extent that the opportunities to enhance stockholder value mentioned \nabove are not available, we also intend to continue to use our free cash Öow to minimize our \nborrowings. \n\nAnother key component of our Ñnancial strategy includes maintaining an investment grade rating on our \nsenior debt. This has allowed us to secure favorable, long-term, Ñxed-rate Ñnancing that reduces our exposure \nto changing interest rates. This has also allowed us, and will continue to allow us, to readily access capital \nmarkets. \n\nFor certain risks related to our Ñnancial strategy, see \"\"Risk Factors.'' \n\n**Operating Strategy**\n\nWe seek to leverage existing assets and revenue growth to increase operating margins and enhance \nstockholder value. Our operating strategy to accomplish this goal is to: \n\n‚ utilize the extensive industry knowledge and experience of our executive management, \n\n‚ utilize a decentralized management structure in overseeing day-to-day operations, \n\n‚ integrate waste operations, \n\n‚ improve operating margins through economies of scale, cost eÇciencies and asset utilization, \n\n‚ achieve high levels of customer satisfaction, and \n\n‚ utilize systems to improve consistency in Ñnancial and operational performance. \n\nFor certain risks related to our operating strategy, see \"\"Risk Factors.'' \n\n‚***Experienced Executive Management Team.***We believe that we have one of the most experienced \nexecutive management teams in the solid waste industry. \n\nJames E. O'Connor, who has served as our Chief Executive OÇcer since December 1998, also \nbecame our Chairman in January 2003. He worked at Waste Management, Inc. from 1972 to 1978 and \nfrom 1982 to 1998. During that time, he served in various management positions, including Senior Vice \nPresident in 1997 and 1998, and Area President of Waste Management of Florida, Inc. from 1992 to \n1997. Mr. O'Connor has over 30 years of experience in the solid waste industry. \n\nMichael J. Cordesman, who has served as our Chief Operating OÇcer since March 2002 and also as \nour President since February 2003, has over 24 years of experience in the solid waste industry. He \njoined us in June 2001 as our Eastern Region Vice President. From 1999 to 2001, Mr. Cordesman \nserved as Vice President of the Central Region for Superior Services Inc. From 1980 to 1999, he served \nin various positions with Waste Management, including Vice President of the Mid-Atlantic Region \nfrom 1992 to 1999. \n\n3", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "(i) where the*results*are or include logos or subject-matter which could be registered as \na trademark: the right to register such logo or subject-matter as a trademark and to \nfurther exploit and use it; \n\n(j) where the*results*are or include know-how: the right to use such know-how as is \nnecessary to make use of the*results*to the full extent provided for by this FWC, and \nthe right to make it available to contractors or subcontractors acting on behalf of the \ncontracting authority, subject to their signing of adequate confidentiality undertakings \nwhere necessary; \n\n(k) where the*results*are documents: \n\n(i) \n\nthe right to authorise the reuse of the documents in conformity with the \nCommission Decision of 12 December 2011 on the reuse of Commission \ndocuments (2011/833/EU), to the extent it is applicable and the documents fall \nwithin its scope and are not excluded by any of its provisions; for the sake of this \nprovision, \"reuse\" and \"document\" have the meaning given to them by this \nDecision; \nthe right to store and archive the*results*in line with the document management \nrules applicable to the contracting authority, including digitisation or converting \nthe format for preservation or new use purposes; \n\n(ii) \n\n(l) where the*results*are or incorporate software, including source code, object code and, \nwhere relevant, documentation, preparatory materials and manuals, in addition to the \nother rights mentioned in this Article: \n\n(i) \n\nend-user rights, for all uses by the contracting authority or by subcontractors \nwhich result from this FWC and from the intention of the parties; \nthe rights to receive both the source code and the object code; (ii) \n\n(m) the right to license to third parties any of the exclusive rights or of the modes of \nexploitation set out in this FWC; however, for*pre-existing materials*which are only \nlicensed to the contracting authority, the right to sub-license does not apply, except \nin the two cases foreseen by Article II.13.2.; \n\n(n) to the extent that the contractor may invoke moral rights, the right for the contracting \nauthority, except where otherwise provided in this FWC, to publish the*results*with or \nwithout mentioning the*creator*(s)’ name(s), and the right to decide when and whether \nthe*results*may be disclosed and published. \n\nThe contractor warrants that the exclusive rights and the modes of exploitation may be \nexercised by the contracting authority on all parts of the*results*, be it via a transfer of \nownership of the rights, on those parts which were specifically created by the contractor, \nor via a licence of the pre-existing rights, on those parts consisting of*pre-existing*\n*materials*. \n\nWhere*pre-existing materials*are inserted in the*results*, the contracting authority may \naccept reasonable restrictions impacting on the above list, provided that the said materials \nare easily identifiable and separable from the rest, that they do not correspond to \nsubstantial elements of the*results*, and that, should the need arise, satisfactory \nreplacement solutions exist, at no additional costs to the contracting authority. In such \ncase, the contractor will have to clearly inform the contracting authority before making \nsuch choice and the contracting authority has the right to refuse it. \n\n**II.13.4. Identification of pre-existing rights**\n\nWhen delivering the*results*, the contractor must warrant that, for any use that the \ncontracting authority may envisage within the limits set in this FWC, the newly created \nparts and the*pre-existing material*incorporated in the*results*are free of claims from", + "page_start": 24, + "page_end": 24, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "advantage to a competitor. Annual \ninvestments in new capabilities, \neducation and continuous improvement help to maintain and improve \nRCI’s security posture. These are focused on protection and prevention, \nrobust detection and advance preparation and planning to help prevent \na potential breach from turning into a crisis. Risk management \nresources continue to be focused in this area. services may be increased from time-to-time as a result of compliance \nwith industry or legislative initiatives to address consumer protection \nconcerns or such Internet-related issues as copyright infringement, \nunsolicited commercial e-mail, cybercrime and lawful access. Our cable, \nwireless and broadcasting licences may not generally be transferred \nwithout regulatory approval. \n\nGenerally, our licences are granted for a specified term and are subject \nto conditions on the maintenance of these licences. These licencing \nconditions may be modified at any time by the regulators. The \nregulators may decide not to renew a licence when it expires, and any \nfailure by us to comply with the conditions on the maintenance of a \nlicence could result in a revocation or forfeiture of any of our licences or \nthe imposition of fines. \n\nWe use standard industry practices for network and information \ntechnology security, survivability and disaster recovery. Our ongoing \nsuccess partly depends on protecting our corporate business-sensitive \ninformation about our customers and \ndata, \nemployees. We treat this information as intellectual property and \nprotect it from unauthorized access and compromise. We rely on our \npolicies and procedures and information technology systems to protect \nthis information. If we do not secure our data and the privacy of our \ncustomer information, we may not be in compliance with regulatory \nstandards and it could result in negative publicity, litigation and damage \nto our \nthese outcomes can cause us to lose \ncustomers or public confidence, or experience financial losses. \n\nincluding personal \n\nThe licences include conditions requiring us to comply with Canadian \nownership restrictions of the applicable legislation. We are currently in \ncompliance with all of \nthese Canadian ownership and control \nrequirements. However, if these requirements are violated, we would \nbe subject to various penalties, possibly including, in the extreme case, \nthe loss of a licence. \n\nreputation. Any of \n\n**Impact of Network Failures on Revenue and Customer Service**\nIf our networks or key network components fail, it could, in some \ncircumstances, result in a loss of service for our customers for an \nindefinite period and have an adverse effect on our results and financial \nposition. We rely on business partners to carry some traffic for some of \nour customers. If one of these carriers has a service failure, it might also \ncause a service interruption for our customers that would last until we \ncould reroute the traffic to another carrier. \n\n**The Wireless Code**\nThe CRTC’s decision to implement its wireless consumer code of \nconduct, among other things, effectively requires Canadian wireless \ncarriers to move away from offering three-year service contracts and \ninstead offer two-year contracts, and this could change our customer \nacquisition and retention costs and subscriber churn. The Wireless Code \nalso sets billing caps on data roaming and domestic data overage \ncharges, creates a prohibition on requiring customers to provide 30- \ndays’ notice of cancellation, and requires the payment of interest on \nsecurity deposits, which could also reduce our results of operations. \n\n**Unauthorized Access to Digital Boxes or Internet Modems**\nWe use encryption technology developed and supported by our vendors \nto protect our cable signals from unauthorized access and to control \naccess to programming based on subscription packages. We also use \nencryption and security technologies to prevent unauthorized access to \nour Internet service.", + "page_start": 78, + "page_end": 78, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "entities working for it or cooperating with it, including contractors and subcontractors, \nwhether legal or natural persons, but only for the purpose of their mission for the \ncontracting authority; \n\n(b) if the*result*is a \"document\" such as a report or a study, and it is meant to be published, \nthe existence of*pre-existing materials*in the*result*may not prevent the publication of the \ndocument, its translation or its \"reuse\", it being understood however that the \"reuse\" may \nonly be made of the*result*as a whole and not of the*pre-existing materials*taken separately \nfrom the*result*; for the sake of this provision, \"reuse\" and \"document\" have the meaning \ngiven by the Commission Decision of 12 December 2011 on the reuse of Commission \ndocuments (2011/833/EU). \n\nAll*pre-existing rights*are licensed to the contracting authority from the moment the*results*\nare delivered and approved by the contracting authority. \n\nThe licensing of*pre-existing rights*to the contracting authority under this FWC covers all \nterritories worldwide and is valid for the duration of intellectual property rights protection. \n\nThe payment of the price as set out in the specific contracts is deemed to also include any \nfees payable to the contractor in relation to the licensing of*pre-existing rights*to the \ncontracting authority, including for all forms of exploitation and of use of the*results*. \n\nWhere*implementation of the FWC*requires that the contractor uses*pre-existing materials*\nbelonging to the contracting authority, the contracting authority may request that the \ncontractor signs an adequate licence agreement. Such use by the contractor will not entail \nany transfer of rights to the contractor and is limited to the needs of this FWC. \n\n**II.13.3. Exclusive rights**\n\nThe Contracting Authority acquires the following exclusive rights: \n\n(a) reproduction: the right to authorise or prohibit direct or indirect, temporary or \npermanent reproduction of the*results*by any means (mechanical, digital or other) and \nin any form, in whole or in part; \n\n(b) communication to the public: the exclusive right to authorise or prohibit any display, \nperformance or communication to the public, by wire or wireless means, including the \nmaking available to the public of the*results*in such a way that members of the public \nmay access them from a place and at a time individually chosen by them; this also \nincludes the communication on Internet and broadcasting by cable or by satellite; \n(c) distribution: the exclusive right to authorise or prohibit any form of distribution of \n\n*results*or copies of the*results*to the public, by sale or otherwise; \n\n(d) rental: the exclusive right to authorise or prohibit rental or lending of the*results*or of \n\ncopies of the*results*; \n\n(e) adaptation: the exclusive right to authorise or prohibit any modification of the*results*; \n(f) translation: the exclusive right to authorise or prohibit any translation, adaptation, \narrangement, creation of derivative works based on the*results*, and any other \nalteration of the*results*, subject to the respect of moral rights of authors, where \napplicable; \n\n(g) where the*results*are or include a database: the exclusive right to authorise or prohibit \nthe extraction of all or a substantial part of the contents of the database to another \nmedium by any means or in any form; and the exclusive right to authorise or prohibit \nthe re-utilization of all or a substantial part of the contents of the database by the \ndistribution of copies, by renting, by on-line or other forms of transmission; \n\n(h) where the*results*are or include a patentable subject-matter: the right to register them \n\nas a patent and to further exploit such patent to the fullest extent;", + "page_start": 23, + "page_end": 23, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "In April 2000 the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common shares of the \nC o m p a n y. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 share s \ntook place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt from registration under the \nexemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of pro c e e d s \nto the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in \nthe private placement, the purchaser was issued one warrant to purchase a share of Euronet common stock at a weighted average exercise price of \n$12.50, expiring in each case on the one year anniversary date of the subscription agreement. \n\nIn July 2000 the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. These agre e m e n t s \nw e re signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and \nRegulation D of the Act. Closing with respect to such sale took place on July 14 and August 29, 2000. The purchase price of each share was \n$6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million. \n\nThe Company leases many of its ATMs under capital lease arrangements that expire between 2001 and 2005. The leases bear interest between \n8% and 12% per annum. As of December 31, 2000 the Company owed $11.5 million under such capital lease arrangements. (See Note 15 to the \nConsolidated Financial Statements - Leases.) \n\nThe Company expects that its capital re q u i rements will continue in the future but will not be as great as they were in the past, as the Company \nintends to continue to promote its outsourcing capabilities and re-deploy under- p e rf o rming ATMs currently operating in the network. This \nstrategy should reduce the Company’s reliance on capital expenditures in the future as the business continues to gro w. Fixed asset purchases and \ncapital lease payments for 2001 are expected to be approximately $6.2 million in the Company’s existing markets, notably We s t e rn and Central \nE u rope. Acquisitions of related ATM business and investments in new markets in furtherance of the Company’s strategy may re q u i re additional \ncapital expenditures. \n\nBased on the Company’s current business plan and financial projections, the Company expects to continue to reduce operating losses and net cash \nused in operating activities in 2001. In the Network Services Segment, the Company anticipates that increased transaction levels in its AT M \nnetwork will result in additional revenues without a corresponding increase in expenses. In addition, the Company expects to further expand its \nATM outsourcing services and offer new value-added services, which will provide continued revenue growth without significantly increasing dire c t \noperating expenses or capital investments. In the Software Solutions Segment, the Company expects that the benefits of a re s t ructuring pro g r a m \ncommenced in the first quarter of 2001 will reduce the operating losses and bring operating costs more in line with anticipated revenues. The \nCompany believes that the credit facility, certain asset sales and cash and cash equivalents will provide the Company with sufficient capital until it \nachieves positive cash flow. As a result, the Company believes it has sufficient liquidity re s o u rces to meet current and future cash re q u i rements. \n\nBA L A N C E SH E E T IT E M S", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What is the most restricive Creative Common licence ?", + "target_page": 1, + "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", + "page_start": 33, + "page_end": 33, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**About this**\n**Open Work**\n\n\"Kaleidoscope\" by \ndocoverachiever is \nlicensed under CC \nBY 2.0.", + "page_start": 0, + "page_end": 0, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "*creators*or from any third parties and all the necessary*pre-existing rights*have been \nobtained or licensed. \n\nTo that effect, the contractor must establish a list of all*pre-existing rights*to the*results*of \nthis FWC or parts thereof, including identification of the rights’ owners. If there are no*pre-*\n*existing rights*to the*results*, the contractor must provide a declaration to that effect. The \ncontractor must provide this list or declaration to the contracting authority together with \nthe invoice for payment of the balance at the latest. \n\n**II.13.5. Evidence of granting of pre-existing rights**\n\nUpon request by the contracting authority, the contractor must, in addition to the list \nmentioned under Article II.13.4., provide evidence that it has the ownership or the right \nto use all the listed*pre-existing rights*, except for the rights owned or licensed by the \ncontracting authority. The contracting authority may request this evidence even after the \nend of this FWC. \n\nThis provision also applies to image rights and sound recordings. \n\nThis evidence may refer, for example, to rights to: parts of other documents, images, \ngraphs, sounds, music, tables, data, software, technical inventions, know-how, IT \ndevelopment tools, routines, subroutines or other programs (‘background technology’), \nconcepts, designs, installations or pieces of art, data, source or background materials or \nany other parts of external origin. \n\nThis evidence must include, as appropriate: \n\n(a) the name and version number of a software product; \n(b) the full identification of the work and its author, developer,*creator*, translator, \n\ndata entry person, graphic designer, publisher, editor, photographer, producer; \n(c) a copy of the licence to use the product or of the agreement granting the relevant \n\nrights to the contractor or a reference to this licence; \n\n(d) a copy of the agreement or extract from the employment contract granting the \nrelevant rights to the contractor where parts of the*results*were created by its \n*personnel*; \n\n(e) the text of the disclaimer notice if any. \n\nProvision of evidence does not release the contractor from its responsibilities if it is found \nthat it does not hold the necessary rights, regardless of when and by whom this fact is \nrevealed. \n\nThe contractor also warrants that it possesses the relevant rights or powers to execute the \ntransfer and that it has paid or has verified payment of all due fees including fees due to \ncollecting societies, related to the final*results*. \n\n**II.13.6. Quotation of works in the result**\n\nIn the*result*, the contractor must clearly point out all quotations of existing works. The \ncomplete reference should include as appropriate, the following: name of the author, title \nof the work, date and place of publication, date of creation, address of publication on the \ninternet, number, volume and other information that allows the origin to be easily \nidentified. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 25, + "page_end": 25, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "In which case CC licence can't be used ?", + "target_page": 1, + "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence.", + "page_start": 33, + "page_end": 33, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "advantage to a competitor. Annual \ninvestments in new capabilities, \neducation and continuous improvement help to maintain and improve \nRCI’s security posture. These are focused on protection and prevention, \nrobust detection and advance preparation and planning to help prevent \na potential breach from turning into a crisis. Risk management \nresources continue to be focused in this area. services may be increased from time-to-time as a result of compliance \nwith industry or legislative initiatives to address consumer protection \nconcerns or such Internet-related issues as copyright infringement, \nunsolicited commercial e-mail, cybercrime and lawful access. Our cable, \nwireless and broadcasting licences may not generally be transferred \nwithout regulatory approval. \n\nGenerally, our licences are granted for a specified term and are subject \nto conditions on the maintenance of these licences. These licencing \nconditions may be modified at any time by the regulators. The \nregulators may decide not to renew a licence when it expires, and any \nfailure by us to comply with the conditions on the maintenance of a \nlicence could result in a revocation or forfeiture of any of our licences or \nthe imposition of fines. \n\nWe use standard industry practices for network and information \ntechnology security, survivability and disaster recovery. Our ongoing \nsuccess partly depends on protecting our corporate business-sensitive \ninformation about our customers and \ndata, \nemployees. We treat this information as intellectual property and \nprotect it from unauthorized access and compromise. We rely on our \npolicies and procedures and information technology systems to protect \nthis information. If we do not secure our data and the privacy of our \ncustomer information, we may not be in compliance with regulatory \nstandards and it could result in negative publicity, litigation and damage \nto our \nthese outcomes can cause us to lose \ncustomers or public confidence, or experience financial losses. \n\nincluding personal \n\nThe licences include conditions requiring us to comply with Canadian \nownership restrictions of the applicable legislation. We are currently in \ncompliance with all of \nthese Canadian ownership and control \nrequirements. However, if these requirements are violated, we would \nbe subject to various penalties, possibly including, in the extreme case, \nthe loss of a licence. \n\nreputation. Any of \n\n**Impact of Network Failures on Revenue and Customer Service**\nIf our networks or key network components fail, it could, in some \ncircumstances, result in a loss of service for our customers for an \nindefinite period and have an adverse effect on our results and financial \nposition. We rely on business partners to carry some traffic for some of \nour customers. If one of these carriers has a service failure, it might also \ncause a service interruption for our customers that would last until we \ncould reroute the traffic to another carrier. \n\n**The Wireless Code**\nThe CRTC’s decision to implement its wireless consumer code of \nconduct, among other things, effectively requires Canadian wireless \ncarriers to move away from offering three-year service contracts and \ninstead offer two-year contracts, and this could change our customer \nacquisition and retention costs and subscriber churn. The Wireless Code \nalso sets billing caps on data roaming and domestic data overage \ncharges, creates a prohibition on requiring customers to provide 30- \ndays’ notice of cancellation, and requires the payment of interest on \nsecurity deposits, which could also reduce our results of operations. \n\n**Unauthorized Access to Digital Boxes or Internet Modems**\nWe use encryption technology developed and supported by our vendors \nto protect our cable signals from unauthorized access and to control \naccess to programming based on subscription packages. We also use \nencryption and security technologies to prevent unauthorized access to \nour Internet service.", + "page_start": 78, + "page_end": 78, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "8. Select whether the encryption feature was purchased for this system. In this example, it is \nassumed encryption was not purchased, as shown in Figure 4-14. Click**Next**. \n\n**Note:**If you purchased the encryption feature, you are prompted to activate your \nencryption license manually or automatically. For more information about how to \nactivate your encryption license during the system setup wizard, see Chapter 12, \n“Encryption” on page 603.", + "page_start": 121, + "page_end": 121, + "source_file": "sg247938.pdf" + }, + { + "text": "No trial licenses for encryption exist on the basis that when the trial runs out, the access to \nthe data is lost. Therefore, you must purchase an encryption license before you activate \nencryption. Licenses are generated by IBM Data storage feature activation (DSFA) based on \nthe serial number (S/N) and the machine type and model (MTM) of the control enclosure. \n\nYou can activate an encryption license during the initial system setup (on the Encryption \nwindow of the initial setup wizard) or later on, in the running environment. \n\nContact your IBM marketing representative or IBM Business Partner to purchase an \nencryption license. \n\n**12.3 Activating encryption**\n\nEncryption is enabled at a system level and all of the following prerequisites must be met to \nuse encryption: \n\n(cid:2) You must purchase an encryption license before you activate the function. \n\nIf you did not purchase a license, contact an IBM marketing representative or IBM \nBusiness Partner to purchase an encryption license. \n\n(cid:2) At least three USB flash drives are required if you plan to*not*use a key management \nserver. They are available as a feature code from IBM. \n\n(cid:2) You must activate the license that you purchased. \n\n(cid:2) Encryption must be enabled. \n\nActivation of the license can be performed in one of two ways: \n\n(cid:2) Automatic activation: Used when you have the authorization code and the workstation that \nis being used to activate the license has access to external network. In this case, you must \nenter only the authorization code. The license key is automatically obtained from the \ninternet and activated in the IBM Spectrum Virtualize system. \n\n(cid:2) Manual activation: If you cannot activate the license automatically because any of the \n\nrequirements are not met, you can follow the instructions that are provided in the GUI to \nobtain the license key from the web and activate in the IBM Spectrum Virtualize system. \n\nBoth methods are available during the initial system setup and when the system is in use. \n\n**12.3.1 Obtaining an encryption license**\n\nYou must purchase an encryption license before you activate encryption. If you did not \npurchase a license, contact an IBM marketing representative or IBM Business Partner to \npurchase an encryption license. \n\nWhen you purchase a license, you receive a function authorization document with an \nauthorization code printed on it. This code allows you to proceed using the automatic \nactivation process. \n\nIf the automatic activation process fails or if you prefer the use of the manual activation \nprocess, see this web page to retrieve your license keys. \n\nEnsure that you have the following information: \n\n(cid:2) Machine type (MT) \n(cid:2) Serial number (S/N) \n(cid:2) Machine signature \n\n**609** Chapter 12. Encryption", + "page_start": 630, + "page_end": 630, + "source_file": "sg247938.pdf" + }, + { + "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. \n\n**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Problems with automatic license activation**\nIf connections problems occur with the automatic license activation procedure, the system \ntimes out after 3 minutes with an error. \n\nCheck whether the personal computer that is used to connect to the Storwize V7000 GUI and \nactivate the license can access the internet. If you cannot complete the automatic activation \nprocedure, use the manual activation procedure that is described in 12.3.5, “Activate the \nlicense manually” on page 617. \n\nAlthough authorization codes and encryption license keys use the same format (four groups \nof four hexadecimal digits), you can only use each of them in the appropriate activation \nprocess. If you use a license key when the system expects an authorization code, the system \ndisplays an error message, as shown in Figure 12-16.", + "page_start": 637, + "page_end": 637, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "In how many regions the Republic Services operations are organized ?", + "target_page": 9, + "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally \nmade on a basis intended to reÖect the market value of such services. \n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for \nfurther information.) \n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of \nrevenue-producing vehicles originally placed into service pursuant to an operating lease. \n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity \nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:", + "page_start": 88, + "page_end": 88, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
YearEnded December31,
200420032002
Patients$ 23$ 177.6$
239.6PercentageSpecification154.0
141.0126.1Specification98.4
92.867.4Patients7.0
5.36.1Specifications13.7
12.7__Specificity57.6
178.973.1Specifications8.0
10.411.2.........10.6
6.74.0Specificity2.1
( 1.8 )( 4.8 )tax...
37.8Patients( 27.5 )
− 21.8 )( 13.6 ).........91.8
( 109.4 )( 5.9 )Patients15.3
9.037.1.......( 2.6 )
61.329.4666.3600.5
569.7Patients( 283.8 )( 273.2 )
( 258.6 ).........5.79.1
14.6Specificity( 47.3 )( 51.5 )
( 55.8 ).........3.2
18.9Patients( 3.7 )( 17.6 )
( 2.7 ).........( 21.4 )( 40.0 )
( 32.7 ).........143.8( 182.4 )
( 206.7 )( 552.4 )( 316.3 )
Specification____( 30.0 )
Specificity88.886.396.9
( 252.2 )( 2.6 )( 2.2 )Patients
38.249.129.9Patients
( 266.1 )( 184.2 )( 150.0 ).........
( 46.0 )( 19.0 ).........
( 72.6 )( 437.3 )
( 70.4 )( 128.0 )ENTS22.3
( 22.3 )125.4ERIOD119.2
141.516.1Patients$ 141.5
$ 119.2$ 141.5
\n\nCASH PROVIDED BY OPERATING ACTIVITIES:", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions, except earnings per share data )Year\n
Med Decer1,2004
20__2002REVENUE$ 2.7
708.1
$ 2.517.8$ 2.365.1EXPENSES :Cost of operations
1.714.41.605.41.472.9Depreciation, amortization and depletion
259.4239.1199.6Accretion
13.712.7Selling, general and administrative
268.3247.9238.7Other charges ( income )
( 5.6 )OPERATING INCOME
452.3412.7459.5INTEREST EXPENSE
( 76.7 )( 78.0 )( 77.0 )INTEREST INCOME
6.99.54.3OTHER INCOME ( EXPENSE ), NET
1.23.2_ (. 3 )INCOME BEFORE INCOME TAXES
383.7347.4386.5PROVISION FOR INCOME TAXES
145.8132.0146.9INCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN
ACCOUNTING PRINCIPLES
237.9215.4239.6CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING
PRINCIPLES, NET OF TAX( 37.8 )
NET INCOME
$ __2237.9$ _177.6$ 239.6
BASIC EARNINGS PER SHARE :Before cumulative effect of changes in accounting principles$1.56
$1.341Cumulative effect of changes in accounting principles, net of tax
(. 23 )Basic earnings per share................................................................................................................................
. 56
S1.11SpeciesWeighted average common shares outstanding
152.8160.3165.4DILUTED EARNINGS PER SHARE :
Before cumulative effect of changes in accounting principles$1.53$
1.33$1.44Cumulative effect of changes in accounting principles, net of tax
(. 23 )Diluted earnings per share
$ ___
. 53$1.10$ __1.44
Weighted average common and common equivalent shares outstanding..............................____5.3_
62.1__166.7CASH DIVIDENDS PER COMMON SHARE36
", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Cumulative EÅect**\n**of Changes in**\n**Accounting**\n**Principles** **Balance as of**\n**December 31,**\n**2002** **Balance as of**\n**December 31,**\n**2003** **Acquisitions** **Divestitures**\n\nEastern Region ÏÏÏÏÏÏÏÏ \nCentral Region ÏÏÏÏÏÏÏÏ \nSouthern Region ÏÏÏÏÏÏÏ \nSouthwestern Region ÏÏÏ \nWestern RegionÏÏÏÏÏÏÏÏ $ 429.0 \n343.0 \n323.2 \n134.7 \n314.3 $ 7.2 \n7.5 \n2.6 \n.3 \n3.6 $(.3) \nÌ \nÌ \nÌ \nÌ $ Ì \nÌ \nÌ \nÌ \n(7.0) $ 435.9 \n350.5 \n325.8 \n135.0 \n310.9 \n\nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,544.2 $21.2 $(.3) $(7.0) $1,558.1 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: \n\n\n \n \n \n \n [html]\n
200420032002
$ 655.2$601.2
$530.7737.9
706.0696.7558.1
523.0501.662.2
50.950.8...
2.013.4_1.881.11.779.8
1.031.0967.5854.1
...( 519.8 )( 493.7 )
( 428.5 )...511.2
473.8425.6183.5
\n\n**11. FUEL HEDGE**\n\nDuring June 2001, the Company entered into option agreements for approximately 14.3 million gallons of \nheating oil. Under SFAS 133, the options qualiÑed for and were designated as eÅective hedges of changes in \nthe prices of forecasted diesel fuel purchases. These option agreements settled each month in equal notional \namounts through December 2002. The option agreements were structured as zero-cost collars indexed to the \nprice of heating oil. These option agreements expired in December 2002. In accordance with SFAS 133, \n$1.6 million representing the eÅective portion of the change in fair value for the year ended December 31, \n2002, net of tax, has been recorded in stockholders' equity as a component of accumulated other comprehen- \nsive income. The ineÅective portion of the change in fair value was a gain of approximately $.1 million for the \nyear ended December 31, 2002, and has been included in other income (expense), net in the accompanying \nConsolidated Statements of Income. Realized losses of $.8 million related to these option agreements are \nincluded in cost of operations in the Company's Consolidated Statements of Income for the year ended \nDecember 31, 2002.", + "page_start": 89, + "page_end": 89, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data)**\n\n**1. BASIS OF PRESENTATION**\n\nThe accompanying Consolidated Financial Statements include the accounts of Republic Services, Inc. (a \nDelaware corporation) and its subsidiaries (the \"\"Company''). The Company provides non-hazardous solid \nwaste collection and disposal services in the United States. All intercompany transactions have been \neliminated in consolidation. \n\nAs of January 1, 2003, the Company adopted Statement of Financial Accounting Standards No. 143, \n\"\"Accounting for Asset Retirement Obligations'' (\"\"SFAS 143''). SFAS 143 required the Company to change \nthe methodology it used to record Ñnal capping, closure and post-closure costs relating to its landÑlls. As of \nJanuary 1, 2003, the Company recorded an after-tax expense of $20.8 million, or $33.6 million on a pre-tax \nbasis, as a cumulative eÅect of a change in accounting principle resulting from the adoption of SFAS 143. In \naddition, the Company also recorded an after-tax expense of $17.0 million, or $27.4 million on a pre-tax basis, \nas a cumulative eÅect of a change in accounting principle for its methane gas collection systems. This change \nin accounting for methane gas collection systems was prompted by a thorough evaluation of the Company's \nlandÑll accounting policies in connection with the adoption of SFAS 143 and is consistent with the \nmethodology used by other participants in the waste industry. \n\nThe following table summarizes the adjustments to net income and earnings per share for the year ended \nDecember 31, 2002 as if SFAS 143 and the Company's change in accounting principle relating to its methane \ngas collection systems were eÅective January 1, 2002: \n\n\n \n \n \n \n [html]December 31.2002\n
Net IncomeDiluted Earnings Per Share
Patients$ 239.6$ 1.44
Patients16.2. 10
Table. 8
Patients( 6.5 )(. 04 )
.....( 10.9 )− 07 )
Patients(. 4 )− 01 )
Patients. 3
.....( 2.3 )− 0.01 )
Patients( 2.0 )− 01 )
.....$ 237.2$ 1.42
", + "page_start": 64, + "page_end": 64, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "made to our people and service communities. \n\nThe last year was indeed an outstanding one for Republic. Our goal is to continue to deliver \n\nimpressive results in 2005. \n\nI am both privileged and grateful to have the opportunity to lead a team of such exceptional people. \n\nEveryday, I grow more impressed with the experience, knowledge, loyalty and hard work they \n\ncontribute. Republic truly has one of the best management and operations teams in America. \n\nOn behalf of all of us at Republic, I want to thank our shareholders for the trust they have placed in \n\nus. We are a Company that cares about you, and we pledge to continue working hard to serve you in \n\n2005 and beyond. \n\nSincerely, \n\n\n\nAs I thought about these achievements, I realized they result from the environment that we work to \n\ncreate for both our customers and our people. We care about our customers and the communities we \n\nserve. About our people. About the environment. And, of course, we care about you -- our \n\nshareholders. Every year we adopt a theme that captures our Company and our values. Our theme \n\nfor 2005 is “Republic Services…A Company that cares”. \n\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we \n\ndeliver our services, increasing our efficiency in routing our collection trucks. We improved the way \n\nwe construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to \n\ncontrol prices. And, we communicated to our customers the value of the services we offer. This year \n\nwill be no different. We will continue to concentrate on these fundamentals. \n\nRepublic’s future is bright. We are mindful of our mission. We know our business exists to ease the \n\nburden of managing society’s waste. It’s not a glamorous business, but it is an essential one, and we \n\ntake this responsibility very seriously. \n\nAt the end of the year, Republic had 140 collection companies, 58 landfills, 96 transfer stations and 35 \n\nrecycling facilities in 22 states. These resources give us many opportunities to listen to our customers, \n\nanticipate their needs and quickly respond to them. Each customer faces challenges unique to his or \n\nher business and community. Our goal is to remain flexible and to tailor our services to each \n\ncustomer.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON THE FINANCIAL STATEMENTS**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and \nsubsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, \nstockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits \nalso included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements \nand schedule are the responsibility of the Company's management. Our responsibility is to express an opinion \non these Ñnancial statements and schedule based on our audits. \n\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether the Ñnancial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An \naudit also includes assessing the accounting principles used and signiÑcant estimates made by management, as \nwell as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable \nbasis for our opinion. \n\nIn our opinion, the Ñnancial statements referred to above present fairly, in all material respects, the \nconsolidated Ñnancial position of Republic Services, Inc. and subsidiaries at December 31, 2004 and 2003, and \nthe consolidated results of their operations and their cash Öows for each of the three years in the period ended \nDecember 31, 2004 in conformity with U.S. generally accepted accounting principles. Also, in our opinion, the \nrelated Ñnancial statement schedule, when considered in relation to the basic Ñnancial statements taken as a \nwhole, presents fairly in all material respects the information set forth therein. \n\nAs discussed in Note 1 to the Ñnancial statements, in 2003 Republic Services, Inc. changed its method of \naccounting for Ñnal capping, closure and post-closure costs relating to its landÑlls and for methane gas \ncollection systems. \n\nWe also have audited, in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States), the eÅectiveness of Republic Services, Inc.'s internal control over Ñnancial reporting \nas of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by \nthe Committee of Sponsoring Organizations of the Treadway Commission and our report dated February 24, \n2005, expressed an unqualiÑed opinion thereon. \n\n\n \n \n \n \n [html]\n
Fort Lauderdale, Florida February 24.2005TableTableTable
TableTableTableTable
TableTableTableTable
TableTableTableTable
Table51
", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\nUnconditional purchase commitments consist primarily of commitments to purchase collection vehicles \nand long-term disposal agreements that require the Company to dispose of a minimum number of tons at third \nparty facilities. \n\n**Liability Insurance**\n\nThe Company carries general liability, vehicle liability, employment practices liability, pollution liability, \ndirectors and oÇcers liability, worker's compensation and employer's liability coverage, as well as umbrella \nliability policies to provide excess coverage over the underlying limits contained in these primary policies. The \nCompany also carries property insurance. \n\nThe Company's insurance programs for worker's compensation, general liability, vehicle liability and \nemployee-related health care beneÑts are eÅectively self-insured. Claims in excess of self-insurance levels are \nfully insured subject to policy limits. Accruals are based on claims Ñled and estimates of claims incurred but \nnot reported. \n\nDuring 2003, the Company experienced an increase in expense associated with self-insurance. This \nincrease was attributable to the expansion of the Company's operations and various changes in estimates as a \nresult of continued negative trends through the 2003 policy year, based upon recent actuarial claims \nexperience, expected claims development and medical cost inÖation. \n\nThe Company's liabilities for unpaid and incurred but not reported claims at December 31, 2004 was \n$143.8 million under its current risk management program and are included in other current and other \nliabilities in the accompanying Consolidated Balance Sheets. While the ultimate amount of claims incurred \nare dependent on future developments, in management's opinion, recorded reserves are adequate to cover the \nfuture payment of claims. However, it is reasonably possible that recorded reserves may not be adequate to \ncover the future payment of claims. Adjustments, if any, to estimates recorded resulting from ultimate claim \npayments will be reÖected in results of operations in the periods in which such adjustments are known. \n\n**Guarantees of Subsidiary Debt**\n\nThe Company has guaranteed the tax-exempt bonds of its subsidiaries. If a subsidiary fails to meet its \nobligations associated with tax-exempt bonds as they come due, the Company will be required to perform \nunder the related guarantee agreement. No additional liability has been recorded for these guarantees because \nthe underlying obligations are reÖected in the Company's Consolidated Balance Sheets. (For further \ninformation, see Note 5, Debt). \n\n**Restricted Cash and Marketable Securities, and Other Financial Guarantees**\n\nIn the normal course of business, the Company is required by regulatory agencies, governmental entities \nand contract parties to post performance bonds, letters of credit and/or cash deposits as Ñnancial guarantees of \nthe Company's performance. At December 31, 2004, letters of credit totaling $489.8 million were outstanding, \nand surety bonds totaling $392.2 million were outstanding, which will expire on various dates through 2015.", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Amazon has many regions all across the globe. Inside each region, there are one or more \n\nAvailability Zones located tens of miles apart. The distance is near enough for low latency — \n\nthe gap between requesting and receiving a response, and far enough to reduce the chance that \n\nmultiple zones are affected if a disaster happens. \n\nEach region is identified by a code, such as \"us-west-1\", \"us-east-1\" or \"eu-west-2\". Within each \n\nregion, the multiple isolated locations known as*Availability Zones*or AZs are identified with the \n\nregion code followed by a letter identifier. For example, us-east-1a. AWS handles deploying to \nmultiple availability zones within a region for resilience. \n\n**Amazon Resource Name (ARN)**\n\nServices are identified with regional endpoints. The general syntax of a regional endpoint is as \n\nfollows: \n\nFor example, https://dynamodb.us-west-1.amazonaws.com is the endpoint for the Amazon \nDynamoDB service in the US West (N. California) Region. \n\nThe region code is also used to identify AWS resources with Amazon Resource Names, also called \n\n\"ARNs\". Because AWS is deployed all over the world, ARNs function like an addressing system to \n\nprecisely locate which specific part of AWS we are referring to. ARNs have a hierarchical structure:", + "page_start": 17, + "page_end": 17, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", + "target_page": 12, + "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "U S I N G O U R S T R E N G T H... \n\n\n\n\n\n\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**%**\n**4.9**\n**1**\n\n**KÀ**The most spectacular production ever, by a troupe renowned for its \npageantry. Cirque du Soleil’s KÀ debuted at a new theatre at MGM Grand \nin the fourth quarter of 2004. \n\n**BELLAGIO**underwent a significant expansion during 2004 result- \ning in the opening of the Spa Tower and several important new \namenities at this AAA Five Diamond property. Bellagio remains \nLas Vegas’ first and only hotel-casino to receive this prestigious \nrecognition. These new additions add dimension and depth to the \nworld-famous experience awaiting guests at Bellagio. \n\n**MGM GRAND LAS VEGAS**completed a transformation, begun \nin 2003, of its food and beverage and entertainment offerings. \nMGM Grand is one of the must-see attractions of \n\nLas Vegas, with Cirque du Soleil’s newest pro- \nduction, KA`TM, and several of the Strip’s \nfinest restaurants and hottest nightspots. \n**1**\n**8**\n**.0**\n**%**\n\n**TI**’s transformation was no less extensive, \nas the property’s management team \n\n**47.6%**\n**9 . 5 %**\n**14.9 %**\n\n**1**\nconceived and implemented a program to \nenliven the property with new restaurants \nand nightlife. **%**\n**0**\n\n**THE MIRAGE**was the site of a revolution in \nLas Vegas’ history as the venerable buffet was given \nnew life as a top dining establishment, Cravings. \n2004 Revenue Mix \nOthers may follow this lead, but The Mirage was \nthe first property to breathe new life into what \nremained of the last bastion of “old” Las Vegas. \n\nThese investments in your company’s future paid \ndividends even before the year was out. We established a \nnew record for net revenues posting $4.2 billion, a 10% \nincrease over 2003. \n\nYour company’s resorts produced record EBITDA of \n$1.46 billion, an increase of 23% over 2003, while operating \nincome was $951 million, an increase of 36%, with record \nresults at Bellagio, MGM Grand Las Vegas and Beau Rivage. \n\nDefining Momentum in the Community \nI’ve spent 27 years in this profession and the \nincredible generosity of our employees never \nceases to amaze me. Shortly after the merger \nwith Mirage Resorts in 2000, we established \nthe Voice Foundation. This allows employees to \nexpress themselves in the communities we serve by \n\n**4 7 . 6 %**\n**19 . 5 %**\n\nproviding them a mechanism to raise monies for \n**.**\n**8**\n**1**\n\nworthy causes. It’s their money and they decide \nwhere it goes. Your company provides the marketing \nand administrative support. \n\nCasino \nRooms \nFood & Beverage \nEntertainment, Retail, \n& Other \nIn each year since we established the program, \nemployees have given record amounts to support a \n\n\n\n\n\n\n\n**SKYLOFTS**MGM Grand \nA private sanctuary of sleek, \nelegant two-story accommo- \ndations, offering discerning \nguests the quintessential loft \nenvironment - harmonizing \ndesign, décor, ambiance and \nunparalleled vistas. \n\n**TEATRO**MGM Grand A new \ngenre of Las Vegas nightlife \nwhere European club influ- \nences permeate. DJs spin jazz/ \nhouse throughout the evening, \ngiving way to an energetic \nafter-hours vibe with live cat- \nwalk entertainment.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "o some, momentum is intangible – a product of fortune, a power that cannot be harnessed, and typically \na short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are con- \nstantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, \n\nT \n\na force which can be observed and measured, and something that can be a lasting and defining quality of a great \ncompany. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long \nbeen designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add \nvalue to our shareholders, we are able to redefine our Company’s place in history every year – and 2004 was a defin- \ning time even by our exacting standards. \n\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which \n\nwe operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of \nour 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a \nrecord $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time \nrecord, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market \nobserver, and significantly beat our forecasts. And 2004 will not be a zenith year for your company – rather, we \nexpect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth \nand move forward to new defining moments. \n\n\n\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our \n\nvision for our existing resorts – to continually evolve and increase the “Wow!” factor for our guests. This strategy \nrequires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include \nthe beautiful Spa Tower at Bellagio and*KÀ*, the latest spectacular creation in collaboration with Cirque du Soleil. \n\n**JAMES J. MURREN**President, CFO & Treasurer \n\n\n\n\n\n\n\n\n\n\n\n**GLENN BONNER**Senior VP & CIO, \nMGM MIRAGE Information Systems **GEORGE R. BOYER III**President, \nMGM Grand Detroit **JOSEPH BRUNINI**President, \nMGM Grand Resorts National Marketing \n**JEFF DAHL**President, Beau Rivage", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "(from left to right)**KENNETH ROSEVEAR**President, MGM MIRAGE Development;**JOHN T. REDMOND**President & CEO, MGM Grand Resorts, LLC; \n**J. TERRENCE LANNI**Chairman & CEO, MGM MIRAGE;**ROBERT H. BALDWIN**President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; \n**GARY N. JACOBS**Executive Vice President, General Counsel & Secretary, MGM MIRAGE;**JAMES J. MURREN**President, CFO & Treasurer, MGM MIRAGE \n\nAs exciting as 2004 was, our momentum will carry us \n\n\n\nto even greater achievements in 2005 and beyond. \n\n**J. TERRENCE LANNI**\nChairman of the Board & Chief Executive Officer \nMarch 31, 2005 \n\nwide array of community needs. From homeless shelters to \nafter-school programs, MGM MIRAGE employees have \ngenerously donated more than $8 million since 2001. \n\nYour company also sets aside a portion of its profits \neach year to be given to important programs intended to \nbuild stronger communities. Since 2001, your company has \ngiven more than $18 million to support such programs. \n\nDefining Momentum in Our Family \n\nOur momentum is driven from within by acknowledging \n\nthe contributions of each and every one of our employees, \nbusiness partners and customers. Our commitment to \ndiversity is recognition of the fact that in today’s ever- \nchanging marketplace, we must reflect that which we see \nin the world around us. \n\nThis commitment should be seen as a common- \n\nsense business decision. That said, we are proud of \nthe recognition our Diversity program has received, \nincluding accolades from prestigious media such as \n*Fortune*and*DiversityInc.*magazines. Defining Momentum in the Future \n\nYour company achieved many business goals in 2004 Since formalizing our program only four years ago, \n\nand set in motion plans for future growth. These initiatives \nwill provide unmatched returns. We have also created unri- \nvaled opportunities for our employees and will continue \nour rich history of strengthening the communities in which \nwe do business. we’ve made enormous strides. There is still progress to \nbe made and your company has the momentum to \nremain at the forefront on diversity initiatives, provid- \ning yet another advantage for sustaining performance in \nthe long term. \n\n**JEAN-PHILIPPE PATISSERIE**\nBELLAGIO A mesmerizing \nfountain of cascading liquid \nchocolate showcases a splen- \ndid selection of chocolates, \ncakes, crêpes, salads and \nsandwiches. \n\n\n\n\n\n\n\n**SENSI**BELLAGIO An \neclectic menu features \ndiverse cuisines in an \nearthy arena replete with \nwaterfalls and chrome. A \nbold wine list complements \nChef Martin Heierling’s \nsumptuous work.", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "S E T T I N G T H E F U T U R E I N M O T I O N \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n\n**hile the international opportunities for growth remain to be fully defined,**\n**in 2004 MGM MIRAGE entered into a joint venture agreement with**\n**Pansy Ho Chiu-king to develop, build and operate a major hotel-casino**\n**resort in Macau S.A.R. No other international market has shown its ability to sustain**\n**improved growth even as the government takes important steps to modernize its regu-**\n**latory structure. We have methodically moved through the regulatory process and look**\n**forward to initiating construction in 2005 and opening in 2007.**\n\n**We continue to monitor and pursue opportunities as they arise in the United**\n**Kingdom. The bill modernizing British gaming law has moved steadily through the**\n**legislative process throughout the year. Several key issues are yet to be resolved, but we**\n**remain hopeful that Great Britain will become one of the world’s leading jurisdictions**\n**with significant growth opportunities for decades to come.**\n\n**We are also excited about the emergence of possible new jurisdictions in the Far**\n**East. We plan to pursue additional development opportunities as they become avail-**\n**able, as we believe that the Far East holds considerable promise as a growing gaming market.**\n\n\n\n\n\n\n\n\n\n\n\n**THE RESIDENCES**\n**AT MGM GRAND Our joint**\n**venture with Turnberry Associates**\n**to build luxury condo/hotels ignited**\n**a flurry of development in Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**MGM GRAND MACAU Our joint venture has secured**\n**a prime location to develop and construct an exciting**\n**addition to this dynamic gaming destination.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n**Domestically, we are selectively expanding our presence as well, moving into mar-**\n\n**kets and business lines where our superior brands and assets can provide the best**\n**returns. In Las Vegas we will maximize the use of our vast land holdings, beginning**\n**with The Residences at MGM Grand. This unique venture is a breakthrough combina-**\n**tion of a hotel and condominiums – the first of its kind in Las Vegas. In Atlantic City, we**\n**own an exceptional site for future development. The already successful Borgata is pre-**\n**pared to grow bigger and better. Expansion plans include more casino space, a new hotel**\n**tower, more restaurants, retail outlets and an expanded spa.**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "But the bricks and mortar tell only part of the story \nof this transaction. At the heart of Mandalay is its people. \nMandalay employees at all levels are energetic and talented \nand will be a tremendous asset to us. Together, we will become \na family in excess of 70,000 people committed to delivering \nthe best possible experiences for our guests. The transaction \nalso will create unparalleled opportunities for our entire family \nof employees. \n\nIn short, this groundbreaking transaction creates \n\nunstoppable momentum for all stakeholders in the \nMGM MIRAGE family. \n\nDefining Momentum in our Properties \n\nIn 2004, your company invested over $690 million of \ncapital in the creation of new restaurants, clubs, shows and \nnightspots as well as the development of strategic enhance- \nments to existing amenities. These investments generated \nexceptional returns in a time when competition for the \nentertainment dollar has never been higher. \n\nDefining Momentum for Our Industry \n\nThe gaming industry in America is maturing, and \ninternational expansion, while exciting in select markets, \nremains challenging. As a result, your company has \npursued a growth strategy that calls for maximizing the \nassets we currently own and seeking prudent development \nopportunities and strategic acquisitions. \n\nUpon completion of our merger with Mandalay, \nMGM MIRAGE will be the world’s leading gaming and \nleisure company. The combination will result in a well- \ncapitalized company uniquely situated to invest in its \ncurrent portfolio in addition to creating new projects \nin the United States and around the world. \nWe believe this is an outstanding \n\ntransaction for the shareholders of \nboth companies. With this \nacquisition, we will own, \noperate and have investments \nin 28 properties throughout Nevada, Mississippi, \nIllinois, Michigan, and New Jersey. \n\nThe combined company will have an asset portfolio \nwhich includes some of the most widely recognized brand \nnames in the world. These properties cater to a broad \ncustomer base, ranging from value-oriented to the ultra- \nhigh end. Each resort provides a unique customer experience \nthrough its specific personality and combination of amenities. \n\n\n\n**FIX**BELLAGIO Classic \nAmerican fare using the \nfreshest fish, meat, and \npoultry cooked to order on \na wood-burning grill. Costa \nRican Padouk wood inspires \na warm environment in a \nunique, vibrant design. \n\nE \nR \nA \nH \nS \n**2 0 0 4** $2.85 \n\nR \nE \nP $1.61 **2 0 0 3**\n\nS \nG \nN \n**2 0 0 2**\nI \n\nN \nR \nA \nE 0 \n5 0 \n0 0 \n5 0 \n0 0 \n5 0 \n0 0 \n0 \n. . . . . . . \n0 \n$ 1 \n$ 1 \n$ 2 \n$ 2 \n$ 3 \n$ 0 \n$ \n\n\n\nWe also will have at Mandalay Bay the fifth largest \nconvention center in the United States, providing the com- \npany with a great resource to further develop the business \ntravel and convention market.", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**MANDALAY RESORT GROUP**\n**AND MGM MIRAGE ANNOUNCE**\n**MERGER.**Mandalay Resort \nGroup will add iconic resorts and \ngreat people to our family. We \nwill own 832 acres in the heart \nof Las Vegas, the fastest growing \ncity in the United States. \n\n**BELLAGIO ADDS A JEWEL TO THE**\n**FAMILY CROWN.**The Mirage Resorts \nmerger provided outstanding resorts, \npeople and land, and has propelled our \nearnings and provided an unparalleled \nplatform for future growth. \n\n\n\n**20**\n\n09 \n\n**BORGATA CHANGES THE FACE OF ATLANTIC CITY.**\nBorgata is launched in Atlantic City with our joint-venture \npartner Boyd Gaming. Borgata has been a tremendous success, \nraising the bar for casino entertainment in that market.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Recently, we opened the SKYLOFTS, a new level of luxury \nfor guests atop MGM Grand Las Vegas. \n\nWe’ll follow the success of these new resort features \nwith a category-defining new nightclub at The Mirage, two \nfabulous restaurants by Joël Robuchon at MGM Grand Las \nVegas and gaming upgrades company-wide. Second, we are \ndoubling down on Las Vegas by merging with Mandalay, \na company we have long admired. The Mandalay merger \nrepresents a tremendous opportunity to build on the mo- \nmentum established by Mike Ensign and his team. And \nthird, we are dreaming of a not-so-distant future, when \n\nProject CityCenter will literally redefine the Las Vegas Strip \nand change the face of Las Vegas forever. \n\nMandalay in Motion \n\nWe are incredibly excited to begin our journey with the \n\ntalented people of Mandalay, as we work to maximize the \nvalue of Mandalay’s instantly recognized brands and world- \nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts \nwill add to our premium portfolio and allow us to accelerate \nthe pace of our growth. Our hotel people will be able to mar- \nket a wider range of rooms and benefit from a world-class \n\nconvention center. Our casino marketing people will be able \nto offer their customers wonderful new amenities to expand \nour market reach. And our development people will be able \nto maximize the potential of priceless Las Vegas Strip land. \nThe Mandalay merger represents another defining \nmoment for MGM MIRAGE, much like the Mirage Resorts \ntransaction in 2000, at a time when Las Vegas is in a state of \nastounding metamorphosis. No company is better positioned \nto help shape the future of Las Vegas than MGM MIRAGE. \nWe employ more people, invest more money and hold more \nprime real estate than any other company in Las Vegas. The", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "“Your company has undergone several defining moments throughout its history.” \n\nF \nrom its roots some 35 years ago with the opening \nof the International Hotel, we have played a \nleading role in continuously redefining the Las \n\nVegas experience. \n\nment will come in the months ahead, I am pleased to tell \nyou that we have secured the services of the internationally \nacclaimed architect Cesar Pelli to design our anchor resort \nat the heart of Project CityCenter. \n\nWe announced two significant initiatives in 2004 that, \ntaken together, give your company unrivaled momentum \nto set industry standards for creativity, performance and \nresponsibility for decades to come. Cesar Pelli & Associates has worked with corporate, \n\ngovernment and private clients to design major public \nspaces, museums, airports, research centers, performing arts \ncenters, academic buildings, hotels, office and residential \ntowers and mixed-use projects. \n\nand our plans to develop Project CityCenter on the Las \nVegas Strip are among the most significant announcements \nin Las Vegas history. As this fabled city begins its second \nhundred years, MGM MIRAGE is positioned like no other \ncompany to take advantage of unsurpassed growth oppor- \ntunities in the most dynamic gaming and entertainment \nmarket in the world. \n\nThe work of Cesar Pelli is not constrained by a personal \nstyle or a signature that would limit his architecture; instead, \nit celebrates the unique characteristics of each project. Using \nthis approach, he has designed several exceptional buildings \nin the United States and abroad. \n\n\n\n\n\n\n\n\n\n\n\n**BELLAGIO SPA TOWER**\nThe quintessential luxury \nhotel is now even more \nopulent. This expansion \nincludes 928 rooms and \nsuites, 80,000 square feet \nof convention space, retail \noutlets, and restaurants. \n\nWe are very excited about our partnership with Mr. \n\nPelli and his colleagues and believe they will deliver for \nMGM MIRAGE and the residents of Southern Nevada \na building of iconic stature around the world. \n**J. TERRENCE LANNI**Chairman & Chief Executive Officer \n\n**SHIBUYA**MGM GRAND \nDesigned by superstar team \nYabu Pushelberg, Shibuya \nfeatures stellar sushi and the \nwidest sake selection this \nside of the Pacific, all served \nin a sleek, airy ambiance. \n**CRAVINGS**THE MIRAGE \nThe zenith of all-you-can-eat. \nDesigned by Adam Tihany, Cravings \nboasts 11 cooking stations, a \nstreet of unique restaurants, \nand an array of temptations in \nwhat’s unquestionably the ultimate \nbuffet dining experience.", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**19**\n\n93 \n\n**THE NEW YORK-NEW YORK SKYLINE BECOMES**\n**A TOWERING PRESENCE IN THE PORTFOLIO.**\nWe acquired Primadonna Resorts to gain full \nownership of the spectacular New York-New York \nas well as three hotel-casinos on the Nevada state \nline and two championship golf courses. \n\n\n\n\n\n\n\n**IT ALL BEGINS WITH MGM GRAND.**MGM Grand, \nthe largest hotel-casino in the world, opened to \ngreat fanfare. “The City of Entertainment” \nredefined the urban resort and provided the \nfoundation for our company’s momentous growth.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", + "target_page": 21, + "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**ENTERTAINMENT**\n**From street performers**\n**to Broadway shows,**\n**our entertainment will**\n**evoke the best of New**\n**York or London.**\n**RESIDENTIAL In lofts, brown-**\n**stones and high-rise buildings,**\n**residential options abound to**\n**populate the new city and ener-**\n**gize the surrounding areas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n**e have been working for some time on con-**\n**ceiving the best use of the 66 acres between**\n**Monte Carlo and Bellagio, the most signifi-**\n\n**cant piece of undeveloped land remaining on the Las**\n**Vegas Strip. We certainly could have come up with a**\n**spectacular casino-hotel. But, the truth is, Las Vegas is**\n**ready for so much more.**\n\n\n\n**PROJECT CITYCENTER**\nInterstate 15 \n\no \ng \nn \nm \na \nl \nF \n**MONTE**\n**CARLO**\ni \n**BELLAGIO**\n**THE**\n**MIRAGE**\n\n**TI**\nLas Vegas Blvd. \n\n**N**\n**MGM GRAND**\n\n\n\na \nn \na \nc \ni \np \no \nr \nT \n**NY/NY**\n\n**THE RESIDENCES**\n**AT MGM GRAND**\n\n**Project CityCenter represents a new era of the**\n\n**urban complex, one that encompasses tourism,**\n**entertainment, gaming, retail and residential elements.**\n**Only MGM MIRAGE has the momentum – financially,**\n**intellectually and professionally – to effectively develop**\n**such a project.**\n\n**The signature building within Project CityCenter**\n\n**As the city eclipses two million residents on its way**\n\n**is the 4,000-room hotel-casino. The internationally**\n**acclaimed architect Cesar Pelli has been commissioned**\n**to design this iconic structure. Pelli’s initial concept**\n**drawing defines a new generation of urban landscape for**\n**the Las Vegas Strip, one which includes gaming at its**\n**economic center but not as an emotional centerpiece.**\n**Project CityCenter will provide the momentum** **to passing three million by the end of the decade, and**\n**with land prices on the Strip soaring, it has become**\n**clear that there is a much better and higher use**\n**for this location. As Las Vegas marks its Centennial,**\n**Project CityCenter stands as a defining moment for**\n**development in this fabled city.**\n\n**for the next era of amazing growth for your company**\n**and Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nn \n\ni \na \nt \nn \nu \no \nM \ng \nn \ni \nr \np \nS", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TableTable
Tableof
\n\n**Future Developments**\n**Project CityCenter.**In November 2004, we announced a plan to develop a multi- \nbillion dollar urban metropolis, initially called Project CityCenter, on 66 acres of \nland on the Las Vegas Strip, between Bellagio and Monte Carlo. We anticipate that \nthe first phase of Project CityCenter will include a 4,000-room casino resort, three \n400-room boutique hotels, approximately 550,000 square feet of retail shops, \ndining and entertainment venues, and 1,650 units of luxury condominium, \nhotel/condominium and private residence clubs. \n\nWe expect that the complete design work for Project CityCenter will take 18 \nmonths and that the first phase will open in 2009. The design, budget and schedule \nof Project CityCenter are still preliminary however, and the ultimate timing, cost \nand scope of Project CityCenter are subject to risks attendant to large-scale projects. \n\n**Atlantic City, New Jersey.**We own approximately 130 acres on Renaissance Pointe \nin Atlantic City, New Jersey. In addition, Borgata occupies 29 acres at Renaissance \nPointe, including 27 acres it owns and two acres we lease to Borgata. Of the \nremaining land, approximately 95 acres are suitable for development, and a portion \nof these acres consists of common roads, landscaping and master plan improve- \nments which we designed and developed as required by our agreement with Boyd. \n\nIn October 2002, we announced the suspension of our development activities on our \nwholly-owned project on the Renaissance Pointe land in Atlantic City. We must \napply for and receive numerous governmental permits and satisfy other conditions \nbefore construction of a new resort on the Renaissance Pointe site could begin. No \nassurance can be given that we will develop a casino resort in New Jersey, or its \nultimate schedule, size, configuration or cost if we do develop a casino resort. \n\n**Detroit, Michigan.**MGM Grand Detroit, LLC, in which we hold a controlling \ninterest, has operated an interim casino facility in Detroit, Michigan since July 1999. \nIn August 2002, the Detroit City Council approved revised development agreements \nwith us and two other developers. The revised development agreement released us and \nthe City from certain of the obligations under the original agreement and significantly \nchanged other provisions of the original agreement. We are currently in the process of \nobtaining land and developing plans for the permanent facility. The design, budget \nand schedule of the permanent facility are not finalized, and the ultimate timing, cost \nand scope of the facility are subject to risks attendant to large-scale projects. \n\nThe ability to construct the permanent casino facility is currently subject to resolu- \ntion of the Lac Vieux litigation. The 6th Circuit Court of Appeals has issued an \ninjunction prohibiting the City and the developers from commencing construction \npending further action of the 6th Circuit Court. Therefore, we do not know when \nwe will be able to commence construction of, or complete, the permanent facility.", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Our growth strategy calls \nfor prudent and strategic \ndevelopment of our real \nestate assets to maximize \nshareholder value. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**ATLANTIC CITY LAND/BORGATA EXPANSION Our prime real**\n**estate in Atlantic City, in a location we defined as Renaissance**\n**Pointe, holds spectacular promise to expand MGM MIRAGE’s market**\n**presence on the East Coast.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKÀTM by Cirque du Soleil®", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "S E T T I N G T H E F U T U R E I N M O T I O N \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n\n**hile the international opportunities for growth remain to be fully defined,**\n**in 2004 MGM MIRAGE entered into a joint venture agreement with**\n**Pansy Ho Chiu-king to develop, build and operate a major hotel-casino**\n**resort in Macau S.A.R. No other international market has shown its ability to sustain**\n**improved growth even as the government takes important steps to modernize its regu-**\n**latory structure. We have methodically moved through the regulatory process and look**\n**forward to initiating construction in 2005 and opening in 2007.**\n\n**We continue to monitor and pursue opportunities as they arise in the United**\n**Kingdom. The bill modernizing British gaming law has moved steadily through the**\n**legislative process throughout the year. Several key issues are yet to be resolved, but we**\n**remain hopeful that Great Britain will become one of the world’s leading jurisdictions**\n**with significant growth opportunities for decades to come.**\n\n**We are also excited about the emergence of possible new jurisdictions in the Far**\n**East. We plan to pursue additional development opportunities as they become avail-**\n**able, as we believe that the Far East holds considerable promise as a growing gaming market.**\n\n\n\n\n\n\n\n\n\n\n\n**THE RESIDENCES**\n**AT MGM GRAND Our joint**\n**venture with Turnberry Associates**\n**to build luxury condo/hotels ignited**\n**a flurry of development in Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**MGM GRAND MACAU Our joint venture has secured**\n**a prime location to develop and construct an exciting**\n**addition to this dynamic gaming destination.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n**Domestically, we are selectively expanding our presence as well, moving into mar-**\n\n**kets and business lines where our superior brands and assets can provide the best**\n**returns. In Las Vegas we will maximize the use of our vast land holdings, beginning**\n**with The Residences at MGM Grand. This unique venture is a breakthrough combina-**\n**tion of a hotel and condominiums – the first of its kind in Las Vegas. In Atlantic City, we**\n**own an exceptional site for future development. The already successful Borgata is pre-**\n**pared to grow bigger and better. Expansion plans include more casino space, a new hotel**\n**tower, more restaurants, retail outlets and an expanded spa.**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**MANDALAY RESORT GROUP**\n**AND MGM MIRAGE ANNOUNCE**\n**MERGER.**Mandalay Resort \nGroup will add iconic resorts and \ngreat people to our family. We \nwill own 832 acres in the heart \nof Las Vegas, the fastest growing \ncity in the United States. \n\n**BELLAGIO ADDS A JEWEL TO THE**\n**FAMILY CROWN.**The Mirage Resorts \nmerger provided outstanding resorts, \npeople and land, and has propelled our \nearnings and provided an unparalleled \nplatform for future growth. \n\n\n\n**20**\n\n09 \n\n**BORGATA CHANGES THE FACE OF ATLANTIC CITY.**\nBorgata is launched in Atlantic City with our joint-venture \npartner Boyd Gaming. Borgata has been a tremendous success, \nraising the bar for casino entertainment in that market.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "In 2004, there were no material unusual property transactions. In 2003, we sold 315 \nacres of land in North Las Vegas, Nevada near Shadow Creek for approximately \n$55 million, resulting in the $37 million gain reflected above. Prior to 2003, we \nclassified gains and losses on routine assets sales or disposals as a non-operating item at \nsome resorts and as an operating item at other resorts. We believe the preferable pres- \nentation of these items is as an element of operating income. Prior period statements \nhave not been reclassified as such transactions were not material in periods prior to \n2003. Until 2003, demolition costs were typically capitalized as part of new construc- \ntion. We began expensing demolition costs on major construction projects as incurred \non January 1, 2003, and are accounting for this change in policy prospectively. \nDemolition costs were not material in periods prior to 2003. Demolition costs in \n2004 and 2003 related primarily to preparation for the Bellagio standard room \nremodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments \nof assets to be disposed of in 2003 consisted primarily of assets related to the former \nEFX! show and restaurants closed during 2003 at MGM Grand Las Vegas. \n\nInterest cost was higher in 2004 as we had a higher average borrowing rate due to \nincreases in variable interest rates and the issuance of significant fixed rate debt in \nthe second half of 2004 in anticipation of the Mandalay merger. \n\nCapitalized interest increased in 2004 due to the ongoing Bellagio expansion and \n*KÀ*theatre projects. Capitalized interest in 2005 will include interest capitalized on \nProject CityCenter. Capitalized interest decreased in 2003 due to the suspension of \ndevelopment in Atlantic City in late 2002 and the mid-2003 cessation of interest cap- \nitalization on the Company’s investment in Borgata, which opened on July 3, 2003. \n\nNon-operating items from unconsolidated affiliates, primarily our share of Borgata’s \ninterest expense and state income taxes, increased from $10 million in 2003 to", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "of Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of \nBorgata and also operates the resort. Borgata opened in July 2003. The Company \nowns approximately 95 developable acres adjacent to Borgata, a portion of which \nconsists of common roads, landscaping and master plan improvements which the \nCompany designed and developed as required under the agreement with Boyd. \n\nUntil July 2004, the Company owned and operated MGM Grand Australia and \nuntil January 2004, the Company owned and operated the Golden Nugget Las \nVegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin, \nNevada (the “Golden Nugget Subsidiaries”). Until June 2003, the Company \noperated PLAYMGMMIRAGE.com, the Company’s online gaming website based \nin the Isle of Man. See Note 3 for further information regarding these discontinued \noperations. In the second quarter of 2002, the Company received proceeds of $11 \nmillion upon termination of management agreements covering four casinos in the \nRepublic of South Africa. Prior to the termination, the Company managed three \npermanent casinos and one interim casino and received management fees from its \npartner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as \npart of other revenues in the accompanying consolidated statements of income. \n\n**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. \n\nThe Company is actively seeking future development opportunities in the United \nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos \nLimited, a United Kingdom gaming company which operates a casino in Bristol. \nSee Note 10 for discussion of other potential developments in the United Kingdom. \n\nIn June 2004, the Company entered into a joint venture agreement to develop, \nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject \nto, among other things, the approval of the government of Macau S.A.R., and other \nregulatory approvals, as well as the entry into a subconcession agreement with the \nholder of one of the existing concessions. \n\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc., \nand its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino \nand entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC \noperates a casino in an interim facility in downtown Detroit. See Note 10 for \ndiscussion of the revised development agreement with the City of Detroit and \nplans for a permanent casino resort. \n\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi, \nMississippi. The Company also owns a 50% interest in a limited liability company \nthat owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "buÅer land and other contiguous land owned by our company. \n\n(3) Permitted acreage consists of all acreage at the landÑll encompassed by an active permit to dispose of waste. \n(4) Unused permitted acreage consists of all acreage at the landÑll encompassed by an active permit on which disposal operations have not \ncommenced. \n\n18", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**19**\n\n93 \n\n**THE NEW YORK-NEW YORK SKYLINE BECOMES**\n**A TOWERING PRESENCE IN THE PORTFOLIO.**\nWe acquired Primadonna Resorts to gain full \nownership of the spectacular New York-New York \nas well as three hotel-casinos on the Nevada state \nline and two championship golf courses. \n\n\n\n\n\n\n\n**IT ALL BEGINS WITH MGM GRAND.**MGM Grand, \nthe largest hotel-casino in the world, opened to \ngreat fanfare. “The City of Entertainment” \nredefined the urban resort and provided the \nfoundation for our company’s momentous growth.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**Mandalay Merger**\nOn June 16, 2004, we announced that we had entered into a definitive merger \nagreement with Mandalay Resort Group (“Mandalay”), a publicly traded company, \nunder which we will acquire Mandalay for $71.00 in cash for each share of \ncommon stock of Mandalay. Mandalay owns and operates eleven properties in \nNevada, including Mandalay Bay, Luxor, Excalibur, Circus Circus, and Slots-A-Fun \nin Las Vegas, Circus Circus-Reno in Reno, Colorado Belle and Edgewater in \nLaughlin, Gold Strike and Nevada Landing in Jean, and Railroad Pass in \nHenderson. Mandalay also owns and operates Gold Strike, a hotel/casino in Tunica \nCounty, Mississippi. In addition, Mandalay owns a 50% interest in Silver Legacy in \nReno, a 50% interest in Monte Carlo in Las Vegas, a 50% interest in Grand \nVictoria, a riverboat in Elgin, Illinois, and a 53.5% interest in MotorCity in \nDetroit, Michigan. The total consideration is approximately $8.1 billion, including \nequity value of approximately $4.8 billion, convertible debentures with a redemp- \ntion value of approximately $574 million, the assumption or repayment of other \noutstanding Mandalay debt with a fair value of approximately $2.6 billion as of \nDecember 31, 2004, and $100 million of estimated transaction costs. The transac- \ntion is structured as a merger of one of our wholly-owned subsidiaries with and into \nMandalay. The transaction will be accounted for as a purchase and is anticipated to \nclose during the first quarter of 2005. \n\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700 \nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will \nalso feature numerous upscale restaurants and generally target customers who might \notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", + "target_page": 32, + "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "On a consolidated basis, the most important factors and trends contributing to our \noperating performance over the last three years have been: \n\n• The war with Iraq and the outbreak of SARS in Asia, both of which negatively \nimpacted leisure travel and our high-end gaming business in late 2002 and \nearly 2003; \n\n• The new labor contract covering our Las Vegas Strip employees since mid-2002, \nwhich calls for significant annual wage and benefits increases through 2007; \n• The current economic recovery in the United States, which began to impact our \noperations in the latter half of 2003 and continued to positively affect our results \nin 2004.", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "U S I N G O U R S T R E N G T H... \n\n\n\n\n\n\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Victoria Partners – Monte Carlo ( 50 %)$424.683
$ 420.853Marina District Development Company – Borgata ( 50 %)......405.322
335.159MGM Grand Newcastle ( Holdings ) Ltd. ( 50 %)9.633
MGM Grand Paradise Limited – Macau ( 50 %).3.002
\n\n\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Casino$174.713
$ 159.569Hotel61.084
36.376Other28.114
22.617263.911
218.562Less : Allowance for doubtful accounts( 59.760 )
( 79.087 )
\n\n\n \n \n \n \n [html]\n
At December 31 ( In thousands )20042003
Land....................................................................................................................................................................................................$ 4.089.106$
4.103.693Buildings, building improvements and land improvements.........4.228.138
3.798.143Equipment, furniture, fixtures and leasehold improvements...........2.235.766
1.960.094Construction in progress..................................................................................................................................................................................299.148
465.47110.852.158
10.327.401Less : Accumulated depreciation and amortization................................( 1.938.016 )
( 1.646.062 )$ 8.914.142
\n\nThe Company’s investments in Monte Carlo and Borgata were recorded at their \nestimated fair value at the date of the Mirage Acquisition, which value exceeded the \nCompany’s share of the net assets of the unconsolidated affiliates by approximately \n$361 million. Substantially all of this difference relates to the excess of the fair value \nof land owned by the affiliates over its pre-existing carrying value. The investment \nbalance also includes interest capitalized on the Borgata investment, which is being \namortized over 40 years.", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended December 312004% Change2003% Change2002
Casino revenues, net :
Table games..............943.3439 %$866.096( 3 %)
$893.836Slots....................................1.218.5899 %1.115.029
5 %1.064.491Other................................62.03310 %56.389
3 %54.513Casino revenues, net...2.223.9659 %2.037.514
1 %
2.012.840Non - casino revenue :Rooms..............................911.2599 %833.272
5 %796.861Food and beverage....841.14711 %757.278
7 %
706.153Entertainment, retailand other..............696.1177 %647.702
2 %637.625Non - casino revenues...2.448.5239 %2.238.252
5 %2.140.6394.672.4889 %4.275.766
3 %4.153.479Less : Promotional allowances( 434.384 )5 %( 413.023 )
4 %( 396.551 )$ 4.238.10410 %$ 3.862.743
\n\n• The ongoing capital investments in upscale amenities at our resorts, which we \n\nbelieve is allowing us to market more effectively to visitors, capture a greater share \nof these visitors’ increased travel budgets, and generate premium pricing for our \nresorts’ rooms and other amenities. \n\nAs a result of the above trends, our net revenues increased 10% in 2004, while \nincreasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased \n14% in 2004, due to the addition of several new restaurants, bars and other \namenities, and in spite of fewer rooms in service due to room remodel activity. \nNet revenues at New York-New York increased 26% as the resort continues to \nbenefit from*Zumanity*and Nine Fine Irishmen, both of which opened in summer \n2003. Net revenues at The Mirage decreased 2% as the resort was without the \nSiegfried & Roy show and the buffet was closed for a portion of the year while \nCravings was constructed. \n\nOur operating income in 2004 increased 36%, due primarily to the strong revenue \ntrends and a full year of Borgata’s results. The increase in income from unconsoli- \ndated affiliates is responsible for approximately one-third of the increase in \noperating income, while improvements at our operating resorts, particularly \nBellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the \nincrease. Operating income at MGM Grand Detroit was essentially flat year-over- \nyear, despite an increase in the gaming tax rate from 18% to 24% effective \nSeptember 2004. Several other factors largely offset: Higher corporate expense due \nto increased development costs; lower bad debt expense due to improved collec- \ntions; lower preopening expenses due to Borgata preopening expenses in 2003; and \nhigher property transactions, net due to a $37 million gain on sale of land in 2003.", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Table games revenues increased as a result of the improvements in the U.S. econo- \nmy and the general economy worldwide, as well as increased attendance at targeted \nmarketing events, including the New Years period. Total table games volume for the \nyear was up 9%, with particular strength in baccarat volume, up 18%. These are the \nmost significant increases in table games volumes since 2000. Table games revenues \ndecreased in 2003, as a slightly lower hold percentage and the impact of the Iraq \nwar and SARS outbreak in early 2003 were not fully offset by strong volume levels \nover the latter half of 2003. Table games win percentages were within our normal \nrange for all periods presented.", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "In 2004, there were no material unusual property transactions. In 2003, we sold 315 \nacres of land in North Las Vegas, Nevada near Shadow Creek for approximately \n$55 million, resulting in the $37 million gain reflected above. Prior to 2003, we \nclassified gains and losses on routine assets sales or disposals as a non-operating item at \nsome resorts and as an operating item at other resorts. We believe the preferable pres- \nentation of these items is as an element of operating income. Prior period statements \nhave not been reclassified as such transactions were not material in periods prior to \n2003. Until 2003, demolition costs were typically capitalized as part of new construc- \ntion. We began expensing demolition costs on major construction projects as incurred \non January 1, 2003, and are accounting for this change in policy prospectively. \nDemolition costs were not material in periods prior to 2003. Demolition costs in \n2004 and 2003 related primarily to preparation for the Bellagio standard room \nremodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments \nof assets to be disposed of in 2003 consisted primarily of assets related to the former \nEFX! show and restaurants closed during 2003 at MGM Grand Las Vegas. \n\nInterest cost was higher in 2004 as we had a higher average borrowing rate due to \nincreases in variable interest rates and the issuance of significant fixed rate debt in \nthe second half of 2004 in anticipation of the Mandalay merger. \n\nCapitalized interest increased in 2004 due to the ongoing Bellagio expansion and \n*KÀ*theatre projects. Capitalized interest in 2005 will include interest capitalized on \nProject CityCenter. Capitalized interest decreased in 2003 due to the suspension of \ndevelopment in Atlantic City in late 2002 and the mid-2003 cessation of interest cap- \nitalization on the Company’s investment in Borgata, which opened on July 3, 2003. \n\nNon-operating items from unconsolidated affiliates, primarily our share of Borgata’s \ninterest expense and state income taxes, increased from $10 million in 2003 to", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "of Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of \nBorgata and also operates the resort. Borgata opened in July 2003. The Company \nowns approximately 95 developable acres adjacent to Borgata, a portion of which \nconsists of common roads, landscaping and master plan improvements which the \nCompany designed and developed as required under the agreement with Boyd. \n\nUntil July 2004, the Company owned and operated MGM Grand Australia and \nuntil January 2004, the Company owned and operated the Golden Nugget Las \nVegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin, \nNevada (the “Golden Nugget Subsidiaries”). Until June 2003, the Company \noperated PLAYMGMMIRAGE.com, the Company’s online gaming website based \nin the Isle of Man. See Note 3 for further information regarding these discontinued \noperations. In the second quarter of 2002, the Company received proceeds of $11 \nmillion upon termination of management agreements covering four casinos in the \nRepublic of South Africa. Prior to the termination, the Company managed three \npermanent casinos and one interim casino and received management fees from its \npartner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as \npart of other revenues in the accompanying consolidated statements of income. \n\n**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. \n\nThe Company is actively seeking future development opportunities in the United \nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos \nLimited, a United Kingdom gaming company which operates a casino in Bristol. \nSee Note 10 for discussion of other potential developments in the United Kingdom. \n\nIn June 2004, the Company entered into a joint venture agreement to develop, \nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject \nto, among other things, the approval of the government of Macau S.A.R., and other \nregulatory approvals, as well as the entry into a subconcession agreement with the \nholder of one of the existing concessions. \n\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc., \nand its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino \nand entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC \noperates a casino in an interim facility in downtown Detroit. See Note 10 for \ndiscussion of the revised development agreement with the City of Detroit and \nplans for a permanent casino resort. \n\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi, \nMississippi. The Company also owns a 50% interest in a limited liability company \nthat owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**MANDALAY RESORT GROUP**\n**AND MGM MIRAGE ANNOUNCE**\n**MERGER.**Mandalay Resort \nGroup will add iconic resorts and \ngreat people to our family. We \nwill own 832 acres in the heart \nof Las Vegas, the fastest growing \ncity in the United States. \n\n**BELLAGIO ADDS A JEWEL TO THE**\n**FAMILY CROWN.**The Mirage Resorts \nmerger provided outstanding resorts, \npeople and land, and has propelled our \nearnings and provided an unparalleled \nplatform for future growth. \n\n\n\n**20**\n\n09 \n\n**BORGATA CHANGES THE FACE OF ATLANTIC CITY.**\nBorgata is launched in Atlantic City with our joint-venture \npartner Boyd Gaming. Borgata has been a tremendous success, \nraising the bar for casino entertainment in that market.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Gain on sale of North Las Vegas land.................$$ ( 36.776 )
$Siegfried & Roy theatre write - down – The Mirage...
1.408Storm damage – Beau Rivage..............................
7.824Write - off of Detroit development costs....................
4.754Impairment of assets to be disposed of..........473
5.7642.134Demolition costs.........................................................................................................................................................................................7.057
6.614Other net losses on asset sales or disposals......1.135
4.049
\n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002Hotel and other revenue from related parties.......$
416$871$764License fees to entities under common ownership...
( 1.000 )( 1.000 )( 1.000 )Professional fees to directors or firmsaffiliated with directors...........................................( 4.084 )
( 1.551 )( 1.815 )Other related party expenses...........................................( 62 )( 468 )( 224 )
$( 4.730 )$( 2.148 )$( 2.275 )
\n\nIn 2004, there were no material unusual property transactions. In 2003 the \nCompany sold 315 acres of land in North Las Vegas, Nevada near Shadow Creek \nfor approximately $55 million, which resulted in a pretax gain of approximately \n$37 million. Also in 2003, the Company recorded write-downs and impairments of \nassets abandoned or replaced with new construction, primarily at MGM Grand Las \nVegas in preparation for new restaurants and the new theatre. Prior to 2003, the \nCompany classified gains and losses on routine asset sales or disposals as a \nnon-operating item at some resorts and as an operating item at other resorts. \nManagement believes the preferable presentation of these items is as an element of \noperating income. Prior period statements have not been reclassified as such \ntransactions were not material in the prior periods. Until 2003, demolition costs \nwere typically capitalized as part of new construction. The Company began \nexpensing demolition costs on major construction projects as incurred on January 1, \n2003, and is accounting for this change in policy prospectively. Demolition costs \nwere not material in prior periods. Demolition costs in 2004 and 2003 relate \nprimarily to preparation for the Bellagio standard room remodel, Bellagio expansion \nand new theatre at MGM Grand Las Vegas.", + "page_start": 74, + "page_end": 74, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "S E T T I N G T H E F U T U R E I N M O T I O N \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nW \n\n**hile the international opportunities for growth remain to be fully defined,**\n**in 2004 MGM MIRAGE entered into a joint venture agreement with**\n**Pansy Ho Chiu-king to develop, build and operate a major hotel-casino**\n**resort in Macau S.A.R. No other international market has shown its ability to sustain**\n**improved growth even as the government takes important steps to modernize its regu-**\n**latory structure. We have methodically moved through the regulatory process and look**\n**forward to initiating construction in 2005 and opening in 2007.**\n\n**We continue to monitor and pursue opportunities as they arise in the United**\n**Kingdom. The bill modernizing British gaming law has moved steadily through the**\n**legislative process throughout the year. Several key issues are yet to be resolved, but we**\n**remain hopeful that Great Britain will become one of the world’s leading jurisdictions**\n**with significant growth opportunities for decades to come.**\n\n**We are also excited about the emergence of possible new jurisdictions in the Far**\n**East. We plan to pursue additional development opportunities as they become avail-**\n**able, as we believe that the Far East holds considerable promise as a growing gaming market.**\n\n\n\n\n\n\n\n\n\n\n\n**THE RESIDENCES**\n**AT MGM GRAND Our joint**\n**venture with Turnberry Associates**\n**to build luxury condo/hotels ignited**\n**a flurry of development in Las Vegas.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**MGM GRAND MACAU Our joint venture has secured**\n**a prime location to develop and construct an exciting**\n**addition to this dynamic gaming destination.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n**Domestically, we are selectively expanding our presence as well, moving into mar-**\n\n**kets and business lines where our superior brands and assets can provide the best**\n**returns. In Las Vegas we will maximize the use of our vast land holdings, beginning**\n**with The Residences at MGM Grand. This unique venture is a breakthrough combina-**\n**tion of a hotel and condominiums – the first of its kind in Las Vegas. In Atlantic City, we**\n**own an exceptional site for future development. The already successful Borgata is pre-**\n**pared to grow bigger and better. Expansion plans include more casino space, a new hotel**\n**tower, more restaurants, retail outlets and an expanded spa.**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What possess all naval aviators ?", + "target_page": 5, + "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**NA VAIR 00·801·80**\n\n**AERODYNAMICS FOR NAVAL**\n**AVIATORS**\n\n**BY**\n**H. H. HURT, JR.**\n**UNIVERSITY OF SOUTHERN CALIFORNIA**\n\n**PUBLISHED BY DIRECTION OF COMMANDER, NAVAL AIR SYSTEMS COMMAND**\n\n(cid:19)(cid:27)(cid:19)(cid:19)(cid:47)(cid:51)(cid:20)(cid:20)(cid:20)(cid:23)(cid:23)(cid:25)(cid:21) \n\n\n\nDISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. \nDESTRUCTION NOTICE - For unclassified, limited documents, destroy by any method that will \nprevent disclosure of contents or reconstruction of the document. \n\n**REVISED JANUARY 1965**", + "page_start": 0, + "page_end": 0, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The majority of aircraft accidents are due to some type of error of \nthe pilot. This fact has been true in the past and, unfortunately, most \nprobably will be true in the future. Each Naval Aviator should strive \nto arm himself with knowledge, training, and exacting, professional \nattitudes and techniques. The fundamentals of aerodynamics as pre- \nsented in this text will provide the knowledge and background for \nsafe and effective flying operations. The flight handbooks for the air- \ncraft will provide the particular techniques, procedures, and operating \ndata which are necessary for each aircraft. Diligent study and continu- \nous training are necessary to develop the professional skills and tech- \nniques for successful flying operations. \n\nThe author takes this opportunity to express appreciation to those \nwho have assisted in the preparation of the manuscript. \nIn particular, \nthe por- \nthanks are due to Mr. J. E. Fairchild for his assistance with \ntions dealing with helicopter aerodynamics and roll coupling phenom- \nena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk \nfor their review of the text material. \n\nHUGH HARRISON HURT, Jr. \n\n\n\nAugust 1959 \nUniversity of Southern California \nLos Angelesj Cnlif.", + "page_start": 5, + "page_end": 5, + "source_file": "00-80T-80.pdf" + }, + { + "text": "PREFACE \n\n\n\n\n\n\n\n\n\n\n\nThe purpose of this textbook is to present the elements of applied \nto \naerodynamics and aeronautical engineering which relate directly \nthe problems of flying operations. All Naval Aviators possess a natural \ninterest in the basic aerodynamic factors which affect the performance \nof all aircraft. Due .to the increasing complexity of modern aircraft, \nthis natural interest must be applied to develop a sound understanding \nof basic engineering principles and an appreciation of some of the more \nadvanced problems of aerodynamics and engineering. The safety and \neffectiveness of flying operations will depend greatly on the under- \nstanding and appreciation of how and why an airplane flies. The \nprinciples of aerodynamics will provide the foundations for developing \nexacting and precise flying techniques and operational procedures. \n\nThe content of this textbook has been arranged to provide as com- \nplete as possible a reference for all phases of flying in Naval Aviation. \nHence, the text material is applicable to the problems of flight train- \ntraining, and general flying operations. The manner \ning, transition \nof presentation throughout \nthe text has been designed to provide the \nelements of both theory and application and will allow either directed \nor unassisted study. As a result, the text material’will be applicable \nto supplement formal class Iectures and briefings and provide reading \nmaterial as a background for training and flying operations. \n\n\n\n\n\n\n\n\n\nMuch of the specialized mathematical detail of aerodynamics has \nbeen omitted wherever it was considered unnecessary in the field of \nflying operations. Also, many of the basic assumptions and limita- \ntions of certain parts of aerodynamic theory have been omitted for the \nIn order to contend with \nsake of simplicity and clarity of presentation. \nthese specific shortcomings, the Naval Aviator should rely on the \nassistance of certain specially qualified individuals within Naval Avia- \ntion. For example, graduate aeronautical engineers, graduates of the \nTest Pilot Training School at the Naval Air Test Center, graduates of \nthe Naval Aviation Safety Officers Course, and technical representatives \nof the manufacturers are qualified to assist in interpreting and applying \nthe more difficult parts of aerodynamics and aeronautical engineering. \nTo be sure, the specialized qualifications of these individuals should \nbe utilized wherever possible. \n\niii", + "page_start": 4, + "page_end": 4, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Chapter 6 \n\nAPPLICATION OF AERODYNAMICS TO SPECIFBC PROW \n\nOF FLYING \n\n\n\n\nPRIMARY CONTROL OF AIRSPEED AND \n\nALTITUDE \n\n\n\n\n\n\n \n \n \n \n [html]\n
InterventionGymphomaticsIU / UUPatientsDatabasetComparisonblems of fly1Fill assist the Naval Aviatorassumed that the airblanc is trimmed so thatConstructTableStatisticsStatementComparisonStatementsAnalysisAge, year, heartly, year, newno. inhaling and NITTIINP_V3 WITIB_TIP_TIP_TIF_TIIIIILIVA - TOVBITMETAverage providers( i ) V ( i ) V ( i ) V ( i ) Developii [ 19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.19.1TableTableStatistics.............Table< underline > assays , assistand, < underline > in , < underline >, < underline >, , < underline >, < underline >, , < underline >, < underline >, , < underline >, < underlinergood fivingStatement( III ) III ( III ) IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIITableTableTableTableTableTable
", + "page_start": 366, + "page_end": 366, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Reproduction for non-military use of the information or illustrations contained in this \npublication is not permitted without specific approval of the issuing service (NA VAIR \nor USAF). The policy for use of Classified Publications is established for the Air Force \nin AFR 205-1 and for the Navy in Navy Regulations, Article 1509 • \n\n. . . - - - - - - - - - - - - - LIST OF CHANGED PAGES ISSUED \n\nINSEIf LATEST C_PAGES. DESTROY SUPERSEDED PAGES. \n\nNOTE: The portion of the tut .ff'ecr:ecl by the current change ia indicated by • vertical line in the OUter margins \nof the page. \n\n• The aateritlt indicate. pagel dwtged, added or deleted by the turrent change, \n\nADDITIONAL COPIES OF THIS PUBLICATION MAY BE OBTAINED AS FOLLOWS, \n\nUSAF AC'flVITlES-In accordance with Technical Order No. 00-5-1. \nNA VY ACTIVmE~UJe DO FORM U'\" and fllbmit in accordance with the inKruC:JiODi contained in NAVSUP PUB \n\nLICATION -4'7-Military Standard Requilitioning and Issue Procedures. \nFot information on othtl' available maurW Ind details of distribution refer to NAVSUP PUBLICATION 2002 \nSECTION VIII, PART c .. d NAVAIR OO·IOOA. \n' \n\n\n\nNAVAIR", + "page_start": 1, + "page_end": 1, + "source_file": "00-80T-80.pdf" + }, + { + "text": "TYPICAL GUILD-UP 0F tzci~m~ENTs \n\n\n\n,-WING+ FUSELAGE \n\nWING ONLY/. \n\n\n\n- - \n\n- \n\n\n\nC.G. @ 30% MAC \n\n\n\n\nEFFECT OF C.G. WsITION \n\n\n\n50% MAC \n\n\n\n40% MAC (NEUTRAL pOlNn \n---", + "page_start": 277, + "page_end": 277, + "source_file": "00-80T-80.pdf" + }, + { + "text": "SURFACE TUFT PHOTOGRAPHS \nFOR RECTANGULAR WING \nAR=2.31, k-l.0 \n\n\n\n\n\n\n\n\n\n8 \n\n\n\n\n\n\n\n\n18 \n\n\nFROM NACA TN 2674", + "page_start": 97, + "page_end": 97, + "source_file": "00-80T-80.pdf" + }, + { + "text": "For each mission type of aircraft \n\nthere is \na probable spectrum of loads which the air- \ncraft will encounter. That is, various loads \nwill be encountered with a frequency particular \nto the mission profile. The fighter or attack \ntype of aircraft usually experiences a pre- \ndominance of maneuver loads while the trans- \nport or patrol type usually encounters a pre- \ndominance of gust loads. Since fatigue damage", + "page_start": 345, + "page_end": 345, + "source_file": "00-80T-80.pdf" + }, + { + "text": "................................... \n\n\n294 \n295 \n\n\n\n\n\n\n\n\n\nSpinrecovety..; \nSlipstream rotatmn. ................................................ \nCross wind takeoff and landing. \nAsymmetrical power. ............................................... \n\n................................................... \n\nLATERAL STABILITY AND CONTROL \n\n........................................... \nLATERAL STABILITY, \n\nDefinlttons ........................................................... \n\nCONTRIBUTION OF THE AIRPLANE COMPONENTS. \n\n295 \n298 \nWing.........~.........~ \nFuselage and wmg powton, ................................................................................... \n298 \n298 \nSweepback ......................................................... \n298 \nVertical tail. ........................................................ \n\nLATERAL DYNAMIC EFFECTS, ................................ \n299 \n\nDirectional divergence \nSpiral divergence \nDutch roll \n\nCONTROL IN ROLL .............................................. \nRolhsg motmn of an airplane. ...................................... \nRoliing performance, .............................................. \nCritical requirements. .............................................. \n300 \n300 \n301 \n305 \n\n. \n\nMISCELLANEOUS STABILITY PROBLEMS \n\n......................... 305 \nLANDING GEAR CONFIGURATIONS \n\nTail wheel type \nTricyde \ntype \nBicycle type \n\nSPINS AND PROBLEMS OF SPIN RECOVERY ................ \n307 \n\nPrincipal prospin moments \nFundamental principle of recovery \nEffect of configuration \n\n\n\n313 \n\n313 \n\n\n314 \n_. \n\n\n\n315 \n\n\n319 \n\n\n\nPITCH-UP., ......................................................... \n\nDefinition \nContribution of the airplane components \nEFFECTS OF HIGH MACH NUMBER.. \n\nLongitudinal stability and control \nDirectional stability \nDynamic stability and damping \n\nPILOT INDUCED OSCILLATIONS.. \nPilot.control system-airplane coupling \nHigh q aed low stick force stability \n\nROLL COUPLING. \n\nInertia and aerodynamic coupling \nInertia and wind axes \nNatural pitch, yaw, and coupled pitch-yaw frequencies \nCritical roll rates \nAutorotative rolling \nOperating limitations \n\nHELICOPTER STABILITY AND CONTROL. \n\nRotor gyroscopic effects \nCyclic and collective pitch \nLon \nf \nAng e of attack and velocity stability \nDynamic stability \n\nitudinal, lateral, and directional control \n\nxiii", + "page_start": 14, + "page_end": 14, + "source_file": "00-80T-80.pdf" + }, + { + "text": "PLIGHT AT HIGH LIFT CONDITIONS \n\n\n\n\n\nin Naval Aviation \n\n\n\n\n\nNAVWEPS 00-BOT-RO \nBASIC AERODYNAMICS \n\nfuel. Hence, the gross weight and stall speed \nof the airplane can vary considerably through- \nout the flight. The effect of only weight on \nstall speed can be expressed by a modified form \nof the stall speed equation where density ratio, \nc r,,,.,, and wing area are held constant. \n\nV_i_z- K \nK \nv.,- \nJ \n\nwhere \n\nV*,=stall speed corresponding to some \n\ngross weight, WI \n\nV@a= stall speed corresponding to a dif- \n\nferent gross weight, WP \n\nAs an illustration of this equation, assume \nthat a particular airplane has a stall speed of \n100 knots at a gross weight of 10,000 lbs. \nThe stall speeds of this Sam: airplane at other \ngross weights would be: \n\n\nit \n\n\n\n100x 4, ‘&~=lO, \n\n110 \n120 \n95 \n90 \n\nIt is frequently stated that the career Naval \nAviator spends more than half his life “below \na thousand feet and a hundred knots.” \nRe- \ngardless of the implications of such a state- \nment, the thought does cunnute the relation- \nflying speeds and carrier \nship of minimum \naviation. Only \nis there \nsuch importance assigned to precision control \nof the aircraft at high lift conditions. Safe \noperation in carrier aviation demands precision \ncontrol of the airplane at high lift conditions. \nThe aerodynamic lift characteristics of an \nairplane are portrayed by the curve of lift \ncoefficient versus angle of attack. Such a \ncurve is illustrated in figure 1.15 for a specific \nairplane in the clean and flap down configura- \ntions. A given aerodynamic configuration ex- \nperiences increases in lift coefficient with \nin- \ncreases in angle of attack until the maximum \nlift coefficient is obtained. A further increase \nin angIe of attack produces stall and the lift \ncoefficient then decreases. Since the maximum \nthe minimum \nlift coefficient corresponds to \nspeed available in flight, \nis an important \npoint of reference. The stall speed of the air- \ncraft in level flight is related by the equation: \n\n\n\n\n\n\n\n\n\n\n\nV7.=17.2 c w \nJ-- \n.ln2s \n\nwhere \n\nV.-stall \nW=gross weight, lbs. \n\nspeed, knots TAS \n\nc Lnoz= airplane maximum lift coefficient \n\ncsaltitude density ratio \nS= wing area, sq. ft. \n\nthe effect on stall \nThis equation illustrates \nspeed of weight and wing area (or wing load- \ning, W/S), maximum lift coefficient, and alti- \nIf the stall speed is desired in EAS, the \ntude. \ndensity ratio will be that for sea level (u= \n1.000). \n\nEFFECT OF WEIGHT. Modern configu- \nrations of airplanes are characterized by a large \npercent. of the maximum gross weight being \n\nll,W \n\n12,ooO \n14,4al \n9mJ \n8,100 \n\nFigure 1.15 illustrates the effect of weight on \nstall speed on a percentage basis and will be \nvalid for any airplane. Many specific condi- \ntions of flight are accomplished at certain fixed \nangles of attack and lift coefficients. The \neffect of weight on a percentage basis on the \nspeeds for any specific lift coefficient and angle \nof attack \nis identical. Note that at small \nvariations of weight, a rule of thumb may \nexpress the effect of weight on stall speed- \n“a 2 percent change in weight causes a I per- \ncent change in stall speed.” \n\nFLIGHT. \nflight and maneuvers produce an \nTurning \nis similar to the \neffect on stall speed which \neffect of weight. \nInspection of the chart on \nfigure 1.16 shows the forces acting on an airplane \nin a steady turn. Any steady turn requires \nthat the vertical component of Iift be equal to \n\nEFFECT OF MANEUVERING", + "page_start": 52, + "page_end": 52, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the static pressure of the aire at standard sea level ?", + "target_page": 20, + "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "the proportion of the ambient air temperature \nand the standard sea level air temperature. \nThis temperature ratio is assigned the short- \nhand notation of 0 (theta). \nTemperature ratio \n\npercent water vapor, argon, carbon dioxide, \netc. For the majority of all aerodynamic con- \nis considered as a uniform \nsiderations air \nmixture of these gases. The usual quantities \nused to define the properties of an air mass are \nas follows: \n\nAmbient air temperature \n=Standard sea level air temperature \n\nSTATIC PRESSURE. The absolute static \npressure of the air is a property of primary \nimportance. The static pressure of the air \nat any altitude results from the mass of air \nsupported above that level. At standard sea \nlevel conditions the static pressure of the air \nis 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) \nand at 40,000 feet altitude this static pressure \ndecreases to approximately 19 percent of the \nsea level value. The shorthand notation for \nthe ambient static pressure is “p” \nand the \nstandard sea level static pressure is given the \nsubscript “a” \nfor zero altitude, pa. A more \nusual reference in aerodynamics and perform- \nance is the proportion of the ambient sta~tic \npressure and the standard sea level static \npressure. This static pressure ratio is assigned \nthe shorthand notation of 8 (delta). \n\n@=TITtl \n,+273 \n\n288 \n\nMany items of compressibility effects and jet \nengine performance involve consideration of \nthe temperature ratio. \n\n\n\n\n\n\n\ndensity ratio= \n\n\n\nDENSITY. The density of the air is a prop- \nerty of greatest importance in the study of \naerodynamics. The density of air is simply \nthe mass of air per~cubic foot of volume and \nis a direct measure of the quantity of matter \nin each cubic foot of air. Air at standard sea \nlcvcl conditions weighs 0.0765 pounds per cubic \nfoot and has a density of 0.002378 slugs per \ncubic foot. At an altitude of 40,000 feet the \nair density is approximately 25 percent of the \nsea level value. \n\nThe shorthand notation used for air density \nis p (rho) and the standard sea level air density \nis then pO. In many parts of aerodynamics it \nis very convenient to consider the proportion \nof the ambient air density and standard sea \nlevel air density. This density ratio is assigned \nthe shorthand notation of c (sigma). \n\nambient air density \nstandard sea level air density \n\na = PIP0 \n\nA general gas law defines the relationship of \npressure temperature, and density when there \nis no change of state or heat transfer. Simply \nstated this would be “density varies directly \nwith pressure, inversely with \ntemperature.” \nUsing the properties previously defined, \n\n\ndensity ratio= \nPressure rat’o. \ntemperature rat10 \n\n\n\nAltitude pressure ratio \n\nAmbient static pressure \n=Standard sea level static pressure \n\n6 = PIP0 \n\nMany items of gas turbine engine perform- \nance are directly related to some parameter \nthe altitude pressure ratio. \ninvolving \nTEMPERATURE. The absolute tempera- \ncure of the air is another important property. \nThe ordinary temperature measurement by the \nCentigrade scale has a/datum at the freezing \npoint of water but absolute zero temperature \nis obtained at a temperature of -273“ Centi- \ngrade. Thus, the standard sea level tcmpera- \nture of 15” C. is an absolute temperature of \n288”. This scale of absolute temperature using \nthe Centigrade increments is the Kelvin scale, \nfor the \ne.g., o K. The shorthand notation \nambient air temperature is “T” \nand the stand- \nard sea level air temperature of 288’ K. is \nsignified by Ta. The more usual reference is, \n\n2", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" + }, + { + "text": "AFT STAGNATION \nPOINT \n\n\n\n\n\nAIRSTREAM AHEAD \nHAS AMBIENT STATIC \nPRESSURE AND DYNAMIC \nPRESSURE \nSTAGNATION PRESSURE \nIS AIRSTREAM TOTAL \nPRESSURE \n\nP+q \n\nFtgure 1.4. Flow Pattern on a Symmetrical Object \n\n\n\n\n\n\n\n\n\n\n\n\n\npressure, q. The pressure gauge is then cali- \nbrated to indicate flight speed in the standard \nsea level air mass. For example, a dynamic \npressure of 305 psf would be realized at a sea \nlevel flight ,speed of 300 knots. \n\nsurface anflow continues to the aft stagnation \npoint where the local velocity is again zero. \nThe important point of this example of aero- \ndynamic flow is existence of the stagnation \npoint. The change in airflow static pressure \nwhich takes place at the stagnation point IS \nequal to the free stream dynamic pressure, q. \nThe measurement of free stream dynamic \npressure is fundamental to the indication of \nIn fact, airspeed indicators are sim- \nairspeed. \nply pressure gauges which measure dynamic \npressure related to various airspeeds. Typical \nin \nairspeed measuring systems are illustrated \nfigure 1.5. The pitot head has no internal \nflow velocity and the pressure in the pitot tube \nis equal to the total pressure of the airstream. \nThe purpose of the static-ports is to sense the \ntrue static pressure of the free airstream. The \ntotal pressure and static pressure lines are \nattached to a differential pressure gauge and \nis the dynamic \nthe net pressure indicated \n\nthere can be many conditions of \nflight where the airspeed indicator does not \ntruly reflect the actual velocity through \nthe \nair mass. The corrections that must be applied \nare many and lisred in sequence below: \n(1) The indicated airspeed (IAS) \n\nActually \n\nis the \nactual instrument indication for some given \nflight condition. Factors such as an altitude \nother than standard sea level, errors of the \ninstrument and errors due to the installation, \ncompressibility, etc. may create great vari- \nance between this instrument indication and \nthe actual flight speed. \n\n(2) The calibrated airspeed (CM)", + "page_start": 27, + "page_end": 27, + "source_file": "00-80T-80.pdf" + }, + { + "text": "PITOT-STATIC SYSTEM \n\nPITOT WITH SEPARATE \nSTATIC SOURCE \n\n\n\n\n\n\n\n\n\n\n\nw / :% \n. I. q \n\nPRESSURE INDICATED BY GAUGE IS \nDIFFERENCE BETWEEN TOTAL AND \nSTATIC PRESSURE, H-p= q \n\nFigure. 1.5. Airspeed Measurement \n\n\n\n\n\n\n\n\n\n\n\n\n\n0.05 psi position error is an airspeed error \nof 10 knots. A typical variation of air- \nspeed system position error is illustrated in \nfigure 1.6. \n\n(3) The equivalent airspeed (PAS) is the \nresult of correcting the (CAS) for compressi- \nbility effects. At high \nflight speeds the \nstagnation pressure recovered in the pitot \ntube is not representative of the airstream \ndynamic pressure due to a magnification \nby compressibility. Compressibility of the \nairflow produces a stagnation pressure in \nthe pitot which is greater than if the flow \nwere incompressible. As a result, the air- \nspeed indication is given an erroneous mag- \nnihcation. The standard airspeed indicator \nis calibrated to read correct when at standard \nsea level conditions and thus has a com- \npressibility correction appropriate for these \nconditions. However, when the aircraft is \noperating above standard sea level altitude, \n\ninstrument and errors due to position or lo- \ncation of the installation. The instrument \nerror must be small by design of the equip- \nment and is usually negligible in equjpment \nwhich is properly maintained and cared for. \nThe position error of the installation must \nbe small in the range of airspeeds involving \ncritical performance conditions. Position \nerrors are most usually confine,d to the static \nsource in \nthe actual static pressure \nsensed at the static port may be different \nfrom \nfree airstream static pressure. \nWhen the .,aircraft is operated through a \nlarge range’ of angles of attack, the static \nvaries ‘quite greatly \npressure distribution \nto’minimize \nand it becomes quite difficult \nthe static source error. \nIn most instances a \ncompensating group of static sources may \nbe combined to reduce the position error. \nIn order to appreciate the magnitude of this \nproblem, at flight speed near 100 knots a \n\nthat \n\nthe", + "page_start": 28, + "page_end": 28, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-SOT-80 \nBASIC AERODYNAMICS \n\nThus, the airspeed indicator system measures \n\nthe inherent compensation is inadequate and \nadditional correction must be applied. The \nsubtractive corrections that must be applied \nto CA$ depend on pressure altitude and CAS \nand are shown on figure 1.6 for the subsonic \nflight range. The equivalent airspeed (EAS) \nis the flight speed in the standard sea level \nair mass which would produce the same free \nstream dynamic pressure as the actual flight \ncondition. \n\ndynamic pressure and will \nvelocity when instrument, position, compress- \nibility, and density corrections are applied. \nThese corrections are quite necessary for ac- \ncurate determination of \ntrue airspeed and \naccurate navigation. \n\nrelate true flight \n\nBernoulli’s principle and the concepts of \nstatic, dynamic, and total pressure are the basis \nof aerodynamic fundamentals. The pressure \ndistribution caused by the variation of local \nstack and dynamic pressures on a surface is \nthe source of the major aerodynamic forces \nand moment. \n\n\n\n\n\nDEVELOPMENT OF AERODYNAMIC \n\nFORCES \n\n\n\n\n\n\n\n\n \n \n \n \n [html]\n
TableParameters
PTable
SpeciesTable
TableC1 ‘ A3
βpTable
TableTable
TableT
STable
1.Table
TableTable
PTable
\n\n\n\nThe typical airflow patterns exemplify the \nrelationship of static pressure and velocity \ndefined by Bernoulli. Any object placed in an \nairstream will have the a& to impact or stag- \nnate at some point near the leading edge. The \npressure at this point of stagnation will be an \nabsolute static pressure equal to the total pres- \nsure of the airstream. \nIn other words, the \nstatic pressure at the stagnation point will be \ngreater than the atmospheric pressure by the \namount of the dynamic pressure of the air- \nstream. As the \nflow divides and proceeds \naround. the object, the increases in local ve- \nlocity produce decreases in static pressure. \nThis procedure of flow is best illustrated by the \nflow patterns and pressure distributions of \nfigure 1.7. \n\n\n \n \n \n \n [html]Table\n
PatientsPaltitude density ratio, ρ / p0
TableSult
The TAS is a function0
\n\n\n\n\n\n\n\nSTREAMLINE PATTERN AND PRES- \nSURE DISTRIBUTION. \nThe flow pattern of \nthe cylinder of figure 1.7 is characterized by \nthe streamlines which denote the local flow \ndirection. Velocity distribution \nis noted by \nthe streamline pattern since the streamlines \neffect a boundary of flow, and the airflow \nbetween the streamlines is similar to flow in a \nclosed tube. When the streamlines contract \nand are close together, high local velocities \nexist; when the streamlines expand and are \nfar apart, low local velocities exist. At the", + "page_start": 31, + "page_end": 31, + "source_file": "00-80T-80.pdf" + }, + { + "text": "[html]ALTITUDEFT.DENS1TY RAT1O σγσPRESSURE RATIO 8TEMPER − ATURE * FTEMPER − ATURE RATIOBSPEEDOF SCUND QKNOTSKINEMAT1CVISCOSITYVFT2 / SECO1.0000i. OOOO1.000059.001. OOOO661.7. 000158t0000.97110.98540.964455.430.9931659.5. OOO16120000.94280.97100.929851.870.9862657.2. 00016530000.91510.95660.896248.300.9794654.9OOO1694000O. 888I0.94240.863744.740.9725652.6. 00017450000.86170.92830.832041.170.9656650.3. OOO17860000.83590.91430.801437.600.9587647.9. OOO18270000.81060.90040.771634.040.9519645.6. OOO18780000.78600.88660.742830.470.9450643.3. 00019290000.76200.87290.7148Z6.900.9381640.9. 000197IOOOO0.73850.85930.6877≥ 3.340.9312638.6. 000202150000.62920.79320.56435.510.8969626.7. OOO229200000.532θ0.7299△△ 595− 12.32O. B625614.6. 000262250000.44810.66940.3711− 30.150.8281602.2Consumption300000.37410.61170.2970− 47.980.7937589.5OOO349350000.30990.55670.2353− 65.820.7594576.6COOO405# 360890.29710.54500.2234− 69.700.7519573.8. 0OO4194OOOO0.24620.49620.1851− 69.700.7519573.8. 000506450000.19360.44000.1455− 69.700.7519573.8. 000643500000.15220.39020.1145− 69.700.7519573.8. OOO818550000.11970.34600.0900− 69.700.7519573.8LOO1O40600000.09410.30680.0708− 69.700.75I9573.8. OO1323650000.07400.27 ≧ 10.0557− 69.70O. T519573.8. OO1682700000.05820.24130.0438− 69.700.7519573.8. OO2139750000.04580.21400.0344− 69.700.7519573.8. 002721800000.03600.18970.0271− 69.700.7519573.8. 003460850000.02800.16730.0213− 64.800.7613577.4. 004499900000.02170.14720.0168− 56.570.7772583.4. OO591950000.01690.12990.0134− 48.340.7931589.3.", + "page_start": 22, + "page_end": 22, + "source_file": "00-80T-80.pdf" + }, + { + "text": "be an unbalance of force to provide the ac- \nceleration. Since there is only air within the \ntube, the unbalance of force is provided by \nthe static pressure at station 1 being greater \nthan the static pressure at the constriction, \nstation 2. \n\n(2) The total energy of the air stream in \nthe tube is unchanged. However, the air- \n.’ stream energy may be in two forms. The \nairstream may have a potential energy which \nis related by the static pressure and a kimtic \nenergy by virtue of mass and motion. As \nthe total energy is unchanged, an increase in \nvelocity (kinetic energy) will be accompa- \nnied by a decrease in static pressure (poten- \ntial energy). This situation is analagous to \na ball rolling along-a smooth surface. As \nthe potential energy \nthe ball rolls downhill, \nis exchanged for kinetic \ndue to position \nenergy of motion. \nIf .friction- were negli- \ngibie, the change of potential energy would \nequal the change in ki,netic energy. This- is \nalso the case for the airflow within \nthe tube. \nThe relationship of static pressure and veloc- \nity is maintained throughout the length of the \ntube. As the flow moves past the constriction \ntoward station 3, the velocity decreases and \nthe static pressure increases. \n\n\n\nif the flow through \n\nthe pressure forces created on an aerodynamic \nsurface can be studied in a simple form which \nat first neglects the effect of friction and vis- \ncosity of the airflow. The most appropriate \nmeans of visualizing the effect of airflow and \nthe resulting aerodynamic pressures is to study \nthe fluid flow within a closed tube. \n\nSuppose a stream of air is flowing through \nthe tube shown in figure 1.2. The airflow at \nstation 1 in the tube has a certain velocity, \nstatic pressure, and density. As the airstream \napproaches the constriction at station 2 certain \nchanges must take place. Since the airflow \nthe tube, the mass flow at \nis enclosed within \nany point along the tube must be the same and \nthe velocity, pressure, or density must change \nto accommodate this continuity of flow. \n\ndistin- \nA \nis that \nguishing feature of submnic airflow \nchanges in pressure and velocity \ntake place \nwith sniall and negligible changes in density. \nFor this reason the study of subsonic airflow \ncan be simplified by neglecting the variation \nof density in the flow and assuming the flow \nto be incomprmiblc. Of course, at high flow \nspeeds whjch approach the speed of sound, the \nflow must be considered as compressible and \n“compressibility effects” taken into account. \nHowever, \nthe tube of \nfigure 1.2 is considered subsonic, the density of \nthe airstream is essentially constant at all sta- \ntions along the length. \n\nBERNOULLI’S EQUATION. \n\n\n\n\n\nthe same mass flow. As \n\n\n\nThe Bernoulli equation for incompressible \nflow is most readily explained ,by accounting \nfor the energy of the~airflow within \nthe tube. \nAs the airstream has no energy added or sub- \ntracted at any point, the sum of the potential \n+id kinetic energy must be constant. The \nkinetic energy of an object is found by: \n\nIf the density of the flow remains constant, \nstatic pressure and velocity are the variable \nquantities. As the flow approaches the con- \nstriction of station 2 the velocity must increase \nto maintain \nthe \nvelocity increases the static pressure will de- \ncrease and the decrease in static pressure which \naccompanies the increase in velocity can be \nverified in two ways: \n(I) Newton’s \n\n“KE. =%MV= \n\nwhere K;E. = kinetic energy, ft.-lbs. \nM = mass, slugs \nV’=velocity, ft./set. \n\nThe kinetic energy of a cubic foot of air is: \n\nK&x,, \n\nlaws of motion state the \nrequirement of an unbalanced force to pro- \nduce an acceleration (velocity change). \nIf \nthe airstream experiences an increase in veloc- \nity approaching the constriction, there must \n\n\n\nwhere g= kinetic energy per cu. ft., psf \n\np=air density, slugs per cu. ft. \nV=ait velocity, ft./set.", + "page_start": 23, + "page_end": 23, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Thus, certain corrections must apply to the \ninstrumentation as well as the aircraft per- \nformance if the operating conditions do not \nfit the standard atmosphere. In order to prop- \nerly account for the nonstandard atmosphere \ncertain terms must be defined. Pressure .&itudc \nthe standard atmosphere \nis the altitude \ncorresponditrg to a particular pressure. The \nis essentially a sensitive \naircraft altimeter \nbarometer calibrated to \nin \nindicate altitude \nIf the altimeter is \nthe staotlard atmosphere. \nset for 29.92 in. Hg the altitude indicated is \nthe pressure altitude-the altitude in the stand- \nard atmosphere corresponding to the sensed \npressure. Of course, this indicated pressure \naltitude may not be the actual height above \nsea level due to variations \nin remperature, \nlapse rate; atniospheric pressure, and possible \nerrors in the sensed pressure. \n\nThis \nin \nrelationship has great application \naerodynamics and is quite fundamental and \nnecessary in certain parts of airplane perform- \nance. \n\nVISCOSITY. The viscosity of the air is \nin scale and friction effects. The \n\nimportant \ncoefficient of absolute viscosity is the propor- \ntion between the shearing stress and velocity \ngradient for a fluid flow. The viscosity of \ngases is unusual in that the viscosity is gen- \nerally a function of temperature alone and an \nincrease in temperature increases the viscosity. \nThe coefficient of absolute viscosity is assigned \nthe shorthand notation I, (mu). Since many \nparts of aerodynamics involve consideration of \nviscosity and density, a more usual form of \nviscosity measure is the proportion of the co- \nefficient of absolute viscosity and density. \nThis combination \nis termed the “kinematic \nviscosity” and is noted by Y (nu). \n\n\n\nkinematic viscosity \n\ncc coefficient of absolute viscosity \ndensity \n\nv=PlP \n\n\n\n\n\n\nfactors requiring con- \n\n\n\n\n\n\n\nThe more appropriate term for correlating \naerodynamic performance in the nonstandard \natmosphere is density &it&-the \naltitude in \nthe standard atmosphere corresponding to a \nparticular value of air density. The computa- \ntion of density altitude must certainly involve \nconsideration of pressure (pressure altitude) \nand temperature. Figure 1.6 illustrates \nthe \nmanner in which pressure altitude and tem- \nperature combine to produce a certain density \naltitude. This chart is quite standard in use \nand is usually included in the performance \nsection of the flight handbook. Many subject \nareas of aerodynamics and aircraft performance \nwill emphasize density altitude and temperature \nas the most important \nsideration. \n\nThe kinematic viscosity of air at standard sea \nlevel conditions is 0.0001576 square feet per \nsecond. At an altitude of 40,000 feet the \nkinematic viscosity is increased to 0.0005059 \nsquare foot per second. \n\nIn order to provide a common denominator \nfor comparison of various aircraft, a standard \natmosphere has been adopted. The standard \natmosphere actually represents the mean or \naverage properties of the atmosphere. Figure \n1.1 illustrates the variation of the most im- \nportant properties of the air throughout \nthe \nstandard atmosphere. Notice that the lapse \nrate is constant in the troposphere and the \nstratosphere begins with the isothermal region. \nSince all aircraft performance is compared \nand,evaluated in the environment of the stand- \nard atmosphere, all of the aircraft instrumenta- \ntion is calibrated for the standard atmosphere. \n\nBERNOULLI’S PRINCIPLE AND SUBSONIC \n\nAIRFLOW \n\nAll of the external aerodynamic forces on a \nsurface are the result of air pressure or air fric- \ntion. Friction effects are generally confined to \na thin layer of air in the immediate vicinity of \nthe surface and friction forces are not the pre- \ndominating aerodynamic forces. Therefore,", + "page_start": 21, + "page_end": 21, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The overall \n\n(4) Due to the change in upwash, down- \nwash, and tip vortices, there will be a change \nin position error of the airspeed system, as- \nsociated with ground effect. In the majority \nof cases, ground effect will cause an increase \nin the local pressure at the static source and \nproduce a lower indication of airspeed and \naltitude. \nDuring the landing pha~c of flight, the effect \nto the ground plane must be \nof proximity \nunderstood and appreciated. \nIf the airplane \nis brought into ground effect with a constant \nangle of attack, the airplane will experience", + "page_start": 398, + "page_end": 398, + "source_file": "00-80T-80.pdf" + }, + { + "text": "airplane static of low \n\nIn such a case, the “feel” \n\n\n\nNAVWE,PS OD-80T-80 \nAPPLICATION OF AERODYNAMICS \nTO SPECIFIC PROBLEMS OF FLYING \n\nthe forces acting on the airplane, i.e., \nthrust, weight, and drag. \nANGLE OF ATTACK VERSUS AIRSPEED. \nIn order to achieve equilibrium in the vertical \ndirection, the net lift must equal the airplane \nweight. This is a contingency of steady, level \nflight or steady climbing and descending flight \nwhen the flight path inclination is slight. A \nrefinement of the basic lift equation defines the \nlift coefficient, \nrelationship of speed, weight, \netc., for the condition of lift equal to weight. \n\nlift, \n\nV=17.2 \ny \nJ TP \n\nor \n\n\n \n \n \n \n [html]\n
VR = 17.24 /°/°
Parameters
Paw velocity, knots ( TAF ) F1 = equivalent airspeel, knots ( EAF ) W = group weight, Ibs. I = weing surface area, sp. fc. W /( I = weing loading, pufaralitusle density ratioGo = life coefficient
\n\n\n\nlent airspeed to provide lift equal to weight. \nHence, angle of attack is the primary .control of \nIf an airplane is es- \nairspeed in mad3 fright. \ntablished in steady, level flight at a particular \nairspeed, any increase in angle of attack will \nresult in some reduced airspeed common to the \nincreased C,. A decrease in angle of attack \nwill \nresult in some increased airspeed com- \nmon to the decreased CL. As a result of the \nchange in airspeed, the airplane may climb or \ndescend if there is no change in powet setting \nbut the change in airspeed was provided by \nthe change in angle of attack. The state of \nthe airplane during the change in speed will \nbe some transient condition between the \noriginal and final steady state conditions. \n\nPrimary control of airspeed in steady flight \nby angle of attack is an important principle. \nWith some configurations of airplanes, low \nspeed flight will bring about a low level of \nlongitudinal stick force stability and possi- \nlongitudi- \nbility \nnal stability. \nfor \nairspeed will be light and may not furnish \na ready reference for easy control of the air- \nIn addition, the high angles of attack \nplane. \ncommon to low speed flight are likely to pro- \nvide large position errors to the airspeed indi- \ncating system. Thus, proper control of air- \nspeed will be enhanced by good “attitude” \nflying or-when \npoor-an angle of attack indicator. \n\n\n\n\n\nrequires equilibrium in both \n\n\n\n\n\nthe visual t;eference field is \n\nIn \norder for an airplane to achieve ‘equilibrium at \nconstant altitude, lift must be equal to weight \nand thrust must be equal to drag. Steady, \nlevel flight \nthe \nvertical and horizontal directions. For the \ncase of climbing or descending flight condi- \ntions, a component of weight is inclined along \nis \nthe flight path direction and equilibrium \nachieved when thrust is not equal to the drag. \nWhen the airplane is in a steady climb or \ndescent, the rate of climb is related by the \nfollowing expression: \n\nRATE OF CLIMB AND .DESCENT. \n\nFor the conditions of steady flight with \na given airplane, each angle of attack corre- \nsponds to a specific airspeed. Each angle of \nattack produces a specific value of CL and each \nvalue of C, requires a specific value of equiva- \n\n350", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" + }, + { + "text": "LOAD \nFACTOR, \nn \n\n\nLIMIT \nLIMIT \nAIRSPEED \nAIRSPEED \nKNOTS \n575 KNOTS \n575 \n\n\n\n\n\n\n\nGROSS WEIGHT - 16.000 LBS \nCLEAN CONFIGURATION \nSEA LEVEL ALTITUDE \nSYMMETRICAL LOADING \n12- \nI ,.,/,,.~A~~‘~,, FACTOR i \n\nII- \n\nIO- \n\n9- \n\nB- ~/POSlT,VE LlMlT LOAD FACTOR i \n\n7- \n\n6- \n\n5- \n\n4- \n\n3 \n\n2- \n\nI-. \nINDICATED AIRSPEED \nINDICATED \nAIRSPEED - KNOTS \n- KNOTS \n-o-. \n300 \n300 400 \n400 500 \n500 200 600 \nI 600 \n-I- \n\n-2- \nNEGATIVE LIMIT LOAO FACTOR \n-3- \nSTALL \n-4- \n\nNEGATIVE ULTIMATE \n\\ \n\nLOAD FACTOR \n\n-5- \n\n\nFigure 5.3. Flight Strength Diagram", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the phenomenon associated with the production of lift by an airfoil ?", + "target_page": 34, + "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "is capable of producing lift \n\nin figure 1.8. \n\n\n\n\n\n\n\non the upper surface with \n\n\n\nrotation will be quite a “curve ball artist” \nthe golfer that cannot control the lateral mo- \ntion of the club face striking the golf ball will \nimpart an uncontrollable spin and have trouble \nwith a “hook” or “slice.” \n\nWhile a rotating cylinder can produce a net \nfrom the circulatory flow, the method is \nlift \nrelatively \ninefficient and only serves to point \nout the relationship between lift and circula-, \ntion. An airfoil \nwith relatively high efficiency and the process \nis illustrated \nIf a symmetrical \nairfoil \nis placed at zero angle of attack to the \nairstream, the streamline pattern and pressure \ndistribution give evidence of zero lift. HOW- \never, if the airfoil \nis given a positive angle of \nattack, changes occur in the streamline pattern \nand pressure distribution similar to changes \ncaused by the addition of circulation \nto the \ncylinder. The positive angle of attack causes \nincreased velocity \nan increase in upper surface suction while the \ndecreased velocity on the lower surface causes \na decrease in \nlower surface suction. Also, \nthe \nupwash is generated ahead of the airfoil, \nforward stagnation point moves under the \nleading edge, and a downwash is evident aft \nThe pressure distribution 0” \nof the airfoil. \nthe airfoil now provides a net force perpendicu- \nlar to the airstream-lift. \n\n\n\n\n\nThe effect of free stream density and velocity \nis a necessary consideration when studying the \ndevelopment of the various aerodynamic forces. \nSuppose that a particular shape of airfoil \nis \nfixed at a particular angle to the airstream. \nThe relative velocity and pressure distribution \nwill be determined by the shape of the airfoil \nand the angle to the airstream. The effect of \nvarying the airfoil size, air density and air- \nspeed is shown in figure 1.9. \nIf the same air- \nfoil shape is placed at the same angle to an \nairstream with \ntwice as great a dynamic pres- \nsure the magnitude of the pressure distribution \nwill be twice as great but the r&rive shape of \nthe pressure distribution will be the same. \nWith \ntwice as great a pressure existing over \nthe surface, all aerodynamic forces and mo- \nib \nments will ~double. If a half-size airfoil \nplaced at the same angle to the original air- \nstream, the magnitude of the pressure distri- \nbution is the same as the origina! airfoi! and \nagain the relative shape of the pressure dis- \ntribution \nis identical. The same pressure act- \ning on the half-size surface would reduce all \naerodynamic forces to one-half that of the \noriginal. This similarity of \nflow patterns \nmeans that the stagnation point occurs at the \nsame place, the peak suction pressure occurs \nat the same place, and the actual magnitude of \nthe aerodynamic forces and moments depends \nupon the airstream dynamic pressure and the \nsurface area. This concept is extremely im- \nportant when attempting to separate and ana- \nlyze the most important factors affecting the \ndevelopment of aerodynamic forces. \n\n\n\n\n\n\n\nSince the \nTERMINOLOGY. \nshape of an airfoil and the inclination to the \nairstream are so important in determining the \npressure distribution, it is necessary to properly \nterminology. Figure 1.10 \ndefine the airfoil \nshows a typical airfoil and illustrates \nthe \nvarious items of airfoil \n\nAIRFOIL \n\nterminology \n\n(1) The chord line is a straight line connect- \ning the leading and trailing edges of the \nairfoil. \n\n\n \n \n \n \n [html]\n
accountConsimatelyone - third the netlift.
TableTableTableTable
", + "page_start": 37, + "page_end": 37, + "source_file": "00-80T-80.pdf" + }, + { + "text": "of the distributed \n\n\n\n\n\nand high power, the dynamic pressure in the \nshaded area can be much greater than the free \nstream and this causes considerably greater \nlift \nthan at zero thrust. At high power con- \nditions the induced flow also causes an effect \nsimilar to boundary layer control and increases \nthe maximum lift angle of attack. The typical \nfour-engine propeller driven airplane may have \n60 to 80 percent of the wing area affected by \nthe induced flow and power effects on stall \nspeeds may be considerable. Also, the lift of \nthe airplane at a given angle of attack and air- \nspeed will be greatly affected. Suppose the \nairplane shown is in the process of landing \nflare from a power-on approach. \nIf there is \na sharp, sudden reduction of power, the air- \nplane may drop suddenly because of the reduced \nlift. \n\nnet lift produced by the airfoil \nis difference \nbetween the lifts on the upper and lower sur- \nfaces. The point along the chord where the \nis effectively concentrated is \ndistributed \ntermed the “center of pressure, c.p.“ \nThe \ncenter of pressure is essentially the “center of \ngravity” \nlift pressure and \nthe location of the c.p. is a function of camber \nand section lift coe&cient \n\nlift \n\n\n\n\n\n\n\n\n\nAnother aerodynamic reference point is the \n“aerodynamic center, d.e.” The aerodynamic \ncenter is defmed as the point along the chord \nwhere all changes in lift effectively take place. \nTo visualize the existence of such a point, \nnotice the change in pressure distribution with \nthe symmetrical airfoil \nangle of attack \nthe upper \nof figure 1.21. When at zero lift, \nand lower surface lifts are equal and located \nat the same point. With an increase in angle \nof attack, the upper surface lift increases while \nthe lower surface lift decreases. The change \n,of lift has taken place with no change in the \ncenter of pressure-a characteristic of sym- \nmetrical airfoils. \n\nfor \n\nThe typical jet aircraft does not experience \nthe \ninduced flow velocities encountered in \npropeller driven airplanes, thus the only sig- \nnificant factor is the vertical component of \nthrust. Since this vertical component con- \ntributes to supporting the airplane, less aero- \nis required to hold the airplane \ndynamic lift \nIf the thrust is small and the thrust \nin flight. \ninclination \nis slight at maximum lift angle, \nre- \nonly negligible changes in stall speed will \nsult. On the other hand, if the thrust is very \ngreat and is given a large inclination at maxi- \nmum lift angle, the effect on stall speed can \nbe very large. One important \nrelationship \nremains-since there is very little induced flow \nfrom the jet, the angle of attack at stall is \nessentially the same power-on or power-off. \n\n\n\n\n\n\n\nthe cambered airfoil of \nNext, consider \nfigure 1.21 at zero lift. \nTo produce zero lift, \nthe upper and lower surface lifts must be equal. \nOne difference noted from the symmetrical air- \nfoil is that the upper and lower surface lifts are \nnot opposite one another. While no net lift \nthe couple produced by \nexists on the airfoil, \nthe upper and lower surface lifts creates a nose \ndown moment. As the angle of attack is in- \ncreased, the upper surface lift \nincreases while \nlower surface lift decreases. While a \nthe \nchange in lift has taken place, no change in \nmoment takes place about the point where \nthe lift change occurs. Since the moment \nabout the aerodynamic center is the product \nof a force (lift at the c.P.) and a lever arm \n(distance from c.9. to a.~.), an increase in lift \nmoves the center of pressure toward the aero- \ndynamic center. \n\nDEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" + }, + { + "text": "is one half \n\nvortex filaments which consist of the tip or \ntrailing vortices coupled with \nthe bound or \nline vortex. The tip vortices are coupled with \nthe bound vortex when circulation is induced \nwith \nlift. The effect of this vortex system is \nto create certain vertical velocity components \nin the vicinity of the wing. The illustration \nof these vertical velocities shows that ahead \nof the wing the bound vortex induces an up- \nwash. Behind the wing, \nthe coupled action \nof the bound vortex and the tip vortices in- \nduces a downwash. With \nthe action of tip \nand bound vortices coupled, a final vertical \nvelocity (220) is imparted to the airstream by \nthe wing producing lift. \nThis result is an \ninevitable consequence of a finite wing pro- \nducing lift. \nThe wing Producing lift applies \nthe equal and opposite force to the airstream \nand deflects it downward. One of the impor- \ntant factors in this system is that a downward \nvelocity is created at the aerodynamic center \n(w) which \nthe final downward \nvelocity imparted to the airstream (2~). \n\nage relative wind which is different from the \nremote free stream wind. Since the aerody- \nnamic forces created by the airfoil sections of a \nwing depend upon the immediate airstream in \nwhich \nthey operate, consideration must be \ngiven to the effect of the inclined average rela- \ntive wind. \n\nTo create a certain lift coefficient with \n\n\n\n\n\nthe vertical,velocity \n\n\n\n\n\nthe \nairfoil section, a certain angle must exist be- \ntween the airfoil chord line and the avcragc \nrelative wind. This angle of attack is a,,, the \nsection angle of attack. However, as this lift \nis developed on the wing, downwash is in- \nis in- \ncurred and the average relative wind \nclined. Thus, the wing must be given some \nangle attack greater than the required section \nangle of attack to account for the inclination of \nthe average relative wind. Since the wing \nmust be given this additional angle of attack \nbecause of the induced flow, the angle between \nthe average reiative wind arid tlie remote fiCC \nstream is termed the induced angle of attack, \nai. From this influence, the wing angle of \nattack is the sum of the section and induced \nangles of attack. \n\nThe effect of the vertical velocities in the \nvicinity of the wing is best appreciated when \nthey are added vectorially \nto the airstream \nvelocity. The remote free stream well ahead \nof the wing is unaffected and its direction is \nopposite the flight path of the airplane. ‘Aft \nof the wing, the vertical velocity (2~) adds to \nthe airstream velocity to produce the down- \nwash angle e (epsilon). At the aerodynamic \ncenter of the wing, \n(w) \nadds to the airstream velocity to produce a \ndownward deflection of the airstream one-half \nIn other words, \nthat of the downwash angle. \nthe wing producing lift by the deflection of an \nairstream incurs a downward slant co the wind \nin the immediate vicinity of the wing. Hence, \nthe JeCtionJ of the wing operate in an average rela- \ntive wind which is inclined downward one-half the \nfinal dowraw& angle. This is one important \nfeature which distinguishes the aerodynamic \nproperties of a wing from \nthe aerodynamic \nproperties of an airfoil section. \n\na=ul)+a; \na= wing angle of attack \nOLD= section angle of attack \nOI;= induced angle of attack \n\n\n\nINDUCED DRAG", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" + }, + { + "text": "lift. \n\n\n\ncontrol speeds” set by these factors rather than \nsimple stall speeds based on C&,. \n\nWhen a wing of a given planform has various \nhigh lift devices added, the lift distribution and \nstall pattern can be greatly affected. Deflec- \ntion of trailing edge flaps increases the local \nlift coe5cients in the flapped areas and since \nthe stall angle of the flapped section is de- \ncreased, initial \nthe \nflapped area. The extension of slats simply \nallows the slatted areas to go to higher lift \ncoe5cients and angles of attack and generally \nAlso, power \nthat vicinity. \ndelays stall \neffects may adversely affect the stall pattern of \nthe propeller powered airplane. When the \npropeller powered airplane is at high power \nand low speed, the flow induced at the wing \nroot by the slipstream may cause considerable \ndelay in the stall of the root sections. Hence, \nthe propeller powered airplane may have its \nmost undesirable stall characteristics during the \npower-on stall rather than the power-off stall. \n\nstall usually begins in \n\n\n\nthe wing root boundary layer to be more easily \nseparated in the presence of an adverse pressure \ngradient. Since the upper wing surface has the \nmore critical pressure gradients, a low wing \nposition on a circular fuselage would create \ngreater interference drag than a high wing \nposition. Adequate filleting and control of \nlocal pressure gradients is necessary to mini- \nmize such additional drag due to interference. \nThe sum of all the drags due to form, fric- \ntion, leakage and momentum losses, and inter- \nference drag is termed “parasite” drag since \nthe develop- \nit is not directly associated with \nment of lift. While this parasite drag is not \nthe production of lift \ndirectly associated with \nThe variation of \nit \nis a variable with \nlift coef- \nparasite drag coefficient, C+, with \nficient, C,, is shown for a typical airplane in \nfigure 1.34. The minimum parasite drag co- \nefficient, CDpmi,, usually occurs at or near zero \nlift and parasite drag coefficient \nincreases \nabove this point,in a smooth curve. The in- \nduced drag coefficient is shown on the same \ngraph for purposes of comparison since the \ntotal drag of the airplane is a sum of the \nparasite and induced drag. \n\n\n\n\n\nIn many parts of airplane performance it is \nnecessary to completely distinguish between \ndrag due to lift and drag not due to lift. The \ntotal drag of an airplane is the sum of the para- \nsite and induced drags. \n\nG=c++cD; \n\nwhere \n\nC, = airplane drag coefficient \n\nC+=parasite drag coefficient \n\nC,,= induced drag coeaicient \n\n\n\n\n\n\n\nPARASITE DRAG \n\nIn addition to the drag caused by the de- \nvelopment of lift (induced drag) there is the \nobvious drag which is nor due to the develop \nment of lift. A wing surface even at zero lift \nwill have “profile” \ndrag due to skin friction \nand form. The other components of the air- \nplane such as the fuselage, tail, nacelles, etc., \ncontribute to drag because of their own form \nand skin friction. Any loss of momentum of \nthe airstream due to powerplant cooling, air \nconditioning, or leakage through construction \nor access gaps is, in effect, an additional drag. \nWhen the various components of the airplane \nare put together the total drag will be greater \nthan the sum of the individual components \nbecause of “interference” of one surface on the \nother. \n\nFrom inspection of figure 1.34 it is seen that \nboth CD, and CD, vary with \nlift coefticient. \nHowever, the usual variation of parasite drag \nallows a simple correlation with \nthe induced \nIn effect, the part of parasite drag \ndrag term. \nabove the minimum at zero lift can be “lumped” The most usual interference of importance \noccurs at the wing-body intersection where the \ngrowth of boundary layer on the fuselage re- \nduces the boundary layer velocities on the wing \nroot surface. This reduction in energy allows", + "page_start": 104, + "page_end": 104, + "source_file": "00-80T-80.pdf" + }, + { + "text": "airfoil do not ,necessarily occtir at the point of \nmaximum thickness. However, a similarity \ndoes exist in that the minimum pressure points \ncorrespond to the points where the streamlines \nare closest together and this condition exists \nwhen the streamlines are forced to the great- \nest curvature. \n\n\nis the “circulation” \n\nthe \n\n\n\n\n\n\n\n\n\nforward stagnation point \nthe local velocity \nis zero and the maximum positive pressure re- \nsults. As the flow proceeds from the forward \nstagnation point \nincreases as \nshown by the change in streamlines. The \nlocal velocities reach a maximum at the upper \nand lower extremities and a peak suction pres- \nsure is produced at these points on the cylinder. \n(NOTE: Positive pressures are pressures above \natmospheric and negative or .ruction pressures \nare less than atmospheric.) As \nflow \ncontinues aft from the peak suction pressure, \nthe diverging streamlines indicate decreasing \nlocal velocities and increasing local pressures. \nIf friction and compressibility effects are not \nconsidered, the velocity would decrease to zero \nat the aft stagnation point and the full stagna- \ntion pressure would be recovered. The pressure \ndistribution \nfor the cylinder in perfect fluid \nflow would be symmetrical and no net force \n(lift or dragj wvuid rcsuit. Of course, thr \nrelationship between static pressure and ~eloc- \nity along the surface is defined by Bernoulli’s \nequation. \n\nthe velocity \n\nGENERATION OF LIFT. An important \nthe production \nphenomenon associated with \nim- \nof lift by an airfoil \nparted to the airstream. The best practical \nillustration of this phenomenon is shown in \nfigure 1.8 by the streamlines and pressure dis- \ntributions existing on cylinders in an airstream. \nThe cylinder without circulation has a sym- \nmetrical streamline pattern and a pressure dis- \ntribution which creates n-0 n_et lift. \nIf the \nis given a clockwise rotation and \ncylinder \ninduces a rotational or circulatory flow, a dis- \ntinct change takes place in the streamline pat- \ntern and p’ess.~re &str~‘“u~~oii, The vriocitirs \ndue to the vortex of circulatory \nflow cause \nincreased 104 velocity on the upper surface \nof the cylinder and decreased local velocity on \nthe lower surface of the cylinder. Also, the \ncirculatory flow produces an upwash immedi- \nately ahead and downwash immediately be- \nhind the cylinder and both fore and aft stagna- \ntion points are lowered. \n\n\n\n\n\n\n\n\n\n\n\nThe flow pattern for the cylinder in an actual \nfluid demonstrates the effect of friction or \nviscosity. The viscosity of air produces a thin \nlayer of retarded flow immediately adjacent \nto the surface. The energy expended in this \n“boundary \nlayer” can alter the pressure dis- \ntribution and destroy the symmetry of the \npattern. The force unbalance caused by the \nchange in pressure distribution creates a drag \nforce which is in addition to the drag due to \nskin friction.", + "page_start": 33, + "page_end": 33, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The effect of the addition of circulatory flow \nis appreciated by the change in the pressure \ndistribution on the cylinder. The increased \nlocal velocity on the upper surface causes an \nincrease in upper surface suction while \nthe \ndecreased local velocity on the lower surface \ncauses a decrease in lower surface suction. As \na result, the cylinder with circulation will \nproduce a net lift. This mechanically induced \ncirculation-called Magnus effect-illustrates \nthe relationship between circulation and lift \nand is important to golfers, baseball and tennis \nplayers as well as pilots and aerodynamicists. \nThe curvature of the flight path of a golf ball \nor baseball rcluites an unbalance df force \nwhich is created by rotation of the ball. The \npitcher that can accurately control a .powerful The streamline pattern for the symmetrical \nairfoil of figure 1.7 again provides the basis \nfor \nthe velocity and pressure distribution. \nAt the leading edge the streamlines are widely \ndiverged in the vicinity of the positive pres- \nsures. The maximum \nlocal velocities and \nsuction (or negative) pressures exist where the \nstreamlines are the closest together, One \nnotable difference between the flow on the \ncylinder and the airfoil \nis that the maximum \nvelocity and minimum pressure points on the", + "page_start": 33, + "page_end": 33, + "source_file": "00-80T-80.pdf" + }, + { + "text": "DEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS \n\nThe distribution of pressure over a surface \nis the ,source of the aerodynamic moments as \nwell as the aerodynamic forces. A typical \nexample of this fact is the pressure distribution \nacting on the cambered airfoil of figure 1.21. \nThe upper surface has pressures distributed \nwhich produce the upper surface lift; the lower \nsurface has pressures distributed which pro- \nduce the lower surface lift. Of course, the It should be noted that the symmetrical air- \nfoil at zero lift has no pitching moment about \nthe aerodynamic center because the upper and", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" + }, + { + "text": "exists. This situation creates an induced angle \nof attack at the root which is less than the \naverage for the wing and a local section angle \nof attack higher than the average for the wing. \nThe result is shown by the graph of figure 1.32 \nwhich depicts a local lift coefficient at the root \nlift \nalmost 20 percent greater than the wing \ncoefficient. \n\nmatched with a planformwhose chord is dis- \ntributed in an elliptical fashion (the elliptical \nwing), each square foot of area along the span \nproduces exactly the same lift pressure. The \nelliptical wing planform then has each section \nof the wing working at exactly the same local \nlift coefhcient and the induced downflow at \nthe wing is uniform throughout the span. \nIn \nthe aerodynamic sense, the elliptical. wing is \nthe most efficient planform because the uni- \nformity of lift coefficient and downwash incurs \nrbt iea$t induced drag for a given aspect ratio. \nThe merit of any wing @anform is then meas- \nured by the closeness with which the distribu- \ntion of lift coefficient and downwash approach \nthat of the elliptical planform. \n\n\nThe effect of the elliptical planform is illus- \ntrated in figure 1.32 by the plot of local lift \n\ncoefficient to wing \n\n,4;..t,or, \n\n\n\n-11:. -!-~I -L. \n\n\n\n\n\nis not capable of holding \n\n\n\n\n\n\n\nThe effect of the rectangular planform may \nbe appreciated by matching a near elliptical \na \nlift distribution with a planform with \nconstant chord. \ntip \nThe chords near ‘the \ndevelop less lift pressure than the root and \nconsequently have lower section lift coe&- \ncients. The great nonuniformity of local lift \ncoefficient along the span implies that some \nsections carry .more than their share of the \nload while others carry less than their share \nof the load. Hence, for a given aspect ratio, \nthe rectangular planform will be less efficient \n-t-- \nFor exampie, a \nLlLill UK C‘lqJLlCal wing. \nrectangular wing of AR=6 would have 16 \npercent higher induced angle of attack for the \nwing and 5 percent higher induced drag than \nan elliptical wing of the same aspect ratio. \n\nversus \n\nlift coefficient, f! \nG’ \nTbac e!liptical wing p*\nscm:spnn L.“CY.ICG. \n\nduces a constant value of$=J.O throughout \n\nAt the other extreme of taper is the pointed \nwing which has a taper ratio of zero. The \nextremely small parcel of area at the pointed \ntip \nthe main tip \nvortex at the tip and a drastic change in down- \nwash distribution \nresults. The pointed wing \nhas greatest downwash at the root and this \ndownwash decreases toward the tip. \nIn the \ntip, an \nimmediate vicinity of the pointed \nindicates that \nupwash is encountered which \nnegative induced angles of attack exist in this \narea. The resulting variation of local \nlift \ncoefficient shows low cr at the root and very \nhigh c, at the tip. This effect may be appre- \nciated by realizing that the wide chords at \nthe root produce low lift pressures while the \nvery narrow chords toward the tip are sub- \nlift pressures.. The varia- \nject to very high", + "page_start": 93, + "page_end": 93, + "source_file": "00-80T-80.pdf" + }, + { + "text": "thus, a constant dynamic pressure and equiva- \nlent airspeed. As the airplane descends into \nground effect, the following. effects will \ntake \nplace: \n\n(1) Because of the reduced induced angle \nof attack and change in lift distribution, a \nsmaller wing angle of attack will be required \nIf a \nto produce the same lift coefficient. \nis maintained as \nconstant pitch attitude \nground effect is encountered, an increase in \nlift coefficient will be incurred. \n\n(2) The reduction in induced flow due to \nground effect causes a significant reduction \nin induced drag but causes no direct effect on \nparasite drag. As a result of the reduction \nin induced drag, the thrust required at low \nspeeds will be reduced. \n\n(3) The reduction in downwash due to \nground effect will produce a change in longi- \ntudinal stability and trim. Generally, the \nreduction in downwash at the horizontal \ntail increases the contribution to static longi- \nIn addition, the reduction \ntudinal stability. \nof downwash at the tail usually requires \na greater up elevator to trim the airplane at \na specific lift coefficient. For the conven- \ntional airplane configuration, encountering \nground effect will produce a nose-down \nchange in pitching moment. Of course, the \nincrease in stability and trim change associ- \nated with ground effect provide a critical re- \nquirement of adequate longitudinal control \npower for landing and takeoff. \n\n\n\n\n\npercent and, when the wing \nequal to one-tenth the span (h/b=O.l), \nreduction \nThus, a large reduction in induced drag will \ntake place only when the wing is very close \nto \nthe ground. Because of this variation, \nground effect is most usually recognized during \nthe liftoff of takeoff or prior to touchdown on \nlanding. \n\nis at a height \nthe \ninduced drag is 47.6 percent. in \n\nThe reduction of the tip or trailing vortices \ndue to ground effect alters the spanwise lift \ndistribution and reduces the induced angle of \nrequire \nIn this case, the wing will \nattack. \na lower angle of attack in ground effect to \nproduce the same lift coefficient. This effect \nis illustrated by the lift curves of figure 6.9 \nwhich show that the airplane in ground effect \nwill develop a greater slope of the lift curve. \nFor the wing in ground effect, a lower angle of \nattack is necessary to produce the same lift \ncoefficient or, if a constant angle of attack is \nmaintained, an increase in lift coefficient will \nresult. \n\nFigure 6.9 illustrates the manner in which \nground effect will alter the curve of thrust re- \nquired versus velocity. Since induced drag \npredominates at low speeds, the reduction of \ninduced drag due to ground effect will cause \nthe most significant reduction of thrust re- \nquired (parasite plus induced drag) only at \nlow speeds. At high speeds where parasite \ndrag predominates, the induced drag is but \na small part of the total drag and ground \neffect causes no significant change in thrust re- \nquired. Because ground effect involves the \ninduced effects of airplane when in close prox- \nimity to the ground, its effects are of greatest \nconcern during the takeoff and landing. Ordi- \nnarily, \nin \nwhich the airplane would be in close proximity \nto the ground. \n\nthese are the only phases of flight \n\n\n\n\nGROUND EFFECT ON SPECIFIC FLIGHT \nCONDITIONS. \ninfluence of \nground effect is best realized by assuming that \nthe airplane descends into ground effect while \nmaintaining a constant lift coefficient and, \n\nThe overall", + "page_start": 398, + "page_end": 398, + "source_file": "00-80T-80.pdf" + }, + { + "text": "a=ul)+a; \na= wing angle of attack \nOLD= section angle of attack \nOI;= induced angle of attack \n\n\n\nINDUCED DRAG \n\nAnother important influence of the induced \nflow is the orientation of the actual lift on a \nwing. Figure 1.30 illustrates the fact that the \nlift produced by the wing sections is perpen- \ndicular to the average relative wind. Since \nis inclined down- \nthe average relative wind \nis inclined aft, by the \nward, the section lift \nsame amount-the \ninduced angle of attack, \nai. The lift and drag of a wing must continue \nto be referred perpendicular and parallel to the \nIn this \nremote free stream ahead of the wing. \nrespect, the lift on the wing has a component \nof force parallel to the remote free stream. \nin the drag direction \nThis component of lift \nunavoidable-conse- \nis the undesirable-but", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What are the recyclable waste ?", + "target_page": 3, + "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Metal packaging,**\n**even the smallest ones**\n\n**NEW**\n**All other packaging** \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**RECYCLABLE WASTE**\n\n**All types of paper**\n**and cardboard**\n\n\n\n\n\n\n**Plastic bottles and flasks**\n\n\n\n\n\n**YELLOW BIN OR**\n**YELLOW COLUMN**\n\n**SORTING ERROR IN YELLOW BIN = YELLOW BIN NOT COLLECTED**\n\n**GOOD SORTING HABITS: EMPTY THEM WELL, NO NEED WASH THEM, PUT IN THE**\n**CONTAINER SEPARATE FROM EACH OTHER AND WITHOUT BAG**\n\n**ORGANIC WASTE**\n\n**//50% green materials : all fruit and vegetable**\n**peelings, leftover meat, egg shells, tea and**\n**coffee…**\n\n**//50% brown materials : dead leaves, twigs,**\n**kitchen rolls, shavings, possibly paper,**\n**newspaper and cardboard …**", + "page_start": 2, + "page_end": 2, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "**REDUCING**\n**OUR**\n**CARBON**\n**FOOTPRINT**\n\nour annual report is printed on stock \ncontaining recycled material. Please \nrecycle. our report is also available \non‑line at: killamproperties.com/ \nfinancial‑reports \n\nK i l l a m P r oPe r t i e s in c | 2 0 1 3 9 7", + "page_start": 96, + "page_end": 96, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon.", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "This annual report is printed on FSC® certified paper. \nThe recycled content of our paper is 30% post-consumer waste. \n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA. \n374047840 PLEASE RECYCLE.", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "This annual report is printed on FSC® certified paper. \nThe recycled content of our paper is 30% post-consumer waste. \n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA. \n374047840 PLEASE RECYCLE.", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "*Transfer and Disposal Services.*We own or operate 96 transfer stations. We deposit waste at these \nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport \nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had \napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of \napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based \non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. \nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated \nsoils. See \"\"Ì Properties.'' \n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently \npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and \nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, \nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, \nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be \nmade that all future expansions will be permitted as designed. \n\n*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. \n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to \nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our \ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to \nlarge \"\"Fortune 500'' companies and municipalities. \n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts \nprogram in response to our customers' needs. \n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not \noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the \nacquired companies' local tradenames as used in each geographic market in which we operate. \n\n**Customers**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "buÅer land and other contiguous land owned by our company. \n\n(3) Permitted acreage consists of all acreage at the landÑll encompassed by an active permit to dispose of waste. \n(4) Unused permitted acreage consists of all acreage at the landÑll encompassed by an active permit on which disposal operations have not \ncommenced. \n\n18", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "s Shimura Center \npulverized at the company’s Shimura Center \npulverized at the company \n\nin Tokyo and sealed separately in recycling \nin Tokyo and sealed separately in recycling \n\nbags, under supervision of a company official. \nbags, under supervision of a company official. \n\nThe bags are then sent off for processing by \nThe bags are then sent off for processing by \n\nan outside company, which analyzes and \nan outside company, which analyzes and \n\npurifies the contents and then extracts the \npurifies the contents and then extracts the \n\nrare earths. \nrare earths. \n\n*After intermediate processing, waste materials \nother than the rare earths and the cards with \nno IC chips are both sent off for final disposal, \nin conformity with established procedures. \n\nload through measures such as “carbon \nload through measures such as “carbon \n\nneutral leases” (with carbon credits allocated \nneutral leases” (with carbon credits allocated \n\nin proportion to emission volumes of leased \nin proportion to emission volumes of leased \n\nassets) and leasing of environment-friendly \nassets) and leasing of environment-friendly \n\nand energy-saving equipment. \nand energy-saving equipment. \n\nLikewise, by trading used machinery and \nLikewise, by trading used machinery and \n\nsemiconductor- manufacturing equipment, \nsemiconductor- manufacturing equipment, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nsupporting more efficient capital investment \nsupporting more efficient capital investment \n\nby its customers, while itself evolving into a \nby its customers, while itself evolving into a \n\nrecycling-oriented, environment-friendly \nrecycling-oriented, environment-friendly \n\ncompany. \ncompany. \n\nRecycling yields approximately 0.1mg of rare \nRecycling yields approximately 0.1mg of rare \n\nearth product per expired card. \nearth product per expired card. \n\nRare earths are special metals, unobtainable \nRare earths are special metals, unobtainable \n\ns and \nin Japan, which are essential to PCs and \nin Japan, which are essential to \n\ncellphones, electric vehicles and solar power \ncellphones, electric vehicles and solar power \n\ngenerators. Given that Japan is dependent on \ngenerators. Given that Japan is dependent on \n\nimports for nearly its entire supply, we believe \nimports for nearly its entire supply, we believe \n\nrecycling rare earths is a worthwhile endeavor \nrecycling rare earths is a worthwhile endeavor \n\nin terms of national energy policy. \nin terms of national energy policy. \n\nCard microcircuits that have become unusable \nCard microcircuits that have become unusable \n\ndue to changes in card design are collected \ndue to changes in card design are collected \n\nfrom cards with IC chips, which are separated \nfrom cards with IC chips, which are separated \n\n\n\n\n\n\n\n**Recycling of rare earths**\n**used in smart cards**\n\nExpired \ncredit cards \nwith IC chips \n\nRecovery \n\nAt Sumitomo Mitsui Card, rare earths \nAt Sumitomo Mitsui Card, rare earths \n\nextracted from IC chips from expired credit \nextracted from IC chips from expired credit \n\ncards are recycled. \ncards are recycled.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "The following example will find datasets which are from catalogue “data.gov.uk”**AND**are in the \ncategories “Environment”**AND**have a distribution in the formats (“CSV” or JSON”). \n\nFacets can be selected and deselected. In addition a key word can be entered to filter the results \neven more.", + "page_start": 27, + "page_end": 27, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "[html]IAC 0000900g SubNeS fellect changes in old ultrestinest in tabdilitis for the Venfection2003 and 2004 and the futureexpectedinvestmentas ofDecember311.2004( in millions )Balance as of December 31.2001Capital AdditionsLandfill AcquisitionTransfers and MjustmentsAdditions Charged to ExpenseBalance as of December 31.2002Non - depletable landfill land$50.5$ 3.3$ —$. 2$—$54.0Landfill development costs958.818.15.144.3—1.026.3Construction in progress — landfill17.656.0���( 41.3 )—32.3Accumulated depletion and amortization_ ( 237.0 )________________3_ ( 67.4 )__ ( 304.1 )Net investment in landfill land and development costs...$ 789.9$ 77.4$ 5.1$—===$( 67.4 )$ _808.5Balance as of December 31.2002Cumulative Effect of Changes in Accounting PrinciplesCapital AdditionsLandfill AcquisitionsTransfers snd AdjustmentsNon - Cash Additions for Asset Retirement ObligationsAdditions Charged to ExpenseBalance as of December 31.2003Non - depletable landfill land$54.0$—$. 1$. 5$ ( 5.1 )$ —$—$49.5Landfill development costs1.026.3188.63.728.969.817.9—1.335.2Construction in progress — landfill32.3—78.7—( 50.2 )——60.8Accumulated depletion and amortization_ ( 304.1 )( 248.4 )——. 7—_ ( 92.8 )_ ( 644.6 )Net investment in landfill land and development costs...$ 808.5$ ( 59.8 )$ 82.5$ 29.4$ 15.2$ 17.9$( 92.8 )$ 800.9Balance as of December 31.2003Capital AdditionsRetirementsLandfill AcquisitionsTransfers and AdjustmentsNon - Cosh Additions for Asset Retirement ObligationsAdditions Charged to ExpenseBalance as of December 31.2004Non - depletable landfill land$49.5$ 1.0$ —$ 1.5$1.4$ —$—$53.4Landfill development costs1.335.26.6( 1.9 )28.9102.415.3—1.486.5Construction in progress — landfill....60.878.9——( 100.6 )——39.1Accumulated depletion and amortization− 100 ( 044.6 )—1.91.0___ (. 8 )—...( 98.4 )( 742.9 )Net investment in landfill land and development costs...$ _800.9$ 86.5$ — ==$ 29.4$—====$ 15.3$( 98.4 )$ _836.1Balance as of December 31.2004Expected Future InvestmentTotal Expected InvestmentNon - depletable landfill land$53.4$—$53.4Landfill development", + "page_start": 47, + "page_end": 47, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What is the day of the black container in Lachapelle ?", + "target_page": 4, + "target_passage": "LACHAPELLE MONDAY green weeks", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**OUT BLACK CONTAINER** **FULL CONTAINER OR**\n\n\n \n \n \n \n [html]\n
TableITSTHE SAME PHCEONAY WHEN FULLNUARYFEBRUARYMARCH
APRILMAYJUNEa.1
MW||23w
F −,theM_4T.S_
..T_5FS75
.·W_6$–M_Age
Table|8MW8
iS_ 9 STWT −99
_*M_1TS_1
,?T__1F.S_J_1
.5W_1etM.__1
1:1Mw −21
|(1TT −1
offSensitivityWF_0.1
oftT___FS −in
.IW_2SM.1.5
of.Z>Sex_2
_*2MWSequence
.22TWT −2
_5M_2TS_2
,·T_2F.SN = 2
iW_25 −MT22
of12MW_2
.3TT__3JULY
AUGUSTSEPTEMBEROCTOBERNOVEMBERDECEMBER.
.S_1T.F__,M_2
vsS__.:T_3T.
S_3ofTableW_4F
M_|.F_6Sw
ofof.S_7MT_
_:BTcF__3
rM_1T3 −1.9
.5T_1T.Sex_1
.In_1F.IVI_N = 3
.)ofPTurn.
|.1MT21
Tablei1TF1
1.tM 1WS_1.1
.:T_1T.S___1
.IW_1F_M_L_1
,1yType________________________________________________________________________________________________________________________________________________________________________________________________________
.12S.W_2.
the;2M
", + "page_start": 1, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "**HOW TO GET A COMPOST KIT?**\n\n**Buy your own compost kit and get**\n**tips for good composting practice.**\nOnly during opening hours every \nwednesday from 2 pm to 4 pm at \nthe old recycling centre impasse \nElie Teyssier-Miramont. (In case of \nunavailability, please contact the \nenvironment department). \n30 minute workshops/awareness- \nraising sessions are regularly \norganised (starting at 4pm). It is \npossible to leave with a composter \nduring these workshops**. \nRegistration and information with \nthe service. \n\n**Compost kit** **Plastic** **Wood**\n\n300 L 20 € 30 € \n\n400 L 25 € 35 € \n\n*Only payment by cheque made payable to the \n‘Tresor Public‘ are accepted \n**Specific condition of acquisition apply accor- \nding to your municipality of residence \n\n\n \n \n \n \n [html]\n
Black containerYellow containerAGNAC
TUESDAY white weeksTHURSDAY green weeksALLEMANS - DU - DROPT
MONDAY green weeksWEDNESDAY white weeksARMILLAC
TUESDAY white weeksTHURSDAY green weeksBOURGOUGNAGUE
WEDNESDAY green weeksFRIDAY white weeksCAMBES
MONDAY green weeksWEDNESDAY white weeksLACHAPELLE
MONDAY green weeksTHURSDAY white weeksLAPERCHE
TUESDAY white weeksWEDNESDAY green weeksLA - SAUVETAT - DU - DROPT
TUESDAY white weeksTHURSDAY green weeksLAUZUN
MONDAY green weeksFRIDAY white weeksLAVERGNE
TUESDAY white weeksTHURSDAY green weeksMIRAMONT - DE - GUYENNE
TUESDAY green weeksTHURSDAY white weeksMONTIGNAC - DE - LAUZUN
WEDNESDAY white weeksWEDNESDAY green weeksMONTIGNAC - TOUPINERIE
TUESDAY white weeksTHURSDAY green weeksMOUSTIER
WEDNESDAY green weeksWEDNESDAY white weeksPEYRIERE
MONDAY green weeksTHURSDAY white weeksPUYSSERAMPION
MONDAY green weeksWEDNESDAY white weeks113
ROUMAGNEMONDAY white weeksTHURSDAY green weeks
SAINT - COLOMB - DE - LAUZUNWEDNESDAY white weeksWEDNESDAY green weeks
SAINT - PARDOUX - ISAACMONDAY white weeksFRIDAY green weeks
SEGALASWEDNESDAY white weeksWEDNESDAY green weeks
\n\n**MORE QUESTIONS ?**\n\nWebsite:**www.ccpl47.fr**\n/ Section En Pratique > Environnement > Gestion des déchets \n\n**Environnement Service**: \n12 rue du Renfort 47410 LAUZUN \n**05 53 94 11 23 / secretariat.environnement@ccpl47.fr**\n**Composting**: anim.biodechets@ccpl47.fr / 06 33 72 84 18 \n**Recycling centre access, registration or modification**: iris@ccpl47.fr / 05 53 64 12 26 \n\n3 \n2 \n0 \n2 \n1 \n1 \n- \nm \no \nc \n. \ni \n\n. \n\no \nk \ne \nd \na \nw \nw \nw \n- \n\n. \n\ni \n\no \nk \né \nd \nA \n: \n\nn \no \ni \nt \np \ne \nc \nn \no \nC", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": ": 10 : 03.419 ***********neonatal nether_tature : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 19 : 18 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 1Ensure openshift - ans1bTe instalTer package deps aropensh1ft_excluder : Insta11 docker excluder - yunopensitif1_tepas :: hefresh cache --------------------------------------------------------------------------------------------------------------------------------------------------------------------------canta / ner_rantine : Start the Docker service.................................................................................................................................................................cantalner_runtite : Create credentials for aregur1 ~ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6opensh1ft_repos :: Ensure 11bse11nux - python 1.1nsta1ledcantalner_runt. tire : F1xap SELInux pemI ss1ans for dacker.....................................................................................................................................................α_1Yrexil1 | :: [ nstal1 | firexil1d patkeges : -----------------------------------------------------------------------------------------------------------------------------------------------------------------Gather ’ ttg Facts “----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------container_runtine : Get current 1nstal1ed Docker vers10nGather † tg Tacts →~~~~~–‐–‐–‐–‐–‐–‐–‐–>–>––––––––––––––––––––––––––––––––––––Start and enable rtp0 / ctmttryd - envent - envent - envent - envent - envent - envent - envent - relatedas_firexil1 : Ensure tptables services are not enabled ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐Check for NetworkNatuger Service ‐ concentration ‐ concentration ‐ concentration ‐ concentrationscontalner_runtine : Setup the docker - storage for overlay--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
day date usingS
Significant other observable inputs ( Level 2 )June 30.2024
66.776.38666.776.386
5.561.3815.561.381
43.736.99543.736.995
116.074.762116.074.762
14.854.40714.854.407
42.009.652
5.213.8265.213.826
5.213.3395.213.339
25.281.57267.291.224
\n\n\n \n \n \n \n [html]Cases :$\n
Assets and pricess in active narkets for intical assets ( Level 1 )—Significant other observable inputs ( Level 2 )
$66.776.386
Recurities5.561.381
Control43.736.995
116.074.762S :
$14.854.407
42.009.652Adjusted
5.213.826Contrities
5.213.339$
42.009.65225.281.572
\n\n\n \n \n \n \n [html]Fair value measurements at reporting date usingReports :ents :\n
Quoted prices in active markets for identical assets ( Level 1 ).Significant other observable inputs ( Level 2 )June 3
s$66.776.38666,
Ad securities5.561.3815.5
ecurities43.736.99543.
I$116.074.762116, I
s$14.854.40714,#
42.009.65242, I
Ad securities5.213.8265.2
ecurities5.213.3395 :
I$42.009.65225.281.57267.2
", + "page_start": 13, + "page_end": 13, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "[html]Example 7 - 20Deleting Pod and maintaining the data[ root @ dcocp01 “]# oc get podsNAMETableTableREADYSTATUSRESTARTSAGEappmongo – i bm – mongob - dev1 / 1Running021hdocker - registry - 2 -dxwx1 / 1Running113drouter - 1 - g9btn1 / 1Runni ng113d[ root @ dcocp01 “]#c de1te pod appmongo - 1bm - mongodb - devpod “ appmongo – ibm – mongod– development deleted[ root @ dcocp01 “]# 1 total 146028- 1an † smongof ' s / mongo /drwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------mong4096Nov1012 : 07.drwxr - xr - x. 4 rootroot40960ct3112 : 28.- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter16384Nov1012 : 07co11ection - 0 -- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter24576Nov1012 : 07co11ection - 0 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters32768Nov1012 : 07co11ection - 2 --- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter145391616Nov1012 : 07co11ecti1on - 3 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07co11ection - 4 -- 16295157678663310. wtdrwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter4096Nov1012 : 07diagnostc. d- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384Nov1012 : 07index - 1", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + }, + { + "text": "7.2014, at 2 : 00 pmAdantic Time at the HalifaxMarrioft HarbourfrontHotel, 1919 Upper WaterStreet, Halifax, Nova Scotia.", + "page_start": 96, + "page_end": 96, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]By NN, a gardenerBy Louise de La Valliere ( 6 August 2644 – 6 June 1710 )By Francoise - Athenais, marguise de Montespan ( 5 October 2641 – 27 May 1707 )by Claude de Vin, Mademoiselle des CEillets ( 2637 – 18 May 1687 )by Angelique de Fontanges ( 1661 – 28 June 1682 )\n
NameBirthDeathNotes
Daughter1660unknownShe married N de la Queue, a sentry,[ 35 ]]
Charles de La Baume Le Blanc19 December 166315 July 1665 ( aged 1 )Not legitimised.
Philippe de La Baume Le Blanc7 January 16651666 ( aged 1 )Not legitimised.
Marie Anne de Bourbon2 October 16663 May 1739 ( aged 73 )Legitimised on 14 May 1667. Married Louis Armand I, Prince of Cont.
Louis, Count of Vermandois3 October 166718 November 1683 ( aged 16 )Legitimised on 20 February 1609. Held the office of Admiral of France.
Louise Francoise de Bourbonat the end of March 166923 February 1672 ( aged 2 )
Louis Auguste, Duke of Maine31 March 167014 May 1736 ( aged 66 )Legitimised on 20 December 3473. Healt euronous officers, of which Colonel General of the Suisses et Groores, Governor of Languedoc, General of life Galleys, and Grand Madese of Addery, Also Duke of Aumake, Count of Eu and Prince of Dombe C
Louis Cesar, Count of Vexin20 June 167210 January 1683 ( aged 10 )Legitimised on 20 December 1673.
Louise Francoise de Bourbon1 June 167316 June 1743 ( aged 70 )Legitimised on 20 December 1673. Married Loais III, Prince of Conde. Had issue.
Louise Marie Anne de Bourbon12 November 167415 September 1681 ( aged 6 )Legitimised in January 1676.
Francoise Marie de Bourbon9 February 16771 February 1749 ( aged 72 )Legitimised in November 1681. Married Philippe II, Duke of Orleans, the Regent of France under Louis XV. Had issue.
Louis Alexandre, Count of Toulouse6 June 16781 December 1737 ( aged 59 )Legilimised on 22 November 268L. Held numerous offices, of which : Administ of France, Governor of Guyeenne, Governor of Brittany, and Grand Huntaman citFrance, Also Duke of Damilie, of Ramboullet and of Penthieve. Had issue.
Louise de Maisonblanchec. 17 June 167612 September 1718 ( aged 42 )In 1696 she married Bernard de Prez, Baron de La Queue.[ 159 ]
SonJanuary 1680January 1680 ( stillborn )
DaughterMarch 1681March 1681 ( stillborn )Her existence is uncertain.
\n\n**See also**\n\nCharles de Lorme, personal medical doctor to Louis XIV \nFundamental laws of the Kingdom of France \nHouse of France \nLevée (ceremony) \nList of French monarchs \nOutline of France \nLouis XIV style \nNicolas Fouquet \nFrench forestry Ordinance of 1669 \nPotager du Roi", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**(a)**\n0.6 \n**(a)**\n) \n. \nu \n. \na \n( \n2 \n*B* κ \n1.5 \n0.4 \nβ \n*k* ∂ \nκ */*\n1 \n*v*\n132 \n134 \nT (K) \n136 *c*\n0.2 \n**(b)** 0.5 \n0 0 \n0.6 \n**(c)**\n**(b)**\n) \n. \nu \n. \na \n( \n0.5 \n) \nκ \n( \n0.4 \n*4*\n*u* κ \n0.3 χ \n**(d)** 0.2 \n0.1 \n20 40 \n80 \n*T*(K) \n100 120 140 20 40 \n80 \n*T*(K) \n100 120 140 60 60 \n\n136 137 138 135 \n\n0.66 \n0.66 \n*)*\n*M* 0.64 \n0.64 \n*(*\n*4*\n*u*\n0.62 \n0.62 \n\n0.65 \n*)*\n\n*M*\n*H*\n*M*\n) \n. \nu \n0.6 \n. \na \n( \n*)*\n*(*\n*z*\n*q*\n*(*\n*S*\n*4*\n0.55 *u*\n\n0.2 0.4 0.6 0.8*qz*\n0 \n0.5 \n130 131 132 133 \n134 \n*T*(K) \n\nFIG. 4: (color online) Thermodynamic quantities obtained for \nthickness n = 8 in the temperature range 0-150 K. Colors and \nsymbols as in Fig. 2. (a): specific heat; (b): chirality order \nparameter. (c): susceptibility χκ. (d): Binder cumulant for \nκ. \n\nFIG. 3: (color online) Binder cumulants at thickness n = \n16, colors as in Fig. 2. (a): Binder cumulant for the order \nparameter defined in Eq. (3). (b): Binder cumulant extracted \nfrom the integral of the structure factor (see Sec. II). Inset: \nstructure factor for L = 64 between T = 131 K (upper curve) \nand T = 140 K (lower), with 1 K temperature step. \n\n133.1(3) K (see Fig. 3b). The crossing points of the \nBinder’s cumulants of the helical order parameter imme- \ndiately appear to be located, within the error bars, at the \nsame temperature of those for the average magnetization \npreviously discussed. In addition, it is worthwhile to ob- \nserve that the peak evolution of S(0, 0, qz), in particular \nclose to TN (16) (inset of Fig. 3b), displays the typical \nbehaviour expected for an helical structure. We can thus \nconclude that for n = 16, as it is commonly observed \nin bulk samples, the establishment of the in-plane order \ncoincides with onset of the perpendicular helical arrange- \nment at TN (16). However, due to helix distortion in the \nsurface regions, the maximum of S(0, 0, qz) stabilizes at \nvalues of qz sensibly smaller (e.g. Qz(TN (16)) ≈ 16◦, \nand Qz(T = 10K) ≈ 28◦) with respect to the bulk one \n(QHo \n\nIII. RESULTS \n\nThe results obtained by MC simulations of the model \nintroduced in Sec. II will be presented starting from \nn = 16, i.e. the highest investigated film thickness which \nstill displays a bulk-like behaviour. \nIn Fig. 2 the spe- \ncific heat for samples with n = 16 and lateral dimension \nL = 24, 32, 48, 64 is shown. The location of the specific \nheat maximum shows a quite definite evolution toward \nthe bulk transition temperature, T Ho \nN ≃ 132 K10 (it is \nworthwhile to note that for this XY model the mean field \ntheory predicts a critical temperature T Ho \nN,MF ≃ 198 K). \nThe intensity of the maximum of cv has been analyzed \nby the MH technique for the same lateral dimensions (see \ninset of Fig. 2): it clearly appears as it increases with L \nin a smooth way. \n\nz = 30.5◦). \nThe MC simulations outcomes for n = 16 we just pre- \nsented appear quite different with respect to those ob- \ntained at the same thickness for the model with six cou- \npling constants along the z direction14,15. \nIndeed, for \nthe J1-J2 model here investigated, we observe that all \nlayers order at the same temperature, and we do not find \nany hint of the block-phase, with inner disordered planes \nintercalated to antiparallel quasi-FM four-layer blocks, \npreviously observed; sample MC runs we made using the \nsame hcp lattice employed in Refs. 14,15 shows that the \npresence or absence of the block phase is not related to \nthe lattice geometry, but it is a consequence of the inter- \naction range only.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0510.pdf" + }, + { + "text": "parameter to be consistent with the current observations. We also calculate the scattering \n\ncross section between the DM particle and nucleon and discuss the implication for the direct \n\nDM search experiments. We summarize our results in the section IV. Our notations and the \n\nformulas used in our analysis are listed in Appendix. \n\nII. THE MINIMAL GAUGED U (1)B L MODEL WITH Z2 PARITY \n− \n\nThe model is based on the gauge group SU(3)C × SU(2)L × U(1)Y × \nU(1)B L. Additional \n\n− \nL, a SM singlet \nfields besides the standard model fields are a gauge field Z ′µ of the U(1)B \n− \n\nB L Higgs boson Ψ with two U(1)B L charge, and three RH neutrinos Ni which are \n− \n− \n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH \n\nneutrinos, we use the four component representation of RH neutrino constructed from the \n\nWeyl spinor νRi, \n\nνRi \n\nNi ≡ \n, (1) \n  \n\nǫ ν∗Ri \n  \nFor the two RH neutrinos, N1 and N2, we assign Z2 parity even, while odd for N3, so that \n\nthe RH neutrino N3 is stable and, hence, the DM candidate. \n\nDue to the additional gauge symmetry U(1)B L, the covariant derivative for each fields \n− \n\nis given by \n\nDµ = D(SM ) iqB LgB \nLZ ′µ, \n(2) \nµ \n− \n− − \n\nwhere D(SM ) is the covariant derivative in the SM, and qB L is the charge of each fields µ \n− \n\nunder the U(1)B L with its gauge coupling gB L. \n− − \n\nYukawa interactions relevant for the neutrino masses are given by \n\n3 2 3 \n\n1 \n2 yαi ¯Lα ˜ΦNi − \n¯NiΨPRNi + h.c., λRi \nLint = \n(3) \n\nXα=1 Xi=1 Xi=1 \n\nwhere ˜Φ = iτ2Φ∗ for Φ being the SM Higgs doublet, and without loss of generality we have \n− \n\nworked out in the basis where the second term in the right-hand-side is in flavor diagonal \n\nfor RH neutrinos. Because of the Z2 parity, the DM candidate N3 has no Yukawa couplings \n\nwith the left-handed lepton doublets. \n\nThe general Higgs potential for the SU(2)L doublet Φ and a singlet B L Higgs Ψ is \n− \n\ngenerally given by \n\nV (Φ, Ψ) = m2 \n1| 2 + m2 \n2| \n\n2 + λ1| \n3 \n\n4 + λ2| 4 + λ3| \n\n2 \n2. \nΦ \n| \nΨ \nΦ \n| \nΨ \nΦ \n| \nΨ (4) \n| | | |", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "**Position Color** **Name** **State** **Meaning**\n\nRight Amber Fault On \nThe canister is in a service state, or in error, preventing \nthe software from starting. \n\nFlashing \n(2 Hz) \nCanister is being identified. \n\nOff Node is either in candidate or active state. \n\n**13.1.2 Expansion canisters**\n\nAs Figure 13-2 shows, two 12 Gbps SAS ports are side by side on the canister of every \nenclosure. They are numbered 1 on the left and 2 on the right. Similar to the controller \ncanisters, expansion canisters are also installed in the enclosure side by side in a vertical \nposition. \n\n**Canister LEDs**\n- green left: power \n- green horse-shoe: status \n- amber: fault \n**SAS Indicators**\n- green: link \n- amber: fault \n\n\n\nFigure 13-2 Expansion canister status LEDs \n\nThe interpretation of the SAS status LED indicators has the same meaning as the LED \nindicators of SAS ports in the control enclosure (Table 13-3 on page 676). \n\nTable 13-5 lists the LED status values of the expansion canister. \n\n\n \n \n \n \n [html]LeftGreenPowerMiddleGreenStatusRightAmberFault\n
PositionColorNameStateMeaning
OnThe canister is powered on.
OffNo power available to the canister.
OnThe canister is operating normally.
FlashingThere is an error with the vital product date ( VPD ).
OnThere is an error logged against the canister or the system is not running.
FlashingCanister is being identified.
OffNo fault, canister is operating normally.
", + "page_start": 698, + "page_end": 698, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What to do if my container is stolen ?", + "target_page": 4, + "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**12.7 Recovering from a provider loss**\n\nIf both encryption key providers are enabled, and you lose one of them (by losing all copies of \nthe encryption key kept on the USB flash drives or by losing all SKLM servers), you can \nrecover from this situation by disabling the provider to which you lost the access. To disable \nthe unavailable provider, you must have access to a valid master access key on the remaining \nprovider. \n\nIf you have lost access to the encryption key server provider, issue the following command: \n\nchencryption -keyserver disable \n\nIf you have lost access to the USB flash drives provider, issue the following command: \n\nchencryption -usb disable \n\nIf you want to restore the configuration with both encryption key providers, follow the \ninstructions that are described in 12.5, “Configuring more providers” on page 647. \n\n**Note:**If you lose access to all encryption key providers that are defined in the system, no \nmethod is available to recover access to the data protected by the master access key. \n\n**12.8 Using encryption**\n\nThe design for encryption is based on the concept that a system is fully encrypted or not \nencrypted. Encryption implementation is intended to encourage solutions that contain only \nencrypted volumes or only unencrypted volumes. For example, after encryption is enabled on \nthe system, all new objects (for example, pools) are by default created as encrypted. \n\nSome unsupported configurations are actively policed in code. For example, no support exists \nfor creating unencrypted child pools from encrypted parent pools. However, exceptions exist: \n\n(cid:2) During the migration of volumes from unencrypted to encrypted volumes, a system might \nreport both encrypted and unencrypted volumes. \n\n(cid:2) It is possible to create unencrypted arrays from CLI by manually overriding the default \nencryption setting. \n\n**Notes:**Encryption support for Distributed RAID is available in IBM Spectrum Virtualize \ncode V7.7 and later. \n\nYou must decide whether to encrypt or not encrypt an object when it is created. You cannot \nchange this setting later. To change the encryption state of stored data, you must migrate \nfrom an encrypted object (for example, pool) to an unencrypted one, or vice versa. Volume \nmigration is the only way to encrypt any volumes that were created before enabling \nencryption on the system.", + "page_start": 677, + "page_end": 677, + "source_file": "sg247938.pdf" + }, + { + "text": "**Managing Tivoli Storage Manager storage**\nFor each automated library, Tivoli Storage Manager tracks in its volume inventory for the \nlibrary whether a volume has scratch or private status: \n\n(cid:2) A*scratch volume*is a labeled volume that is empty or contains no valid data, and it can be \nused to satisfy any request to mount a scratch volume. To support Content Manager \nOnDemand, you define scratch volumes to Tivoli Storage Manager. Tivoli Storage \nManager uses scratch volumes as needed, and returns the volumes to scratch when they \nbecome empty (for example, when all data on the volume expires). \n\n(cid:2) A*private volume*is a volume that is in use or owned by an application, and it might contain \nvalid data. Volumes that you define to Tivoli Storage Manager are private volumes. A \nprivate volume is used to satisfy only a request to mount that volume by name. When \nTivoli Storage Manager uses a scratch volume, it changes the volume’s status to private. \nTivoli Storage Manager tracks whether defined volumes were originally scratch volumes. \nVolumes that were originally scratch volumes return to scratch status when they become \nempty. \n\n**Secondary storage of storage volumes**\nFor instructions that describe how to handle physical storage volumes and remove them from \nthe library, see the documentation that is provided by the library manufacturer. \n\nFor instructions about documentation that you might need to complete when you remove \nstorage volumes from a library and where to store them for safekeeping, see your \norganization’s media storage guide. \n\n**Protecting data with data retention protection**\nTo avoid the accidental erasure or overwriting of critical data, Content Manager OnDemand \nsupports the Tivoli Storage Manager APIs that relate to data retention.*Data retention*\n*protection*prohibits the explicit deletion of documents until their specified retention criterion is \nmet. Although documents can no longer be explicitly deleted, they can still expire. \n\n**Important notes**: \n\n(cid:2) Data retention protection is*permanent*. After it is turned on, it cannot be turned off. \n(cid:2) Content Manager OnDemand does not support deletion on hold data. This feature \nprevents held data from being deleted until the hold is released. \n\nTivoli Storage Manager supports two retention policies: \n\n(cid:2) In*creation-based retention*, the policy becomes active when the data is stored (created) \non the Tivoli Storage Manager server. This policy is the default retention policy method \nand it is used with normal backup/archive clients. \n\n(cid:2) In*event-based retention*, the policy becomes active when the client sends a retention \n\nevent to the Tivoli Storage Manager server. The retention event can be sent to the server \nany time after the data is stored on the server. Until the retention event is received, the \ndata is indefinitely stored on the Tivoli Storage Manager server. For Content Manager \nOnDemand, the retention event is the call to delete the data. A load, unload, application \ngroup delete, or expiration of data triggers the retention event.", + "page_start": 257, + "page_end": 257, + "source_file": "sg246915.pdf" + }, + { + "text": "Figure 5-93 Enclosure removed \n\nAs part of the enclosure removal process, consult your company security policies about how \nto handle sensitive data on removed storage devices before they leave the secure data \ncenter. Most companies require data to be encrypted or logically shredded. \n\n**5.11.3 Restarting the GUI Service**\n\nThe service that runs that GUI operates from the configuration node. Occasionally, you might \nneed to restart this service if the GUI is not performing to your expectation (or you cannot \nconnect). To do this, you log on to the service assistant and identify the configuration node, as \nshown in Figure 5-94.", + "page_start": 210, + "page_end": 210, + "source_file": "sg247938.pdf" + }, + { + "text": "(cid:2) Unmounting all file systems that were created on IBM Spectrum Virtualize volumes (for file \nsystems created directly on IBM Spectrum Virtualize volumes) or bringing offline all logical \nvolume groups by using volumes that are presented by the IBM Spectrum Virtualize \nsystem. \n\n(cid:2) Accepting loss of access to storage for volumes that are mirrored at the operating system \nlevel. \n\nFor volumes that are mirrored at the operating system level, loss of one of the data copies \ntriggers errors in the operating system and causes a loss of redundancy because the data \ncopies go out of sync. \n\n**Note:**Some applications (for example, databases), can use a volume that is not mounted \nas a file system. Make sure that no volumes that are presented by the IBM Spectrum \nVirtualize are in use on a host if you want to shut down the storage system but not the host. \n\nBefore shutting down the system, ensure that you stopped all FlashCopy mappings, remote \ncopy relationships, data migration operations, and forced deletions. \n\nStorwize V7000 control enclosures contain batteries that provide backup power to the system \nto protect against unforeseen loss of power. When AC power to the enclosure is interrupted \nfor more than approximately 10 seconds, the system starts system state dump procedure, \nwhich includes saving cached data to an internal drive. \n\nWhen the process to save critical data starts, the system stops handling I/O requests from the \nhost applications, and Metro Mirror and Global Mirror relationships go offline. The system \npowers off when the saving of the critical data completes. If AC power is restored after the \nsystem state dump starts, the dump continues to completion. The system then restarts. \n\n**Note:**Storwize V7000 expansion canisters do not cache volume data or store state \ninformation in volatile memory. Therefore, they do not require battery power. If AC power to \nboth power supplies in an expansion enclosure fails, the enclosure powers off. When AC \npower is restored to at least one of the power supplies, the controller restarts without \noperator intervention. \n\nIn a fully redundant system with two batteries and two canisters, there is enough charge in the \nbatteries to support saving critical data from both canisters to a local drive twice. In a system \nwith a failed battery, there is enough charge in the remaining battery to support saving critical \ndata from both canisters to a local drive once. \n\nIf both node canisters shut down without writing the cache and state data to the local drive, \nthe system is unable to restart without an extended service action. The system configuration \nmust be restored. If any cache write data is lost, volumes must be restored from a backup. \nTherefore, it is important not to remove the canisters or the power supply units from the \ncontrol enclosures unless directed to do so by the service procedures. Removing either of \nthese components might prevent the node canister from writing its cache and state data to \nthe local drive. \n\nIn case of an imminent power loss, strive to shut down the system cleanly, without triggering \nthe data dump procedure. This process preserves battery charges for actual emergencies. \n\nWhen the AC power is restored after a power outage that causes both canisters to save their \ncritical data, the system restarts only when the batteries have sufficient charge to power both \ncanisters for the duration of saving the critical data again.", + "page_start": 146, + "page_end": 146, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 6-26 Actions on internal storage \n\nThe actions available depend on the status of the drive or drives selected. Some actions can \nbe run only on a set of them, and some are possible only for individual drives. \n\n**Action: Fix error**\nThis action is only available if the drive selected has an error event that is associated with it. \nSelect**Fix Error**to start the Directed Maintenance Procedure (DMP) for the selected drive. \nFor more information about DMPs, see Chapter 13, “RAS, monitoring, and troubleshooting” \non page 673. \n\n**Action: Take offline**\nSelect**Take Offline**to take a drive offline. You must confirm the action, as shown in \nFigure 6-27. \n\nFigure 6-27 Taking a drive offline \n\nIf a spare drive is available and the drive is taken offline, the MDisk of which the failed drive is \na member remains*Online*. The spare is automatically reassigned. If no spare drive is \navailable and the drive is taken offline, the status of the array of which the failed drive is a \nmember becomes*Degraded*. Therefore, the status of the storage pool to which the MDisk \nbelongs becomes*Degraded*as well. \n\nThe system prevents you from taking the drive offline if one of the following conditions is true: \n\n(cid:2) The first option was selected and no suitable spares are available. \n\n(cid:2) Losing another drive in the array results in data loss. \n\nA drive that is taken offline is considered*Failed*, as shown in Figure 6-28 on page 211.", + "page_start": 231, + "page_end": 231, + "source_file": "sg247938.pdf" + }, + { + "text": "**7.8.23 Tracing a volume from a host back to its physical disks**\n\nIn some cases, you might need to verify exactly which physical disks are used to store data of \na volume. This information is not directly available to the host; however, it might be obtained \nby using a sequence of queries. \n\nThe first step is to unequivocally map a logical device seen by the host to a volume that is \npresented by the storage system. The best volume characteristics for this purpose is the \nvolume ID. This ID is available to the operating system in the Vendor Specified Identifier field \nof page 0x80 or 0x83 (vital product data, VPD), which the storage device sends in response \nto SCSI INQUIRY command from the host. \n\nIn practice, the ID can be obtained from the multipath driver in the operating system. After the \nvolume ID is known, it can be used to identify physical location of data. \n\n**Note:**For sequential and image mode volumes, a volume copy is mapped to exactly one \nMDisk. This configuration often is not the case for stripped volumes, unless volume size is \nnot greater than an extent size. Therefore, a single stripped volume uses multiple mDisks \nin a typical case. \n\nOn hosts that are running IBM System Storage Multipath Subsystem Device Driver, you can \nobtain the volume ID from the output of the**datapath query device**command. You see a long \ndisk serial number for each vpath device, as shown in Example 7-37. \n\n\n \n \n \n \n [html]________________________________________________________________________________________________________________________________________________________________________________________________________SignificanceTableDEV #:DEVICEScsiPort2Part01BF2800000000000NumberNumber\n
=Table1.________________________________________________________________________________________________________________________________________________________________________________________________________
0E : Disk1 Part0TYPE :2145POLICY :
OPT IMI ZEDSERIAL :60055076801830 :1BF2800000000000NumberNumberNumber
ParametersPercentageNumberNumberNumber of the===Path #Adapter / Hard Disk
StateModeSelectErrors0
Bus0 / Disk1OPENNORMAL200
1ScsiPort3Bus0 / Disk1Part0OPENNORMAL2343
0DEV #:1DEVICENAME : Disk2Part0TYPE :2145
POLICY :OPT IMI ZEDSERIAL :60055076801830 :
NumberParametersPercentageNumberNumber
Number of the===Path #Adapter / Hard DiskStateModeSelectErrors
0Scs1Port2Bus0 / Disk2Part0OPENNORMAL2335
", + "page_start": 335, + "page_end": 335, + "source_file": "sg247938.pdf" + }, + { + "text": "2. Verify that all USB drives plugged into the system are detected and show as Validated, as \nshown in Figure 12-87. Click**Rekey**. You need at least three USB flash drives, with at least \none reported as Validated to process with rekey. \n\nFigure 12-87 Start rekey on USB flash drives provider \n\n3. \n\nIf the system detects a validated USB flash drive and at least three available USB flash \ndrives, new encryption keys are automatically copied on the USB flash drives, as shown in \nFigure 12-88 on page 670. Click**Commit**to finalize the rekey operation.", + "page_start": 690, + "page_end": 690, + "source_file": "sg247938.pdf" + }, + { + "text": "For a stateful container, you need the PV backing up the PVC requested for the pod. Other \nscenarios showed the FlexVolume use with PowerVC, but this case uses the NFS attachment \nfor you to see another supported backend for volumes. This type of backend is still available if \nnot in use on any pod. The deployment file is shown in Example 7-11. Also, check the policy \nof the PV is Retain and not Delete so the PVC can be used, even after migrated to another \ncloud. This makes it available if and when the container is brought back. \n\nExample 7-11 Yaml file for NFS backed PV on the Power Systems cluster \n\napiVersion: v1 \nkind: PersistentVolume \nmetadata: \n name: appmongo-ibm-mongodb-dev-datavolume \nspec: \n persistentVolumeReclaimPolicy: Retain \n storageClassName: manual \n capacity: \n storage: 2Gi \n accessModes: \n - ReadWriteMany \n nfs: \n server: dcocp1 \n path: /nfsmongofs/mongo \n\nTo verify the claim bounds to the intended PV, leave the PVC created, as shown in \nExample 7-12. \n\nExample 7-12 Yaml file for NFS backed PVC on the Power Systems cluster \n\n\n \n \n \n \n [html]\n
kind : PersistentVolumeC1aim ap1Vers10n : v1
metadata :
name : \" appmongo -\" bm - mongodb - dev - datavo } ume \"
spec :
storageC1assName : manual
accessModes :
- ReadwriteMany
resources :
requests :
storage : 2G1
\n\nMongoDB needs users and passwords for the database. To confirm that the password is not \non the Pod specification, use a secret entry, as shown in Example 7-13. Do not use this hash \nin your environment because this is a password for demonstration purposes only. \n\nExample 7-13 Yaml file for Secret password safeguard \n\n\n \n \n \n \n [html]\n
apiVersion : v1
data :
password : c3RhcnQxM3M0
kind : Secret
metadata :
1abe1s :
app : appmongo - ibm - mongodb - dev
name : appmongo - ibm - mongodb - dev
type : Opaque
", + "page_start": 185, + "page_end": 185, + "source_file": "sg248459.pdf" + }, + { + "text": "A useful option is available that you can add to the**oc get**command: the**-w**option. This \noption continuously watches the output in real-time. This option is useful, for example, for \nmonitoring the output of an**oc get pod**command continuously instead of running it multiple \ntimes. \n\nIf the details that are provided by the**oc get**command are not sufficient, more information \nabout the resource can be retrieved by using the**oc describe RESOURCE_TYPE RESOURCE_NAME**\ncommand. Unlike the**oc get**command, there is no way to iterate through all of the different \nresources by type. Although most major resources can be described, this functionality is not \navailable across all resources. To display detailed information about a Pod resource use the \nfollowing command: \n\n\n \n \n \n \n [html]\n
oc describe pod docker - registry - 3 - 4f1q1
Name :
docker - registry - 3 - 4f1q1
Namespoce :
default
Priority :
0
PrtorityClassNarre :
< none >
Node :
= strode02.. domain. example. con / 192.. 168.11.203
Start Tire :
Thu, 07 Nov 201.16 : 09 : 12 + 0000
Labels1
dep1oyrent * docker - reg1stry - 3dep1oyrent : conf ‘ g - docker - reg1stry
docker ‐ registryadefault
Annotations :
opensh1ft... 1o / dep1ayment – conf ‘ g., I atest – version = 3 openshift... to / dep loyment ‐ conf ‘ g. naneadocker ‐ registry
openshift. to / dep loyrent. name - docker - registry – 3 openshift. to / scc * restricted
Status1
Runn1πg
IP1
10.130.0. 48
...
Output trancated
...
VoTures :
registry - storage :
Type :
Abstetrolum ( a reference to a Pers ' stontitude / aim in the silte fulfetistical )
\n\nUse the**oc export RESOURCE_TYPE RESOURCE_NAME [-o OUTPUT_FORMAT]**command to export a \ndefinition of a resource. Typical use cases include creating a backup, or to aid in modifying a \ndefinition. By default, the export command prints out the object representation in YAML \nformat, but this can be changed by providing the**-o**option. \n\nUse the**oc create**command to create resources from a resource definition. Typically, this is \npaired with the**oc export**command for editing definitions. \n\nUse the**oc delete RESOURCE_TYPE RESOURCE_NAME**command to remove a resource from the \nOpenShift cluster. \n\n**Note:**A fundamental understanding of the OpenShift architecture is needed because \ndeleting managed resources, such as pods, results in newer instances of those resources \nbeing automatically recreated. \n\nThe**oc new-app**command can create application pods to run on OpenShift in many different \nways. It can create pods from Docker images, Docker files, and raw source code by using the \nSource-to-Image (S2I) process. The command can create a service and a deployment \nconfiguration, and a build configuration if source code is used.", + "page_start": 166, + "page_end": 166, + "source_file": "sg248459.pdf" + }, + { + "text": ": 10 : 03.419 ***********neonatal nether_tature : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 19 : 18 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 1Ensure openshift - ans1bTe instalTer package deps aropensh1ft_excluder : Insta11 docker excluder - yunopensitif1_tepas :: hefresh cache --------------------------------------------------------------------------------------------------------------------------------------------------------------------------canta / ner_rantine : Start the Docker service.................................................................................................................................................................cantalner_runtite : Create credentials for aregur1 ~ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6opensh1ft_repos :: Ensure 11bse11nux - python 1.1nsta1ledcantalner_runt. tire : F1xap SELInux pemI ss1ans for dacker.....................................................................................................................................................α_1Yrexil1 | :: [ nstal1 | firexil1d patkeges : -----------------------------------------------------------------------------------------------------------------------------------------------------------------Gather ’ ttg Facts “----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------container_runtine : Get current 1nstal1ed Docker vers10nGather † tg Tacts →~~~~~–‐–‐–‐–‐–‐–‐–‐–>–>––––––––––––––––––––––––––––––––––––Start and enable rtp0 / ctmttryd - envent - envent - envent - envent - envent - envent - envent - relatedas_firexil1 : Ensure tptables services are not enabled ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐Check for NetworkNatuger Service ‐ concentration ‐ concentration ‐ concentration ‐ concentrationscontalner_runtine : Setup the docker - storage for overlay--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "How many people include the Dyspnea study ?", + "target_page": 1, + "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "; Jennifer Biggs, RN ; Jessica Bergeron ;Sarah Anthony, BNRN ; and Tanya Nolan,Prevalence of dyspnea in general adultand Elisabet White ; Vancouver GeneralBNRN ; McGill University Health CentrePreparations : a systematic review andHospital, Vancouver, British Columbia :Montreal, QC : Francine Noel ; Royal Victoriameta - analysis. Respir Med. 2023 ; 218 :Shelley Abercromby, BSc ; Jana Caine, DavidRegional Health Centre, Barrie, ON : Masoud1.07379.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 \n\nTake-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. \n\nDyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. \n\nDyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD \n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? \n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). \n\nDyspnea Impact and Health Care Use, Quality of \nLife, and Work Productivity \n\nThe impact of dyspnea and its associations with health \ncare use, quality of life, and work productivity were exam- \nined. Health care utilization was assessed through self- \nreported data. Quality of life was assessed using the 36- \nItem Short Form Health Survey questionnaire, where \nhigher scores indicate better health status. Work produc- \ntivity was assessed using the Work Productivity and Activ- \nscores \nity Impairment questionnaire, where higher \n\nResults \nFigure 1 illustrates the results of the case finding \napproach, including the enrollment of the control group. \nAmong 5,631 potentially eligible participants, 1,359 participants (24%) did not meet the threshold of $ 6 \npoints on the ASQ or $ 20 points on the COPD- \nDiagnostic Questionnaire and were thus excluded, \nleaving 4,272 individuals deemed eligible for spirometry. \n\n21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory \n\n2,090 (73.2%) had normal \nspirometry \n172 (6.0%) had PRISM \n\nFigure 1 – Study flow diagram demonstrating the case finding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; \nCOPD-DQ¼ COPD Diagnostic Questionnaire; CF ¼ cystic fibrosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]TABLE 2 | Mean Responses to Individual Dyspnea Questions2.93 ( 1.18 )37", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "[html]Example 7 - 20mong8727010ParameterPatientsExample 7 - 23Files as a cache and prefetched in the cloud[ root01p - 10 - 0 - 2 - 217 *]+ 1s - 1a / gpfs / mongoafm / mongo /Nov14 : 39- rw ----------- 1 mongo rootNov14 : 38", + "page_start": 198, + "page_end": 198, + "source_file": "sg248459.pdf" + }, + { + "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. \n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. \n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "How encourage temporally adjacent representations to be predictive of each other ?", + "target_page": 2, + "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Slow Features. One way to encourage temporally \nadjacent representations to be predictive of each other \nis to ensure that they vary slowly over time. Early \nworks targeting predictive features encouraged represen- \ntations of individual video frames to be locally tempo- \nrally invariant, while preventing representation collapse \nby using spectral methods, as in SFA (Wiskott and Se- \njnowski, 2002), SSA (Kayser et al., 2001), and Simulated \nFixations (Zou et al., 2012). More recently, Goroshin \net al. (2015); Wang et al. (2010) train a siamese con- \nvolutional network to map the representations of two \nsubsequent frames to the same point, while encouraging \ndistant frames to have diverse representations via a pair- \nwise margin loss and a triplet loss, respectively. Other \nworks (Oord et al., 2018; Surís et al., 2021; Feichtenhofer \net al., 2021) implement temporal invariance using noise- \ncontrastive estimation (Gutmann and Hyvärinen, 2012). \nOur exploration in this paper goes beyond temporal in- \n\nAdvances in Self-Supervised Learning. The use \nof vision transformers (Dosovitskiy et al., 2020; Li et al., \n2022) has become standard practice in self-supervised \nlearning with joint-embedding architectures (Chen et al., \n2021; Caron et al., 2021; Oquab et al., 2023; Zhou et al., \n2021; Assran et al., 2022), and unlocked masked image \nmodeling in pixel space by parameterizing the pixel de- \ncoder as a transformer with learnable mask tokens (Doso- \nvitskiy et al., 2020; Xie et al., 2021; He et al., 2021; Bao \net al., 2021), demonstrating a step-change in the rep- \nresentation quality of autoencoding methods (Vincent \net al., 2010). This line of generative methods was sub- \nsequently extended to video data using spatio-temporal \nmasking (Tong et al., 2022; Feichtenhofer et al., 2022; \nWang et al., 2023a; Kalluri et al., 2023; Gupta et al., \n2023). It was also recently shown that the representa- \ntions of masked image autoencoders could be significantly \nimproved by using learnable pooling mechanisms based \non cross-attention (Chen et al., 2022). Finally, through \ncareful selection of design choices, the non-contrastive \ncollapse prevention strategy in BYOL (Grill et al., 2020) \nwas recently made to work with image feature prediction \nmethods (Baevski et al., 2022b; Assran et al., 2023), \nwhich demonstrated the ability to learn representations \nthat can be leveraged for various downstream tasks with- \nout relying on invariance to hand-crafted image trans- \nformations.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv3.pdf" + }, + { + "text": "When individuals search their memory for a particular piece of a message in their mind, \nthe targeted node becomes salient and activated in the temporary memory [39]. If two messages \nare always activated simultaneously, their connection tends to be more robust and the messages are \nregarded as associated [36]. If a link is recorded between two concepts, activations are likely to spread \nthrough the link from one concept to another with or without conscious awareness [40]. Whereas \nassociations of nodes in the mind may not necessarily reflect the actual relationships of objects, in reality, \nseveral factors, including media usage, personal experience, and political stance [34,41,42], may help \nbundle different sets of concepts.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed10.pdf" + }, + { + "text": "Figure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) \nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with \ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and \nBallard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are \nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, \nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on \nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in \ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need \nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower \nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for \nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks \nthat process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. \n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their \nputative neuronal underpinnings. See online article for colored version of this figure. \n\nAnother critical aspect of Fig. 1 is that it illustrates two path- \nways in which prediction errors at the proprioceptive and inte- \nroceptive levels are used to steer physical actions (reflex arcs) \nand autonomic actions (autonomic reflexes). Endowing predictive \ncoding with these reflexes—hence realizing an “active inference” \narchitecture—permits minimizing prediction errors by changing \nthe state of the world (by physically acting) or the internal milieu \n(by engaging in autonomic actions) rather than only by changing \npredictions, as described later. \n\n\n \n \n \n
Questions About Dyspnea From CAT and SGRQControl Group ( n = 231 )Normal Spirometry Group ( n = 2.090 )Asthma Group ( n = 265 )COPD Group ( n = 330 )
PRISm Group ( n = 172 )Q1 ( weight = 0.514 )When I wak up a hill or one flight of stairs, I am breathless. The scale for this question ranges from 0 ( when I walk up a hill or 1. flight of stairs, I am not breathless ) to 5 ( when I wak up a hill or one fight of itam, I am very breathless ).0.90 ( 1.04 )2.85 ( 1.46 )3.03 ( 1.37 )3.21 ( 1.30 )
3.56 ( 1.37 )Q2 ( weight – 0.436 )Over the past 3 mo, I have had shortness of breath... The scale for this question ranges from 0 ( over the past 3 mo, I have had shortness of breath... not at all ) to 4 ( over the past 3 mo,. I have had shortness of breath... most days a week ).0.45 ( 0.89 )2.50 ( 1.30 )2.71 ( 1.18 )2.83 ( 1.21 )
Q3 : I feel breathless these daysSitting or lying still, %3162314
19Getting washed or dressed, %2172120
28Walking around at home, %2202123
27Walking outside on the level, %4364238
49Climbing up a flight of stairs, %20758183
87Climbing hills, %35838990
89Playing sports or games, %34788381
82Q3 ( total ) ( weight = 0.648 )The scale for this question ranges from 0 to 7, based on the number of positive answers for the 7 items.1.00 ( 1.25 )3.23 ( 1.72 )3.55 ( 1.63 )3.45 ( 1.61 )
3.76 ( 1.75 )Q4 ( weight – 0.091 )I am breathless when I talk, %2354337
39Q5 ( weight = 0.095 )I am breathless when I bend over, %5374537
56Q6 ( weight – 0.060 )I get afraid or panic when I cannot get my breath, %4303331
Because of my breathing...Q7 ( weight = 0.037 )I take a long time to get washed or dressed, %18910
17Q8 ( weight – 0.023 )I cannot take a bath or shower, or I take a long time, %0577
8Q9 ( weight = 0.116 )I walk slower than other people, or I have to stop for rests, %5404656
66Q10 ( weight – 0.113 )Jobs such as housework take a long time, or I have to stop for rests, %3384048
59Q11 ( weight = 0.124 )If I climb up one flight of stairs, I have to go slowly or stop, %5474457
67Q12 ( weight = 0.127 )If I hurry or walk fast, I have to stop or slow down10596270
5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.
17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.
Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdf
Tablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282
validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.
Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. html
Tablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 -", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. \n\nAll participants filled out the COPD Assessment Test \n(CAT) questionnaire. Elevated CAT scores indicate a \ngreater burden of respiratory symptoms impacting \ndaily activities and health status.13 The St. George’s \nRespiratory Questionnaire (SGRQ)14-16 was used to \nassess respiratory disease-related quality of life. Higher \nSGRQ scores indicate poorer health status. Both the \nCAT and SGRQ questionnaires were completed prior The composite dyspnea impact measure was scaled so its \nminimum value was 0 if the response to each of the 15 \nquestions was 0, and the maximum value was scaled to \n100 if the individual responses for all 15 questions rep- \nresented the most severe dyspnea response.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "The prevalence of individuals who were obese and \nmorbidly obese in the PRISm group partially explains \nthe between-group difference in dyspnea. The excess \ndyspnea seen in the PRISm group when compared with \nthe normal spirometry group is partly explained by \npatient-specific risk factors, including BMI, which \nshrink the mean dyspnea differential between the groups \nfrom 11.2 to 5.5 points (Tables 3-6). The remaining 5.5- \npoint difference indicates that PRISm patients have \nexcess dyspnea relative to symptomatic individuals with \nnormal spirometry for additional reasons other than \nobesity.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "s \nt \nh \ng \ni \ne \nw \nn \no \ni \nt \ns \ne \nu \nQ \n\n; \ny \nr \nt \ne \nm \no \nr \ni \np \ns \n\nd \ne \nr \ni \na \np \nm \n\n. \nn \nw \no \nh \ns \ni \n\no \ni \nt \na \nr \ne \nr \na \n\nd \ne \nv \nr \ne \ns \ne \nr \np \n¼ \nm \nS \nI \nR \nP \n\ns \ne \ny \n\nd \ne \nr \ne \nw \ns \nn \na \n\no \nh \nw \ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\n; \nt \ns \ne \nT \n\nt \nn \ne \nm \n\ns \ns \ne \ns \ns \nA \nD \nP \nO \nC \n¼ \nT \nA \nC \n\nf \no \n\ns \ne \ng \na \nt \nn \ne \nc \nr \ne \np \n\ne \nr \ne \nh \nw \n\nHowever, 1,415 either did not attend or were unable to \ncomplete adequate spirometry. Ultimately, 2,857 (67%) \nof those eligible underwent both pre- and post-BD \nspirometry. \n\nOf these 2,857 participants, 2,090 (73.2%) had normal \nspirometry, 265 (9.3%) had undiagnosed asthma, 330 \n(11.5%) had undiagnosed COPD, and 172 (6.0%) had \nPRISm based on post-BD spirometry. Of the 595 \nindividuals with spirometric evidence of asthma or \nCOPD, 253 were independently assessed by a \npulmonologist. In 245 of these 253 cases (97%), the \nindependent physician diagnosis agreed with the study \ndiagnosis of asthma or COPD. \n\nIndividuals in the COPD group were generally older \nand more likely to be male compared with all other \nstudy groups (Table 1). All groups, including healthy \ncontrol participants, had mean BMIs in the overweight \nor obese ranges. The PRISm group was heaviest with an \naverage BMI of 34.7, and 22% of PRISm patients met \nBMI criteria for morbid obesity. Compared with all \nother groups, those with COPD were the most likely to \nhave active or previous tobacco use, with the highest \naverage total pack-years of 32.7. The control group had \nthe lowest number of people with active or previous \ntobacco use. \n\n. \ns \nn \no \ni \nt \ns \ne \nu \nq \n\n, \ns \nn \no \ni \nt \ns \ne \nu \nq \nl \n\na \nu \nd \ni \nv \ni \nd \nn \no \nn \nr \no \ni \ns \ne \ny \nw \no \ne \nb \nl \ns \na \n\ns \nt \nn \na \np \ni \nc \ni \nt \nr \na \np \n\nn \nw \no \nh \ns \n\ne \nr \na \n\nt \nn \ne \nm \no \nt \n\nd \ne \nt \nn \ne \ns \ne \nr \np \ns \ns \ne \ns \ns \na \n\na \ne \nn \np \ns \ny \nd \n\ne \nr \ne \nw \n5 \n1 \nQ \no \nt \ne \nh \nt \n\ng \nn \ni \nt \na \nu \nc \na \nc \n3 \nQ \nd \nn \na \n\n, \n) \nl \na \nt \no \nt \n( \nr \no \nf \n\nd \ne \ns \nu \n\nTable 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. \n\nl \n\n. \ne \nr \ni \na \nn \nn \no \ni \nt \ns \ne \nu \nQ \n\nl \n\n3 \nQ \nd \nn \na \n\n) \ns \nt \nn \ne \ni \nc \nfi \nf \ne \no \nc \ny \nr \no \nt \na \nr \ni \np \ns \ne \nR \n\n, \n2 \nQ \n\n, \n1 \nQ \nr \no \nf \ng \nn \ni \nr \no \nc \ns \ns \ne \ng \nr \no \ne \nG \n\n’ \n) \nD \nS \n( \n\ns \ni \ns \ny \na \nn \na \nn \na \ne \nm \n\n. \nt \nS \n¼ \nQ \nR \nG \nS \n\nl \n\ns \na \n\nt \nn \ne \nn \no \np \nm \no \nc \nd \ne \nt \nn \ne \ns \ne \nr \np \nl \n\na \np \ni \nc \nn \ni \nr \np \n( \n\ne \nr \na \n\na \nt \na \nD", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Both landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A \n\n(P. H.), Dalhousie University, Halifax, NS; the Department of Medicine \n(I. M. and M. B.), University of Alberta, Edmonton, AB; the Depart- \nment of Medicine (M. D. L.), Queen’s University, Kingston; the \nDepartment of Medicine (C. J. L.), University of Western Ontario, \nLondon, ON; the Department of Medicine (T. A.), Memorial Uni- \nversity, St. John’s, NF; the Department of Medicine (N. E.), McGill \nUniversity, Montreal, QC; the Department of Medicine (M. A.), Uni- \nversity of Manitoba, Winnipeg, MN, Canada. \nDrs Bierbrier and Gerstein contributed equally to this manuscript. \nPart of this work has been presented at the American Thoracic Society \nConference, May 17-22, 2024, San Diego, CA. \nCORRESPONDENCE TO: Shawn D. Aaron, MD; email: saaron@ohri.ca \nCopyright (cid:1) 2024 The Author(s). Published by Elsevier Inc under li- \ncense from the American College of Chest Physicians. This is an open \naccess article under the CC BY license (http://creativecommons.org/ \nlicenses/by/4.0/). \n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD = \nbronchodilator; CAT = COPD Assessment Test; PCA = principal \ncomponent analysis; PRISm = preserved ratio impaired spirometry; \nSGRQ = St. George’s Respiratory Questionnaire \nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E. \nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa, \nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill \nUniversity, Montreal, QC; the Department of Medicine (C. B.), The \nUniversity of British Columbia, Vancouver, BC; \nthe Centre de \nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo- \nlogie de Québec, Université Laval, Quebec, QC; the Cumming School \nof Medicine (S. K. F.), University of Calgary, Calgary, AB; \nthe \nDepartment of Medicine (E. P.), University of Saskatchewan, Regina, \nSK; the Firestone Institute for Respiratory Health (R. A. M.), McMaster \nUniversity, Hamilton, ON; the Department of Medicine (C. L.), Uni- \nversité de Montreal, Montreal, QC; the Department of Medicine and \nthe Li Ka Shing Knowledge Institute (S. G.), St. Michael’s Hospital \nUniversity of Toronto, Toronto, ON; the Department of Medicine", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Can I put my plants directly on my compost ?", + "target_page": 2, + "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) \n\nBuilding Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Applications for Compost \n**Planting New Garden Beds or Lawns**\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 \ninches of existing soil: use more in sandy soils, and less in heavy clay. \nReapply ½-1 inch annually on garden beds. \n\n**Mulch (surface applications on landscape beds)**\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper \nairflow, it is best not to pile mulch around the stems of trees and \nshrubs. Pull mulch 1-2 inches away from stems. \n\n**Top Dressing for Lawns**\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into \nthe lawn. For best results, plug-aerate the lawn before top-dressing. \nOverseeding at the same time will thicken thin patches in lawns. \n\n**Blended (Manufactured) Topsoils**\nGood quality “topsoil” products usually include 10-40% compost by \nvolume, mixed with a sandy loam soil that allows good drainage. \nThese compost-soil blends help establish healthy lawns and gardens. \n\nThe Composting Process \nEven though there are a variety of composting methods, most \ncomposting follows a similar process: \n\n**1. Grinding Organic Materials:**\nDepending on the facility, the feedstock (material) available, and \nthe desired compost product, different combinations of materials \nare added together and ground into small pieces: \n\n• Nitrogen-rich materials (such as grass, fresh plant \n cuttings, biosolids, and manures) \n• Carbon-rich materials (such as dried leaves, woody \n materials, and straw). \n\n**2. Heating Up:**\nThe material is placed into piles where it begins to heat up from \nthe biological activity of the compost microbes. Typically, com- \npost temperatures are required to reach at least 131 degrees F in a \nspecified time period in order to destroy weed seeds and patho- \ngens. The compost is turned or aerated, allowing the composting \nmicrobes to breathe. After a period of time, the nitrogen-rich \nmaterial is depleted, the biological process slows, and the hot \ncompost begins to cool. \n\n**3. Finishing:**\nTypically “finished” compost has undergone a series of steps to \nensure maturity and stability. The cooling compost is aged, which \nallows the decomposition process to slow down and the finished \ncompost to stabilize.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**HOW TO GET A COMPOST KIT?**\n\n**Buy your own compost kit and get**\n**tips for good composting practice.**\nOnly during opening hours every \nwednesday from 2 pm to 4 pm at \nthe old recycling centre impasse \nElie Teyssier-Miramont. (In case of \nunavailability, please contact the \nenvironment department). \n30 minute workshops/awareness- \nraising sessions are regularly \norganised (starting at 4pm). It is \npossible to leave with a composter \nduring these workshops**. \nRegistration and information with \nthe service. \n\n**Compost kit** **Plastic** **Wood**\n\n300 L 20 € 30 € \n\n400 L 25 € 35 € \n\n*Only payment by cheque made payable to the \n‘Tresor Public‘ are accepted \n**Specific condition of acquisition apply accor- \nding to your municipality of residence \n\n\n \n \n \n \n [html]\n
Black containerYellow containerAGNAC
TUESDAY white weeksTHURSDAY green weeksALLEMANS - DU - DROPT
MONDAY green weeksWEDNESDAY white weeksARMILLAC
TUESDAY white weeksTHURSDAY green weeksBOURGOUGNAGUE
WEDNESDAY green weeksFRIDAY white weeksCAMBES
MONDAY green weeksWEDNESDAY white weeksLACHAPELLE
MONDAY green weeksTHURSDAY white weeksLAPERCHE
TUESDAY white weeksWEDNESDAY green weeksLA - SAUVETAT - DU - DROPT
TUESDAY white weeksTHURSDAY green weeksLAUZUN
MONDAY green weeksFRIDAY white weeksLAVERGNE
TUESDAY white weeksTHURSDAY green weeksMIRAMONT - DE - GUYENNE
TUESDAY green weeksTHURSDAY white weeksMONTIGNAC - DE - LAUZUN
WEDNESDAY white weeksWEDNESDAY green weeksMONTIGNAC - TOUPINERIE
TUESDAY white weeksTHURSDAY green weeksMOUSTIER
WEDNESDAY green weeksWEDNESDAY white weeksPEYRIERE
MONDAY green weeksTHURSDAY white weeksPUYSSERAMPION
MONDAY green weeksWEDNESDAY white weeks113
ROUMAGNEMONDAY white weeksTHURSDAY green weeks
SAINT - COLOMB - DE - LAUZUNWEDNESDAY white weeksWEDNESDAY green weeks
SAINT - PARDOUX - ISAACMONDAY white weeksFRIDAY green weeks
SEGALASWEDNESDAY white weeksWEDNESDAY green weeks
\n\n**MORE QUESTIONS ?**\n\nWebsite:**www.ccpl47.fr**\n/ Section En Pratique > Environnement > Gestion des déchets \n\n**Environnement Service**: \n12 rue du Renfort 47410 LAUZUN \n**05 53 94 11 23 / secretariat.environnement@ccpl47.fr**\n**Composting**: anim.biodechets@ccpl47.fr / 06 33 72 84 18 \n**Recycling centre access, registration or modification**: iris@ccpl47.fr / 05 53 64 12 26 \n\n3 \n2 \n0 \n2 \n1 \n1 \n- \nm \no \nc \n. \ni \n\n. \n\no \nk \ne \nd \na \nw \nw \nw \n- \n\n. \n\ni \n\no \nk \né \nd \nA \n: \n\nn \no \ni \nt \np \ne \nc \nn \no \nC", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "How Much Compost to Use \n\n l Estimate the planting area (Math Hint: Square feet = length x width) \n l Decide upon the appropriate application depth of the compost (page 4) \n l Use the charts below to estimate your compost needs. (Abbreviations: ft = foot; yd = yard; sq = square; cu = cubic.) \n l Conversions: 9 square feet = 1 square yard; 27 cubic feet = 1 cubic yard. \n\n**Question:*I have a plot about this big, how much compost do I buy?***\n\n\n \n \n \n \n [html]\n
Plot Size# of Sq Feet1 / 2 * Deep - Mulching or Top - dressing2nd Deep – Amending new lawns or gardens
5 ' x 10 ' plot50 sq ft2.08 cu ft of compost8.33 cu ft of compost ( 0.31 cu yd ) 16.66 cu ft of compost ( 0.62 cu yd )
20 x 50 ′ plot 1 acre1000 sq ft 43.600 sq ft41.7 cu ft of compost1.815 cu ft of compost ( 67 cu vd )166.7 cu ft of compost ( 6.2 cu yd ) 7.257 cu ft of compost ( 268 cu vd )
\n\n\n \n \n \n \n [html]\n
Compost Quantity1 / 2 * Deep - Mulching or Top - dressing2nd Deep - Amending new lawns or gardens
1 cu ft bag of compost24 sq foot area6 sq foot area
1.5 cu ft bag of compost36 sq foot area9 sq foot area
2.2 cu ft bag of compost53 sq foot area13 sq foot area
2.5 cu ft bag of compost60 sq foot area15 sq foot area
1 cubic yard of compost648 sq foot area162 sq foot area
\n\n*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**", + "page_start": 7, + "page_end": 7, + "source_file": "CompostGuide.pdf" + }, + { + "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon.", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Mangroves, a tropical evergreen shrub, which forms dense thickets along E N V I R O N M E N T A L I S S U E S \n\ncoastlines, are a key element of the life cycle of a large number of marine species in the areas in \n\nwhich Mermaid principally operates. \n\nAs at the date of the report, five hundred (500) juvenile mangroves have been transplanted with \n\n90% success. A further 174 mangrove seedlings have been planted and are showing very good \n\ngrowth rates. Attempts to transplant adult mangrove trees, have proved to be more difficult, but \n\nthe success with young plants now appears to guarantee a more than satisfactory outcome.", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Liability under CERCLA is not dependent upon the intentional disposal of hazardous waste or \nhazardous substances. It can be founded upon the release or threatened release, even as a result of \nunintentional, non-negligent or lawful action, of thousands of hazardous substances, including very small \nquantities of such substances. Thus, even if our landÑlls have never knowingly received hazardous waste \nas such, it is possible that one or more hazardous substances may have been deposited or \"\"released'' at \nour landÑlls or at other properties which we currently own or operate or may have owned or operated. \nTherefore, we could be liable under CERCLA for the cost of cleaning up such hazardous substances at \nsuch sites and for damages to natural resources, even if those substances were deposited at our facilities \nbefore we acquired or operated them. The costs of a CERCLA cleanup can be very expensive. Given the \ndiÇculty of obtaining insurance for environmental impairment liability, such liability could have a \nmaterial impact on our business and Ñnancial condition. For a further discussion, see \"\"Ì Liability \nInsurance and Bonding.'' \n\n(3)*The Federal Water Pollution Control Act of 1972, as amended.*This Act regulates the \ndischarge of pollutants from a variety of sources, including solid waste disposal sites, into streams, rivers \nand other waters of the United States. Point source runoÅ from our landÑlls and transfer stations that is \ndischarged into surface waters must be covered by discharge permits that generally require us to conduct \n\n\n \n \n \n \n [html]Table\n
TableTable
", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "What are fertilizers ?", + "target_page": 4, + "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) \n\nBuilding Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Applications for Compost \n**Planting New Garden Beds or Lawns**\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 \ninches of existing soil: use more in sandy soils, and less in heavy clay. \nReapply ½-1 inch annually on garden beds. \n\n**Mulch (surface applications on landscape beds)**\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper \nairflow, it is best not to pile mulch around the stems of trees and \nshrubs. Pull mulch 1-2 inches away from stems. \n\n**Top Dressing for Lawns**\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into \nthe lawn. For best results, plug-aerate the lawn before top-dressing. \nOverseeding at the same time will thicken thin patches in lawns. \n\n**Blended (Manufactured) Topsoils**\nGood quality “topsoil” products usually include 10-40% compost by \nvolume, mixed with a sandy loam soil that allows good drainage. \nThese compost-soil blends help establish healthy lawns and gardens. \n\nThe Composting Process \nEven though there are a variety of composting methods, most \ncomposting follows a similar process: \n\n**1. Grinding Organic Materials:**\nDepending on the facility, the feedstock (material) available, and \nthe desired compost product, different combinations of materials \nare added together and ground into small pieces: \n\n• Nitrogen-rich materials (such as grass, fresh plant \n cuttings, biosolids, and manures) \n• Carbon-rich materials (such as dried leaves, woody \n materials, and straw). \n\n**2. Heating Up:**\nThe material is placed into piles where it begins to heat up from \nthe biological activity of the compost microbes. Typically, com- \npost temperatures are required to reach at least 131 degrees F in a \nspecified time period in order to destroy weed seeds and patho- \ngens. The compost is turned or aerated, allowing the composting \nmicrobes to breathe. After a period of time, the nitrogen-rich \nmaterial is depleted, the biological process slows, and the hot \ncompost begins to cool. \n\n**3. Finishing:**\nTypically “finished” compost has undergone a series of steps to \nensure maturity and stability. The cooling compost is aged, which \nallows the decomposition process to slow down and the finished \ncompost to stabilize.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "How Much Compost to Use \n\n l Estimate the planting area (Math Hint: Square feet = length x width) \n l Decide upon the appropriate application depth of the compost (page 4) \n l Use the charts below to estimate your compost needs. (Abbreviations: ft = foot; yd = yard; sq = square; cu = cubic.) \n l Conversions: 9 square feet = 1 square yard; 27 cubic feet = 1 cubic yard. \n\n**Question:*I have a plot about this big, how much compost do I buy?***\n\n\n \n \n \n \n [html]\n
Plot Size# of Sq Feet1 / 2 * Deep - Mulching or Top - dressing2nd Deep – Amending new lawns or gardens
5 ' x 10 ' plot50 sq ft2.08 cu ft of compost8.33 cu ft of compost ( 0.31 cu yd ) 16.66 cu ft of compost ( 0.62 cu yd )
20 x 50 ′ plot 1 acre1000 sq ft 43.600 sq ft41.7 cu ft of compost1.815 cu ft of compost ( 67 cu vd )166.7 cu ft of compost ( 6.2 cu yd ) 7.257 cu ft of compost ( 268 cu vd )
\n\n\n \n \n \n \n [html]\n
Compost Quantity1 / 2 * Deep - Mulching or Top - dressing2nd Deep - Amending new lawns or gardens
1 cu ft bag of compost24 sq foot area6 sq foot area
1.5 cu ft bag of compost36 sq foot area9 sq foot area
2.2 cu ft bag of compost53 sq foot area13 sq foot area
2.5 cu ft bag of compost60 sq foot area15 sq foot area
1 cubic yard of compost648 sq foot area162 sq foot area
\n\n*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**", + "page_start": 7, + "page_end": 7, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**Simulation of maize yield using DSSAT.**According to the data of global warming by 1.5 °C and 2.0 °C \nselected above, we simulated global maize yield changes compared with the average yield during 1986–2005 on \ngrid level using CERES-Maize, which is part of DSSAT version 4.649. \n\nThe inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- \nagement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- \nperformance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- \nperatures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability \nand Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are \ngridded formatted at a resolution of 5 min50. For management information, fertilizer applications, irrigation \nand other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application \nfor the world was developed by integrating national and subnational fertilizer application data from a variety of \nsources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters \nare from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon \ncontent and fraction of calcium carbonate for each of five 20 cm thick soil layers51. All the soil data is allocated \nto be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were \nadopted from FAO soil dataset. \n\nFirst maize yields across the world during the historical period 1986–2005 were simulated at the 0.5° × 0.5° \ngrid scale with two main production systems, including Spring maize and Summer maize. Historical national \nmaize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from \nthe gridded global dataset by combining two data products47. Second, genetic parameters of specific cultivars of \nmaize from previous works were adopted for the initial parameters; model parameters related to crop genotype \ncharacteristics were calibrated and tuned following the method in Xiong et al.52, in which the simulated yields \nfrom 1986–2005 were comparable to the statistical data. Third, maize yields across the world were simulated \nunder global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- \nded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, \ncomparing maize yield average for 1986–2005. \n\n**Simulation of market price using GTAP.**The yield changes for maize from the DSSAT models under \n1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes \nin production, market price, and self-sufficiency ratio of maize at national and global levels53,54. For this study, we \nuse a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of \nthe major food crops under current economic conditions. Utilizing current economic conditions has the advan- \ntage of minimizing assumptions and model uncertainties related to future economic conditions55,56. \n\nThe original GTAP database doesn’t include maize as a separate sector, rather it is combined with other coarse \ngrains to form an “other coarse grain” sector. For this study, we updated the GTAP database by splitting maize \nfrom the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the \noriginal database. The detailed method is given as follows:", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "[html]
excLocationRegionTotal Acreage ( 2 )Permitted Acreage ( 3 )Unsed Pcresitted Acreage ( 4 )
fillWinter Garden, FloridaSouthern80583
IfillRichmond, VirginiaEastern8413884
Clark County, NevadaWestern2.2851.2331.018n
Montrose, MichiganCentral- 440643St Landfill
Jesup, GeorgiaSouthern1.40010549Farms
Detroit, MichiganCentral640388192Pail
Bartow, FloridaSouthern3926868N35te
Abilene, TexasSouthwestern39600264Canyon
Valencia, CaliforniaWestern59225745Me
East Sparta, OhioEastern815258170ndfill
Morganfield, KentuckyCentral2314723Dona Landfill
Aulander, North CarolinaSouthern4011342..........................
Onaway, MichiganCentral994025Landfill
Williamstown, KentuckyCentral89910031Landfill ( 1 )
Lenior, North CarolinaSouthern2587850n
Three O3ks, MichiganCentral2811659Age
Denver, ColoradoSouthwestern602195133n
Greenville, South CarolinaSouthern21478
Oconee, GeorgiSouthern379118108IR ven
Perry Hall, MarylandEastern68395Easylo
Racine, WisconsinCentral21813820( 1 )
Laughlin, NewadaWestern4040-Ridge
Delavan, WisconsinCentral746422Specification
York, PennsylvaniaEastern73923022Serv - All
Fort Wayne, IndianaCentral587204ε Road
St. Augustine, FloridaSouthern3545725Substance
Houston, TexasSouthwestern100312Tennessee
Union City, TennesseeCentral60012072Age
Winder, GeorgiaSouthern32972Control ( 1 )
Beaver Dam, KentuckyCentral908178121I
North Charleston, South CarolinaSouthern3726ve
Amanda, OhioEastern73411265Age
Griffin, GeorgiaSouthern515196130...
Swissan, CaliforniaWestern1.423190681 )
Presidio, TexasSouthwestern1010. 6Alpine ( 1 )
Alpine, TexasSouthwestern807467/ CSC
Avalon,", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "[html]
20132012201120102009j PRODUCTION – Chatree
AFRSAFRSAIFRSAFRSAFRSOre mined ( 10 )2.709
1.9472.3522.6991.674Waste mined (‘ 000 bank cubic metres )3.5216.259
6.1286.4324.069Waste to ore ratio1.33.22.6
2.42.4Ore mined (‘ 000 tonnes )7.0514.9865.3016.583
3.874Ore treated (‘ 000 tonnes )5.6995.1162.5332.7051.878
Head grade − Gold grams / tonne0.90.91.11.71.7Head grade – Silver grams / tonne
11.911.65.74.95.8Gold recovery (%)79.9 %
84.4 %87.2 %90.4 %91.2 %Gold poured ( ounces )133.681121.372
76.248132.62893.002Silver poured ( ounces )1.000.569918.314549.699
549.522293.472j PRODUCTION – Challenger( 5 months )Ore mined (‘ 000 tonnes )502607
232Ore treated (‘ 000 tonnes )557645289Head grade – Gold grams / tonne3.9
4.64.3Gold recovery (%)94.5 %92.4 %92.2 %Gold poured ( ounces )
66.21687.38836.886Silver poured ( ounces )3.4664.9712.581
PROFT 8 LOSS ( ASUI )Sales revenue329.282357.372172.356175.480
113.015Operating expenses( 195.064 )171.505 )( 86.147 )( 74.305 )( 65.599 )
Administration expenses( 15.515 )( 12.737 )( 11.304 )( 3.615 )( 4.595 )Other ( expenses )/ income
( 23.693 )6.398 )( 28.424 )6183.509EBITDA95.010
166.73246.48198.17846.330Impairment losses( 332.808 )Depreciation & amortisation
( 85.595 )( 67.553 )( 27.772 )14.004( 11.575 )EBIT( 323.393 )
99.17918.70984.17434.755Net finance ( costs )/ income( 16.222 )( 7.902 )
( 922 )( 1.823 )( 1.698 )Profit / ( loss ) before income tax( 339.615 )91.27717.787
82.35133.057Income tax ( expense )/ benefit15.889( 16.271 )3.092( 9.285 )
( 535 )Net profit / ( loss ) after income tax( 323.726 )75.00620.87973.06632.522
Non – controlling interests...153269....Net profit attributable to owners of Kingsgate Consolidated Limited
( 323.726 )75.15921.14873.06632.522BALANCE SHEET ( 61 )Current assets – cash
32.98790.62335.86449.09829.680Current assets – other109.575
103.43370.28054.20327.848Non – current assets627.426854.403
688.919265.774217.445Total", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "less environmentally critical processes (see for example, the principles of ‘green engineering’, like \nprevention instead of treatment of waste288). \n\n**Chemical technologies have ousted traditional materials and processes.**The United Nations’ \n(UNEP) ‘Global Chemical Outlook’289 documents a strong growth of chemical production between 1970 \nand 2010. The value of the global chemical production grew from US$171 billion in 1970, to \napproximately US$ 5.7 trillion in 2019, roughly 33 times more. 290 The EU had a share of $1.3 trillion or \nabout 20% of the global value. In less than two decades between 2000 and 2017, the capacity doubled \nand grew from 1,186 million tons to 2,276 million tons.291,292 \n\nThe reasons for this strong growth are: a) the**replacement of traditional materials**(wood, stone, iron \nand other metals, paper, natural fibres) by chemically based products (foremost plastics and multi- \nmaterial products); b)**the replacement of traditional technologies by chemical processes**(e.g. \ngluing instead of screwing of connections in metal, two-component paints); c) the development of**new**\n**products**(e.g. electronic devices, new types of batteries, nano); and d)**new applications**(e.g. specific \nfertilisers and pesticides). \n\n**Table 29: Production and consumption of chemicals by hazard class in the EU in 2019 – Eurostat293**\n\n\n \n \n \n \n [html]\n
HAZARD ( Labels )2021
Hazardous to health214.3
Carcinogenic, mutagenic and reprotoxic ( CMR ) health hazard39.9
Chronic toxic health hazard25.4
Very toxic health hazard59.2
Toxic health hazard35.5
Harmful health hazard54.5
All labels referring to : Hazardous to the environment169.6
Hazardous and non - hazardous – Total278.9
\n\n\n\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic \nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment \n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294 \n\nThe ESENER 2019 survey provides information about**sectors that reported a particularly high**\n**prevalence of dangerous substances**. The percentage of enterprises reporting handling or exposure \nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and \nelectricity supply’, and 47% in ‘Human health and social work activities’. 295 \n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive \nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework \nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in \nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such \nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling \nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the \nregulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also \nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and \ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural \nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics).", + "page_start": 106, + "page_end": 106, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Explain to me what is peat moss ?", + "target_page": 4, + "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**\n\nCompost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. \n\nCompost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. \n\nComparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nCompost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. \n\n\n \n \n \n \n [html]\n
1.2TableTableTable
TableTableTable_
parametermin***13
sMRI,1.
\n\n*Many localities now collect food scraps and \nfood-soiled paper along with yard debris for \ncomposting. Call your local collection service \nto find out what is collected in your area.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "[html]
Deleting Pod and maintaining the data[ root @ dcocp01 “]# oc get podsNAMETableTableREADYSTATUS
RESTARTSAGEappmongo – i bm – mongob - dev1 / 1Running0
21hdocker - registry - 2 -dxwx1 / 1Running113d
router - 1 - g9btn1 / 1Runni ng113d[ root @ dcocp01 “]#c de1
te pod appmongo - 1bm - mongodb - devpod “ appmongo – ibm – mongod– development deleted[ root @ dcocp01 “]# 1 total 146028- 1an † smongof ' s / mongo /drwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4096Nov1012 : 07.drwxr - xr - x. 4 rootroot
40960ct3112 : 28.- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter
16384Nov1012 : 07co11ection - 0 -- 16295157678663310. wt
- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter24576Nov1012 : 07co11ection - 0 - 77444
3060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameters32768Nov1012 : 07
co11ection - 2 --- 16295157678663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Parameter145391616Nov
12 : 07co11ecti1on - 3 - 77444872703060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Patients16384
Nov1012 : 07co11ection - 4 -- 16295157678663310. wtdrwx ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4096Nov1012 : 07diagnostc. d- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16384Nov1012 : 07index - 1", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + }, + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) \n\nBuilding Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "[html]
total 1460834 mongo mongo8192Nov916 : 59.
drwxr - xr - x. 7 root40960ct3112 : 28...- rw ----------- 1 mongo root
16384Nov914 : 38co11ect1on - 0 -- 1629751576978663310. wt- rw ----------- 1 mongo root36864
916 : 58co11ect : ion - 0 - 7744448727083060016. wt- rw ----------- 1 mongo root32768Nov9
co11ect1on - 2 --- 1629751576978663310. wt- rw ----------- 1 mongo root145391Nov916 : 24co11ect : ion - 3 - 7744448727083060016. wt
16384Nov914 : 38co11ect1on - 4 -- 1629751576978663310. wtdrwx ---------- 2 mongo root8192
1012 : 01diagnostic. data- rw ----------- 1 mongo root16384Nov9
‘ index - 1 --- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov916 : 58‘ index - 1 - 7744448727083060016. wt
- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov916 : 58‘ index - 2 - 7744448727083060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
32768Nov914 : 39index - 3 -- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------3735552
Nov916 : 24index - 4 - 7744448727083060016. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------16384Nov
914 : 38index - 5 -- 1629751576978663310. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------16384Nov9
15 : 27‘ index - 6 --- 1629751576978663310. wtZ mongo root8192Nov916 : 23
journa1- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------36864Nov915 : 31__mdb_cata1og. wt
- rw ----------- 1 mongo root2Nov914 : 38mongod. lock- rw", + "page_start": 198, + "page_end": 198, + "source_file": "sg248459.pdf" + }, + { + "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon.", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**Compost Organizations**\n\nThe Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. \n\n\n \n \n \n \n [html]\n
www. compostwashington. org
US Composting Council
Seal of Testing Assurance ( STA ) program www. compostingcouncil. org / programs / sta /
Restoring the Soil to Protect our Waterways
Compost amendment and erosion control during construction : information for builders www. buildingsoil. org
Natural Lawn & Garden Care, Soils, and Home Composting
City of Seattle www. seattle. gov / util / services / yard
King County www. kingcounty. gov / soils
Washington State University www. puyallup. wsu. edu / soilmgm
", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "To be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow \nin Figures 3 and 4) in earlier years, the clusters to which they belonged had significantly different \nmeanings. As mentioned in the results section, these hashtags were associated with a series of scientific \nhashtags in the climate change discourse, appealing to global efforts. In the global warming discourse, \nthey were clustered with “hoax” and “frame”, showing lack of belief in climate issue facts and hesitation \nabout global efforts. More recently, when discussions about temperature, politics, and hesitation \nsignificantly shrank in the global warming discourse, the wo discourses showed more similarities about \nthe importance of scientific concepts according to Figure 5a,b. However, links between global efforts \nand scientific facts were not constructed in the global warming discourse. According to a network \nmodel for cognition, the lack of associations means fewer psychological activations will spread to", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed10.pdf" + }, + { + "text": ": 31
__mdb_cata1og. wt
- rw ----------- 1 mongo root2Nov914 : 38mongod. lock- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
36864Nov916 : 59sizeStorer. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------114
Nov914 : 38storage. bson- rw ----------- 1 mongo root48Nov
914 : 38Wi redTiger- rw ----------- 1 mongo root4096Nov9
14 : 38Wi redTigerLAS. wt- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------21Nov914 : 38
Wi redT iger. 1 ock- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------1049Nov916 : 59Wi redTiger. turt1e
- rw -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------69632Nov916 : 59Wi redTiger. wt
\n [html]\n
Statested***QIIT1BTableCCL.PP0.000TableTableTableParameter
Med
", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed1.pdf" + }, + { + "text": "Models of Learning and Decision-Making. PLoS ONE**2010**, 5, e15554. [CrossRef] [PubMed] \n\n62. Wilson, R.C.; Collins, A.G. Ten simple rules for the computational modeling of behavioral data. eLife**2019**, 8, e49547. [CrossRef] \n63. Hess, A.J.; Iglesias, S.; Köchli, L.; Marino, S.; Müller-Schrader, M.; Rigoux, L.; Mathys, C.; Harrison, O.K.; Heinzle, J.; Frässle, \nS.; et al. Bayesian Workflow for Generative Modeling in Computational Psychiatry. bioRxiv**2024**, bioRxiv:2024.02.19.581001. \n[CrossRef] \n\n64. TuringLang/ParetoSmooth.jl. 2024. Available online: https://github.com/TuringLang/ParetoSmooth.jl (accessed on 25 October 2024). \n65. Palmeri, T.J.; Love, B.C.; Turner, B.M. Model-based cognitive neuroscience. J. Math. Psychol.**2017**, 76, 59–64. [CrossRef] [PubMed] \n66. Kagan, B.J.; Kitchen, A.C.; Tran, N.T.; Habibollahi, F.; Khajehnejad, M.; Parker, B.J.; Bhat, A.; Rollo, B.; Razi, A.; Friston, K.J. In vitro \n\nneurons learn and exhibit sentience when embodied in a simulated game-world. Neuron**2022**, 110, 3952–3969.e8. [CrossRef] \n\n67. Waade, P.T.; Olesen, C.L.; Laursen, J.E.; Nehrer, S.W.; Heins, C.; Friston, K.; Mathys, C. As One and Many: Relating Individual \n\nand Emergent Group-Level Generative Models in Active Inference. Preprints**2024**, 2024101895. [CrossRef]", + "page_start": 31, + "page_end": 31, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "33. Kaplan, S. Cognitive maps in perception and thought. In Image and Environment: Cognitive Mapping and \n\nSpatial Behavior; Transaction Publishers: Piscataway, NJ, USA, 1973; pp. 63–78. \nJames, W.; Burkhardt, F.; Bowers, F.; Skrupskelis, I.K. The Principles of Psychology; Macmillan London: London, \nUK, 1890. \n\n34. \n\n35. Alonso, E.; Mondragón, E. Associative Learning and Behaviour: An Algebraic Search for Psychological \nSymmetries. In Language, Representation and Reasoning: Memorial Volume to Isabel G*ó*mez Txurruka; Universidad \ndel País Vasco: Bilbao, Spain, 2007; p. 35. \n\n36. Lang, A. The limited capacity model of mediated message processing. J. Commun.**2000**, 50, 46–70. [CrossRef] \n37. Tulving, E. Episodic and semantic memory. Organ. Mem.**1972**, 1, 381–403. \n38. Rosch, E. Cognitive representations of semantic categories. J. Exp. Psychol. Gen.**1975**, 104, 192. [CrossRef] \n39. Klimesch, W. The Structure of Long-Term Memory: A Connectivity Model of Semantic Processing; Psychology \n\nPress: London, UK, 2013. \n\n40. Collins, A.M.; Loftus, E.F. A spreading-activation theory of semantic processing. Psychol. Rev.**1975**, 82, 407. \n\n[CrossRef] \n\n41. Guo, L.; Vu, H.T.; McCombs, M. An expanded perspective on agenda-setting effects: Exploring the third \n\nlevel of agenda setting. Rev. De Comun.**2012**, 11, 51–68. \n\n42. Cheng, Y.; Chan, C.M. The third level of agenda setting in contemporary China: Tracking descriptions of \n\nmoral and national education (MNE) in media coverage and people’s minds. Int. J. Commun.**2015**, 9, 18. \n\n43. Wettler, M.; Rapp, R. Computation of Word Associations Based on Co-occurrences of Words in Large Corpora. \n\nIn Proceedings of the VLC@ACL 1993, Columbus, OH, USA, 22 June 1993. \n\n44. Collins, A.M.; Quillian, M.R. How to make a language user. In Organization of Memory; Academic Press: \n\nNew York, NY, USA, 1972; p. 309. \n\n45. Danowski, J.A. Inferences from word networks in messages. In The Content Analysis Reader; SAGE: Thousand \n\nOaks, CA, USA, 2009; pp. 421–429. \n\n46. Hamed, A.A.; Ayer, A.A.; Clark, E.M.; Irons, E.A.; Taylor, G.T.; Zia, A. Measuring climate change on Twitter \nusing Google’s algorithm: Perception and events. Int. J. Web Inf. Syst.**2015**, 11, 527–544. [CrossRef] \n47. Haunschild, R.; Leydesdorff, L.; Bornmann, L.; Hellsten, I.; Marx, W. Does the public discuss other topics on \nclimate change than researchers? A comparison of explorative networks based on author keywords and \nhashtags. J. Inf.**2019**, 13, 695–707. [CrossRef] \n\n48. Veltri, G.A.; Atanasova, D. Climate change on Twitter: Content, media ecology and information sharing \n\nbehaviour. Public Underst. Sci.**2017**, 26, 721–737. [CrossRef] \n\n49. Abbar, S.; Zanouda, T.; Berti-Equille, L.; Borge-Holthoefer, J. Using twitter to understand public interest in \nclimate change: The case of qatar. In Proceedings of the Tenth International AAAI Conference on Web and \nSocial Media, Cologne, Germany, 17–20 May 2016. \n\n50. Olteanu, A.; Castillo, C.; Diakopoulos, N.; Aberer, K. Comparing events coverage in online news and social \nmedia: The case of climate change. In Proceedings of the Ninth International AAAI Conference on Web and \nSocial Media, Oxford, UK, 26–29 May 2015. \n\n51. Hermida, A.; Fletcher, F.; Korell, D.; Logan, D. Share, like, recommend: Decoding the social media news \n\nconsumer. J. Stud.**2012**, 13, 815–824. [CrossRef] \nSmall, T.A. What the hashtag? A content analysis of Canadian politics on Twitter. Inf. Commun. Soc.**2011**, 14, \n872–895. [CrossRef] \n\n52. \n\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. \n\nHum. Serv.**2012**, 30, 160–185. [CrossRef]", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed10.pdf" + }, + { + "text": "Self-Supervised Learning from Videos \n\nSimilar to unsupervised learning from images, a family of unsupervised video representation learning approaches \nenforces a spatio-temporal representation of a video clip to be invariant to hand-crafted spatio-temporal data \naugmentations (Parthasarathy et al., 2022). However, one obvious insight is that the temporal ordering of visual \ninformation in video can provide implicit supervision. Indeed, this insight is the key insight leveraged by many works \non unsupervised video learning. Towards leveraging temporal information as supervision, some approaches train a \nvisual encoder by predicting the temporal ordering of frames (Xu et al., 2019; Lee et al., 2017). Other approaches \nseek to predict low-level motion vectors computed from optical flow (Pintea et al., 2014), or to predict mixing pixels \nin video frames, using either a frame-interpolation objective (Kalluri et al., 2023) or a denoising autoencoder (Tong \net al., 2022; Feichtenhofer et al., 2022; Wang et al., 2023a). \n\n15", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv3.pdf" + }, + { + "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**\n\n1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. \n\n**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 \n\n**MSC:**91-08 \n\n\n \n \n \n \n [html]\n
Citation : Nehrer, S. W.; EhrenreichTable
Laursen, J,; Heins, C.; Friston, K ;Mathys, C.; Thestrup Waade, P.
Introducing Active Inference. j1 : AJulia Library for Simulation and
Parameter Estimation with ActiveInference Models. Entropy 2025.27.62.
https :// doi. org / 10.3390 / e27010062Copyright : © 2025 by the authors.
Licensee MDPI, Basel, Switzerland.This article is an open access article
distributed under the terms andconditions of the Creative Commons
Attribution ( CC BY ) license( https :// creativecommons. org /
licenses / by / 4.0 /).
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Ting Chen, Simon Kornblith, Mohammad Norouzi, and Ge- \noffrey Hinton. A simple framework for contrastive learning \nof visual representations. preprint arXiv:2002.05709, 2020. \n\nRoss Goroshin, Joan Bruna, Jonathan Tompson, David Eigen, \nand Yann LeCun. Unsupervised learning of spatiotempo- \nrally coherent metrics. In Proceedings of the IEEE inter- \nnational conference on computer vision, pages 4086–4093, \n2015. \n\nXiaokang Chen, Mingyu Ding, Xiaodi Wang, Ying Xin, \nShentong Mo, Yunhao Wang, Shumin Han, Ping Luo, \nGang Zeng, and Jingdong Wang. Context autoencoder \nfor self-supervised representation learning. arXiv preprint \narXiv:2202.03026, 2022. \n\nRaghav Goyal, Samira Ebrahimi Kahou, Vincent Michal- \nski, Joanna Materzynska, Susanne Westphal, Heuna Kim, \nValentin Haenel, Ingo Fruend, Peter Yianilos, Moritz \nMueller-Freitag, et al. The\" something something\" video \ndatabase for learning and evaluating visual common sense. \nIn Proceedings of the IEEE international conference on \ncomputer vision, pages 5842–5850, 2017. \nXinlei Chen, Saining Xie, and Kaiming He. An empirical \nstudy of training self-supervised vision transformers. arXiv \npreprint arXiv:2104.02057, 2021. \n\nMehdi Cherti, Romain Beaumont, Ross Wightman, Mitchell \nWortsman, Gabriel Ilharco, Cade Gordon, Christoph \nSchuhmann, Ludwig Schmidt, and Jenia Jitsev. Repro- \nducible scaling laws for contrastive language-image learn- \ning. In Proceedings of the IEEE/CVF Conference on Com- \nputer Vision and Pattern Recognition, pages 2818–2829, \n2023. \nJean-Bastien Grill, Florian Strub, Florent Altché, Corentin \nTallec, Pierre H Richemond, Elena Buchatskaya, Carl Do- \nersch, Bernardo Avila Pires, Zhaohan Daniel Guo, Moham- \nmad Gheshlaghi Azar, et al. Bootstrap your own latent: A \nnew approach to self-supervised learning. arXiv preprint \narXiv:2006.07733, 2020. \n\n11", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv3.pdf" + }, + { + "text": "Revisiting Feature Prediction for Learning Visual \nRepresentations from Video \nAdrien Bardes1,2,3, Quentin Garrido1,4, Jean Ponce3,5,6, Xinlei Chen1, Michael Rabbat1, Yann LeCun1,5,6, \nMahmoud Assran1,†, Nicolas Ballas1,† \n1FAIR at Meta, 2Inria, 3École normale supérieure, CNRS, PSL Research University, 4Univ. Gustave Eiffel, \nCNRS, LIGM, 5Courant Institute, New York University, 6Center for Data Science, New York University \n†Joint last author \n\nThis paper explores feature prediction as a stand-alone objective for unsupervised learning from video and \nintroduces V-JEPA, a collection of vision models trained solely using a feature prediction objective, without \nthe use of pretrained image encoders, text, negative examples, reconstruction, or other sources of supervision. \nThe models are trained on 2 million videos collected from public datasets and are evaluated on downstream \nimage and video tasks. Our results show that learning by predicting video features leads to versatile visual \nrepresentations that perform well on both motion and appearance-based tasks, without adaption of the \nmodel’s parameters; e.g., using a frozen backbone. Our largest model, a ViT-H/16 trained only on videos, \nobtains 81.9% on Kinetics-400, 72.2% on Something-Something-v2, and 77.9% on ImageNet1K. \n\nFigure 1 V-JEPA models pretrained on video learn versatile \nvisual representations. \nIt performs well on motion-based \ntasks (Something-Something-v2) and appearance-based tasks \n(Kinetics 400) without adaptation of the model’s parameters, \ni.e., using the same frozen backbone for both tasks. \n\n1 Introduction \n\n1 \nv \n1 \n7 \n4 \n8 \n0 \n. \n4 \n0 \n4 \n2 \n: \nv \ni \nX \nr \na \nHumans possess the remarkable ability to map low-level \nsignals originating from the retina into a semantic spatio- \ntemporal understanding of the world; synthesizing no- \ntions such as objects and global motion (Spelke et al., \n1995). A long-standing goal of the machine learning \ncommunity is to identify the principles or objectives that \nmay guide such unsupervised learning in humans (Field, \n1994; Berkes and Wiskott, 2005; Hinton, 1989). One \nrelated hypothesis is based on the predictive feature \nprinciple (Rao and Ballard, 1999), which posits that \nrepresentations of temporally adjacent sensory stimuli \nshould be predictive of each other. \n\nIn this work, we revisit feature prediction as a stand- \nalone objective for unsupervised learning of visual repre- \nsentations from video. Numerous advances in the field — \nsuch as the standard use of transformer architectures in \nvision (Dosovitskiy et al., 2020), the maturing of masked \nautoencoding frameworks (Xie et al., 2021; Bao et al., \n2021; He et al., 2021), query-based feature pooling (Chen \net al., 2022), joint-embedding predictive architectures \n(JEPA) (LeCun, 2022; Assran et al., 2023; Baevski et al., \n2022b), and larger datasets — form a unique arsenal of \ntools, which we integrate in a modern and conceptually \nsimple method, the video joint-embedding predictive ar- \nchitecture or V-JEPA, which is based solely on feature \nprediction, without using pretrained image encoders, \ntext, negative examples, human annotations, or pixel-", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv3.pdf" + }, + { + "text": "computed from another part of the video, x. The pre- \ndictor network Pϕ( \n), which maps the representation of \n· \nx to the representation of y, is trained simultaneously \nwith the encoder, and is provided specification of the \nspatio-temporal positions of y through the conditioning \nvariable z \n\nFeature Prediction versus Pixel Reconstruction. \nApproaches that predict in pixel space must dedicate \nsignificant model capacity and compute to capture all \nthe low-level detail in the visual input. By contrast, ap- \nproaches that predict in latent space have the flexibility \nto eliminate irrelevant or unpredictable pixel-level details \nfrom the target representation (Vondrick et al., 2016). \nPredicting in representation space has been shown to \nlead to versatile representations that perform well across \nmany downstream tasks through linear probing or low- \nshot adaptation (Assran et al., 2023; Oquab et al., 2023; \nAssran et al., 2022), while demonstrating an efficiency \ngain during pretraining compared to pixel level recon- \nstruction (Assran et al., 2023; Baevski et al., 2022b,a). \nThe works of Baevski et al. (2022a,b) additionally show \nthat predicting in representation space results in compet- \nitive end-to-end fine-tuning performance in the image, \naudio and text domains. In this work, we extend these \nfindings to the video modality. \n\n∆y. \n← \nNaively implementing the objective using the regression \n\nminimizeθ,ϕ \nPϕ(Eθ(x), ∆y) \n∥ 1, \nEθ(y) \n∥ − \n\nwould admit a trivial solution, where the encoder out- \nputs a constant representation, regardless of its input. \nIn practice, we use the following modified objective to \nprevent representation collapse, \n\nminimizeθ,ϕ sg(Eθ(y)) \n(1) \nPϕ(Eθ(x), ∆y) \n1, \n∥ ∥ − \n\n) denotes a stop-gradient operation, which \nwhere sg( \n· \ndoes not backpropagate through its argument, and Eθ( \n) \n· \n). \nis an exponential moving average of the network Eθ( \n· \nThe use of an exponential-moving average feature ex- \ntractor along with a stop-gradient and a predictor has \nbeen used as a collapse prevention strategy for image pre- \ntraining (Grill et al., 2020), and studied empirically (Xie \net al., 2021) and theoretically (Tian et al., 2021). In \nfact, the objective in equation (1) is similar to the loss \nof Assran et al. (2023) used for image pretraining, but \nwe modify it to use an ℓ1 regression, which we found to \nbe more stable. \n\nTheoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. \n\nP ⋆(Eθ(x)) = argmin", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What does mean the JEPA acronym ?", + "target_page": 3, + "target_passage": " joint-embedding predictive architecture (JEPA)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Principals**\n\nIAM implements*authentication*, proving who an entity claims to be, with*principals,*which are \n\nentities such as IAM users, federated users from Google, Facebook, etc, IAM roles, AWS accounts, \nand AWS services.", + "page_start": 42, + "page_end": 42, + "source_file": "serverless-core.pdf" + }, + { + "text": "Table 7 Low-Shot Frozen Evaluation. Comparing V-JEPA to other video models in frozen evaluation on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of labeled examples from each dataset available for training the attentive \nprobe. We train the probes in several low-shot settings: using either 5% of the train set, 10%, or 50%, and take 3 random \nsplits in each setting to obtain more robust metrics, resulting in 9 different evaluation experiments for each model. We report \nthe mean performances and standard deviation using the K400 and SSv2 validation sets. V-JEPA is more label-efficient than \nother models; specifically, decreasing the available number of labeled examples from each class increases the performance gap \nbetween V-JEPA and the baselines. \n\n\n \n \n \n \n [html]MethodArch.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )5 % (~ 29 semples per chas )ViT - H / 16\n
10 % (~ 58 semples per chos )50 % (~ 287 samples per class )5 % (~ 48 samples per das )10 % (~ 96 semples per class )50 % (~ 440 semples per closs )MVD
ViT - L / 1662.6 ± 0.268.3 ± 0.277.2 ± 0.342.9 ± 0.849.5 ± 0.661.0 ± 0.2VideoMAE
ViT - H / 1662.3 ± 0.368.5 ± 0.278.2 ± 0.141.4 ± 0.848.1 ± 0.260.5 ± 0.4VideoMAEv2
ViT - g / 1437.0 ± 0.348.8 ± 0.467.8 ± 0.128.0 ± 1.037.3 ± 0.354.0 ± 0.3V - JEPA
67.0 ± 0.2.72.1 ± 0.180.2 ± 0.251.9 ± 0.357.5 ± 0.467.3 ± 0.2ViT - H / 16384
68.2 ± 0.272.8 ± 0.280.6 ± 0.254.0 ± 0.259.3 ± 0.567.9 ± 0.2
\n\nlayer attentive probe, which can be further improved to \n77.9% using a two-layer attentive probe. More generally, \nwe hypothesize that the datasets used to train V-JEPA \nand other video models are too constrained and lack the \nvisual diversity of the internet-scale pretraining data used \nby the images models; as such, there is value in focusing \nfuture work on building diverse publicly available video \ndatasets. \n\nto 54.0% top-1 when we reduce the number of labeled \nexamples by a factor of 10 \n(from roughly 440 examples \nper class to 48 examples per class). By contrast, Video- \nMAEv2 drops by 26% to 28.0% top-1, VideoMAE drops \nby 19.1% to 41.4% top-1, and MVD drops by 18.1% to \n42.9% top-1. \n\n× \n\n6 Evaluating the Predictor \n\nNext, we seek to qualitatively inspect the V-JEPA mod- \nels. Recall that the predictor network in V-JEPA predicts \nthe representations of a masked spatio-temporal region y \nfrom a visible region x, given the positional information \nof the masked regions (see Section 3). To qualitatively in- \nvestigate the grounding of the feature-space predictions, \nwe freeze the pretrained encoder and predictor networks \nand train a conditional diffusion decoder to map the \nV-JEPA predictions to interpretable pixels. Notably, the \ndecoder is only fed the representations predicted for the \nmissing regions of the video, and does not have access \nto the unmasked regions of the video (see Figure 6a). \n\n5.3 Label-efficiency", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv3.pdf" + }, + { + "text": "(a) Visualization Methodology. We train a conditional diffusion model to decode the V-JEPA feature-space predictions to \ninterpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is \nonly fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions \nof the video. \n\n\n\n\n\n(b) Visualizations. First Row: Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its \ncorresponding predictor network). Other rows: Bounding boxes contain various samples from the decoder overlayed on the \noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do \nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and \npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in \nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the \nvideo. The predictions also capture consistent motion through time. \n\nFigure 6 Qualitative Analysis. Offline visualizations of the V-JEPA feature-space predictions. \n\nstream tasks requiring fine-grained motion understand- \ning, while large-scale image models trained on internet \nscale datasets fall short on such tasks. Finally, we em- \npirically observed that V-JEPA models are label-efficient \nlearners, and exhibit good performance on downstream \ntasks, even when only few labeled examples are available. \n\n7 Conclusion \n\nIn this work, we explored the effectiveness of feature \nprediction as a stand-alone objective for unsupervised \nlearning from video and introduced V-JEPA, a collection \nof vision models trained solely using a self-supervised \nfeature prediction objective. The V-JEPA models demon- \nstrate the ability to solve various downstream image and \nvideo tasks without adaption of the model parameters, \nand outperform previous video representation learning \napproaches in frozen evaluation on action recognition, \nspatio-temporal action detection, and image classifica- \ntion tasks. Additionally, we show that pretraining V- \nJEPA on videos is particularly effective for solving down- \nHassan Akbari, Liangzhe Yuan, Rui Qian, Wei-Hong Chuang, \nShih-Fu Chang, Yin Cui, and Boqing Gong. Vatt: Trans- \nformers for multimodal self-supervised learning from raw \nvideo, audio and text. Advances in Neural Information \nProcessing Systems, 34:24206–24221, 2021.", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv3.pdf" + }, + { + "text": "t understand. We \nso the other side doesn’t understand. We \nso the other side doesn A problem not on ly for Japa n but the \nA problem not on ly for Japa n but the \n\n**Initiatives as**\n**a global player and**\n**part of the Asian family**\n**of nations**\n\nmust listen carefully to each other and \nmust listen carefully to each other and whole world — — \nwhole world \n\n**M i y a t a**: A s I s a i d , b e f o r e t h e \n: A s I s a i d , b e f o r e t h e express ourselves clearly. This is true for \nexpress ourselves clearly. This is true for \n\nboth individuals and companies. \nboth individuals and companies. ea r t hqua ke a nd t su na m i, a sense of \nea r t hqua ke a nd t su na m i, a sense of \n\nJapan enjoys a high degree of trust, not \nJapan enjoys a high degree of trust, not stagnation was spreading throughout \nstagnation was spreading throughout \n\nonly in Asia but also in the world. It has an \nonly in Asia but also in the world. It has an Japa nese societ y. Young people were \nJapa nese societ y. Young people were \n\n\n\n\n\n— For the nation to recover its spirits \n— For the nation to recover its spirits \n\nit must think and act in terms of global \nit must think and act in terms of global \n\nrelationsh ips, a nd those w ith A sia in \nrelationsh ips, a nd those w ith A sia in \n\nparticular. — — \nparticular. \n\nJapan Research Institute. \nJapan Research Institute. \n\n**Ando**: Our world cha nged over n ig ht \n: Our world cha nged over n ig ht \n\nfollowing the earthquake and tsunami. \nfollowing the earthquake and tsunami. \n\nTake the matters of food, energ y and \nTake the matters of food, energ y and \n\nresources. In energy-saving, I think Japan \nresources. In energy-saving, I think Japan \n\nis now the world leader. Although Japan \nis now the world leader. Although Japan \n\nhas technologies that can contribute to \nhas technologies that can contribute to \n\nglobal affluence, I think it has not been \nglobal affluence, I think it has not been \n\nable to fully communicate their benefits \nable to fully communicate their benefits \n\nto the world. \nto the world. \n\n**Ando**: In the 1950s and 1960s, Japanese \n: In the 1950s and 1960s, Japanese a growth strategy that also covers Asia. \na growth strategy that also covers Asia. \n\nsociet y a l lowed a degree of leeway to \nsociet y a l lowed a degree of leeway to We think of Japan and Asia as being one \nWe think of Japan and Asia as being one \n\nimage of safety and stability. There is trust \nimage of safety and stability. There is trust wedded to the status quo, and I thought \nwedded to the status quo, and I thought \n\nbetween people and between enterprises. \nbetween people and between enterprises. we were str ugg l i ng w ith weig ht y a nd \nwe were str ugg l ing w ith weig ht y a nd \n\nWe must revitalize the country while this \nWe must revitalize the country while this intractable issues. But now more people \nintractable issues. But now more people \n\ntrust remains intact. People from various \ntrust remains intact. People from various s pull together.” I think the \nthink, “Let’s pull together.” I think the \nthink, “Let \n\nI have set up The Momo-Kaki Orphans \nI have set up The Momo-Kak i Orphans \n\nF u n d , w h i c h h e l p s o r p h a n s b y \nF u n d , w h i c h h e l p s o r p h a n s b y \n\nsupporting their schooling for a period \nsupporting their schooling for a period \n\nt h o s e w h o w a n t e d t o r e a l i z e t h e i r \nt h o s e w h o w a n t e d t o r e a l i z e t h e i r strategic region. \nstrategic region. \n\np o t e n t i a l [w i t h o u t g o o d a c a d e m i c \np o t e n t i a l [w i t h o u t g o o d a c a d e m i c SMBC intends to actively broaden its \nSMBC intends to actively broaden its \n\nqualifications]. I did not go to university, \nqualifications]. I did not go to university, scope of operations in Asia, Europe and \nscope of operations in Asia, Europe and", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. \n\n\n \n \n \n \n [html]MethodArch.# Samples SeenIter.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )ViT - L / 16\n
AVAIN1KPlaces205iNat21K400 - ft ( 16 × 5 × 3 )SSv2 - ft ( 36 × 2 × 3 )Methods pretroined using pivel prolictionOmniMAE
2400M1170K65.660.614.475.159.866.184.074.2VideoMAEViT - L / 16
410M400K77.865.521.671.159.364.685.474.3HieraHiera - L
770M1500K75.564.215.868.958.556.987.375.1V - JEPAViT - L / 16
270M90K80.869.525.674.860.367.885.675.1
\n\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. \n\nUnder the fine-tuning protocol, V-JEPA also achieves the \nbest performance of any model trained with a ViT-L/16, \nand matches the performance of the Hiera-L on SSv2, \nwhich benefits from a hierachical prior (Ryali et al., 2023). \nThe V-JEPA models achieve this result while processing \nsignificantly fewer samples during pretraining (Figure 4), \ndemonstrating the efficiency of feature prediction as a \nlearning principle. \n\nand image task with notable margin (see Table 6). Our \nH/16 model outperforms the largest publicly available \nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera \nmodels by at least +5 points in motion understanding \n(Something-Something-v2), +2 points in action recogni- \ntion (Kinetics-400), +5 points on action detection (AVA), \n+1 point on object recognition (ImageNet-1K), +2 points \nin scene recognition (Places205), and +0.2 points on fine- \ngrained recognition (iNaturalist). Moreover, when com- \nparing pretraining wallclock time in Figure 5, we see that \nV-JEPA achieves this performance with a roughly 2 \n× \nspeedup compared to the large pixel prediction models. \n\n5.2 Comparison with State-of-the-Art \n\nNext, in Table 6, we inspect how the V-JEPA models \npretrained on video stack up next to the largest state- \nof-the-art self-supervised image and video models when \nfreezing the backbone encoder and training an attentive \nprobe on top. Our image pretrained baselines include \nOpenCLIP (Cherti et al., 2023), DINOv2 (Oquab et al., \n2023), and I-JEPA (Assran et al., 2023). The Open- \nCLIP model is trained with a contrastive image-text \nalignment objective, DINOv2 and I-JEPA are trained \nwith self-supervision. These models are known to excel \nin their frozen-evaluation performance (Oquab et al., \n2023); i.e., their ability to produce visual features that \ncan be applied to many downstream tasks simultane- \nously, without end-to-end fine-tuning, and thus pro- \nvide highly competitive baselines. Our video pretrained \nbaselines include VideoMAE (Tong et al., 2022), Omni- \nMAE (Girdhar et al., 2023), Hiera (Ryali et al., 2023), \nVideoMAEv2 (Wang et al., 2023a), and MVD (Wang \net al., 2023b). The OpenCLIP, DINOv2 and Video- \nMAEv2 models are parameterized as Giant/Gigantic \nvision transformer architectures containing over 1B pa- \nrameters trained on large-scale image or video datasets. \n\nComparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "(4) In this regulation— \n\n“authorised person” means— \n(a) a constable, \n(b) the Civil Aviation Authority, \n(c) the Secretary of State, or \n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the \nAir Navigation Order 2016(**a**); \n\n\n \n \n \n \n [html]“ operator ” has the meaning given in article 4 of the Air Navigation Order 2016 ;“ pilot in command ” und “ private aircraff ” have the meanings given in the Air Navigation Order 2016 ( see Schedule 1 to that Order );“ relevant transport service ”, in relation to an operator, means a transport service provided by or on behalf of that operator ;\n
“ transport service ” means —( a ) a relevant service,
( b ) a shuttle service,( c ) a service ( other than a relevant service ) which —
( i ) is carrying passengers travelling to England from outside the common travel area ( whether for payment or valuable consideration or otherwise ), and( ii ) is provided by means of an aircraft ( other than a private aircraft ), or
( d ) a flight which —( i ) is carrying passengers travelling to England from outside the common travel area ( whether for pasment or valuable consideration or otherwise ), and
( ii ) is provided by means of a private aircraft.PART 5
Offences, proceedings and informationOffences and penalties
I9 —( 1 ) A person (“ P ”) commits an offence where —( a ) without reasonable excuse P contravenes a requirement in regulation 3 ( requirement to provide information );
( b ) without reasonable excuse P contraveness a requirement in regulation 4 ( requirement to possess notification of negative test result );( c ) without reasonable excuse P contravenes a requirement in regulation 6 ( requirement to book and undertake tests );
( d ) without reasonable excuse P contravenes a requirement in regulation 7 ( requirement to undertake workforce tests );( e ) without reasonable excuse P contravenes a requirement in regulation 8 ( requirement for offsbore installation workers to take tests );
( f ) P contravenes a requirement in regulation 9 ( requirement to self - isolate );( g ) without reasonable excuse P contraveness a requirement in or imposed under regulation 11 ( enforcement of requirement to self - isolate ) apart from paragraph ( 2 ) of that regulation ;
", + "page_start": 22, + "page_end": 22, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Table 12 Linear vs. Attentive Probe Evaluation for V-JEPA and VideoMAE. We evaluate the effect of linear (Lin.) \nand attentive (Att.) probing when adapting V-JEPA to the K400 (16 × 5 × 3) and SSv2 (16 × 2 × 2) tasks. V-JEPA and \nVideoMAE benefit from using a non-linear attentive probe. \n\nK400 SSv2 \nMethod Arch. Lin. Att. Lin. Att. \n\nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA 52.5 \n56.7 77.8 \n80.8 41.3 \n50.1 61.2 \n69.5 \n\nTable 13 Linear vs. Attentive Probe Evaluation for DINOv2 and OpenCLIP. We evaluate the effect of linear (Lin.) \nand attentive probing (Att.) when adapting DINOv2 and OpenCLIP. Image-baselines benefit from using an attentive probing \nstrategy. Results shown in gray are reported from the linear probe evaluation in Oquab et al. (2023). \n\n\n \n \n \n \n [html]MethodArch.K400 ASLin.Att.\n
II Lin.Att.Place205Lin.iN Lin.21Att.DINOv2ViT - g / 1478.483.438.350.086.5
86.267.568.485.788.8OpenCLIPViT - G / 1478.381.835.834.886.2
85.369.870.276.083.6
\n\nOne Clip vs Multiple clips. We examine the impact of changing the temporal coverage of a model during downstream \nevaluation on K400 action classification. In Table 14, we evaluate VideoMAE and V-JEPA models using an attentive \nprobe with access to either the feature map of 1 clip randomly sampled from the video, or the concatenated feature \nmap of 8 clips randomly sampled from the video. To sample 8 clips from a video, we first divide the video into 8 \nequal length temporal segments, and sample 1 clip at random from each segment. A single clip corresponds to \n2 \n≈ \nseconds of a video on average, while 8 clips correspond to \n16 seconds. The video encoders processes each clip \nseparately to produce a clip-level feature map, which are then concatenated at the input to the attentive probe. \n≈ \n\nIncreasing the temporal coverage from 1 clip per video to 8 clips improves the performance of both V-JEPA and \nVideoMAE on K400 action classification. We therefore use the multiclip attentive probing setup as our default \nevaluation pipeline. \n\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. \n\nE.3 Sample Efficiency of pretraining", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nAbstract (continued) \n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in- \n\nloop implementation design for this model and demonstrates an effective strategy to measure \n\npreimplementation patient safety of LLM models. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 \n\n**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, \n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. \n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks \nin an effort to unburden physicians and reduce burnout.22 Computer-generated text within clinical \nnotes using natural language processing (NLP) have been overall shown to improve note completion \nrates, physician satisfaction, and patient outcomes.23 Since 2018, NLP has made rapid advancements \nin health care with the discovery of the transformer model architecture, the building block of large \nlanguage models (LLMs). LLMs can automate workflows such as discharge summaries,24 radiology \nreports,25 patient messaging,26 after-visit summaries,27 and ambient dictation28 with various levels \nof perceived quality in each workflow.29 LLMs are particularly effective at summarizing large \nunstructured clinical datasets, such as ED patient medical records.30 A common concern of LLMs is \ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with \nthe original source content.31 Much work has been done in health care to reduce hallucinations \nthrough building larger-parameter models trained on trillions of datasets, and then instruction fine- \ntuning the LLM on smaller, well-curated datasets.32,33 LLMs can also be designed with explainability \nby citing inferred content back to the reference source notes.34 For short-context length notes, using \nfew-shot prompt engineering approaches with large language models like GPT-4 can produce", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "5.3 Label-efficiency \n\nWe examine the label-efficiency of V-JEPA compared to \nother self-supervised video models by measuring the abil- \nity of the pretrained backbones to adapt to downstream \ntasks with few labels. Specifically, we investigate the \nperformance of the frozen models on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of \nlabeled examples from each dataset available for training \nthe attentive probe. We train the probes in several low- \nshot settings: using either 5% of the train set, 10%, or \n50%, and take 3 random splits in each setting to obtain \nmore robust metrics, resulting in 9 different evaluation \nexperiments for each model. Table 7 reports the mean \nperformances and standard deviation using the K400 \nand SSv2 validation sets. \n\nGiven a masked video, we use the V-JEPA pretrained \nmodels to predict the representations of the missing \nregions, and then use the decoder to project the rep- \nresentations to pixel space. Figure 6b shows decoder \noutputs for various random seeds. Qualities that are \ncommon across samples represent information that is \ncontained in the predictor representation. \n\nWe find V-JEPA to be more label-efficient than other \nself-supervised video models: decreasing the available \nnumber of labeled examples for training the attentive \nprobe results in an increase in the performance gap \nbetween V-JEPA and the other models. In particular, \nthe performance of the largest V-JEPA model on K400 \ndrops by 12% to 68.2% top-1 when we reduce the number \nof labeled examples by a factor of 10 \n(from roughly \n287 examples per class to 29 examples per class). By \ncontrast, VideoMAEv2 drops by 30% to 37.0% top-1, \nVideoMAE drops by 15.9% to 62.3% top-1, and MVD \ndrops by 14.6% to 62.6% top-1. \n\nFigure 6b shows that the V-JEPA feature predictions \nare indeed grounded, and exhibit spatio-temporal con- \nsistency with the unmasked regions of the video. Specif- \nically, the samples in Figure 6b show that the V-JEPA \npredictor correctly captures positional uncertainty and \nproduces a variety of visual objects at various locations \nwith consistent motion. Some of the samples also demon- \nstrate an understanding of object-permanence, as the \nvisual objects remain consistent after partial occlusion. \n\n× \n\nSimilar observations hold on SSv2. The performance \nof the largest V-JEPA model on SSv2 drops by 13.9% \n\n9", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", + "target_page": 5, + "target_passage": "70.9", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "Table 16 Sample efficiency. We compare the sample efficiency of pretraining various state-of-the-art image and video models. \nThe #Samples Seen entry corresponds to the number of samples (image or video clips) processed by the network during \npretraining, which is larger than the size of the pretraining dataset for multi-epoch training. The V-JEPA results in this \npaper are obtained while processing an order of magnitude fewer samples than previous methods. \n\n\n \n \n \n \n [html]\n
MethodArch.Data# Samples Seen
OpenCLIPViT - G / 14LAION - 2B39000M
DINOv2ViT - g / 14LVD 142M1900M
VideoMAEv2ViT - g / 14UnlabeledHybrid1600M
V - JEPAViT - H / 16384VideoMix2M210M
\n\n(a) (b) \n\nFigure 8 Masking Strategy Ablation. Evaluating a linear probe on a ViT-B/16 pretrained with V-JEPA on K400 under \nvarious 3D Multi-Block masking settings. We examine the impact of (a) sampling several masks per video, (b) varying the \nnumber of blocks in a mask, and (c) varying the average spatial and temporal masking ratio. A temporal masking ratio of \n100% extends the spatial mask across all the frames in the clip. We find it important to maintain a high spatial and temporal \nmasking ratio during pretraining. \n\n\n\n\n\n\n\n(c) Num. Blocks: 2, Spatial Block Size: 160 × 160 \n\nFigure 9 Illustration of mask with number of blocks and block size. Each mask is constructed by sampling several (possibly \noverlapping) blocks and taking their union.", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. \n\n\n \n \n \n \n [html]MethodArch.# Samples SeenIter.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )ViT - L / 16\n
AVAIN1KPlaces205iNat21K400 - ft ( 16 × 5 × 3 )SSv2 - ft ( 36 × 2 × 3 )Methods pretroined using pivel prolictionOmniMAE
2400M1170K65.660.614.475.159.866.184.074.2VideoMAEViT - L / 16
410M400K77.865.521.671.159.364.685.474.3HieraHiera - L
770M1500K75.564.215.868.958.556.987.375.1V - JEPAViT - L / 16
270M90K80.869.525.674.860.367.885.675.1
\n\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "16 \n× \n\nOptimization. We use AdamW (Loshchilov and Hutter, 2017) to optimize the x-encoder and predictor weights. \nThe ViT-L/16224 and ViT-H/16224 models use a batch size of 3072 while the ViT-H/16384 uses a batch size of \n2400. Models are trained for a total of 90,000 iterations. The learning rate is linearly increased from 2 \n10−4 \n10−4 during the first 12, 000 iterations of pretraining, and decayed to 10−6 following a cosine schedule. \nto 6.25 \n× \n× \n\n17", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. \n\nUnder the fine-tuning protocol, V-JEPA also achieves the \nbest performance of any model trained with a ViT-L/16, \nand matches the performance of the Hiera-L on SSv2, \nwhich benefits from a hierachical prior (Ryali et al., 2023). \nThe V-JEPA models achieve this result while processing \nsignificantly fewer samples during pretraining (Figure 4), \ndemonstrating the efficiency of feature prediction as a \nlearning principle. \n\nand image task with notable margin (see Table 6). Our \nH/16 model outperforms the largest publicly available \nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera \nmodels by at least +5 points in motion understanding \n(Something-Something-v2), +2 points in action recogni- \ntion (Kinetics-400), +5 points on action detection (AVA), \n+1 point on object recognition (ImageNet-1K), +2 points \nin scene recognition (Places205), and +0.2 points on fine- \ngrained recognition (iNaturalist). Moreover, when com- \nparing pretraining wallclock time in Figure 5, we see that \nV-JEPA achieves this performance with a roughly 2 \n× \nspeedup compared to the large pixel prediction models. \n\n5.2 Comparison with State-of-the-Art \n\nNext, in Table 6, we inspect how the V-JEPA models \npretrained on video stack up next to the largest state- \nof-the-art self-supervised image and video models when \nfreezing the backbone encoder and training an attentive \nprobe on top. Our image pretrained baselines include \nOpenCLIP (Cherti et al., 2023), DINOv2 (Oquab et al., \n2023), and I-JEPA (Assran et al., 2023). The Open- \nCLIP model is trained with a contrastive image-text \nalignment objective, DINOv2 and I-JEPA are trained \nwith self-supervision. These models are known to excel \nin their frozen-evaluation performance (Oquab et al., \n2023); i.e., their ability to produce visual features that \ncan be applied to many downstream tasks simultane- \nously, without end-to-end fine-tuning, and thus pro- \nvide highly competitive baselines. Our video pretrained \nbaselines include VideoMAE (Tong et al., 2022), Omni- \nMAE (Girdhar et al., 2023), Hiera (Ryali et al., 2023), \nVideoMAEv2 (Wang et al., 2023a), and MVD (Wang \net al., 2023b). The OpenCLIP, DINOv2 and Video- \nMAEv2 models are parameterized as Giant/Gigantic \nvision transformer architectures containing over 1B pa- \nrameters trained on large-scale image or video datasets. \n\nComparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 14 Temporal Coverage on Kinetics-400. We evaluate the effect of temporal coverage on K400. We train an attentive \nprobe on K400 using either 1 clip (≈ 2 seconds of a video) or 8 clips (≈ 16 seconds of a video). To sample N clips, we first \ndivide a video in N equal-length temporal segments and sample one clip at random per segment. The video encoder processes \neach clip in parallel and all the encoder output tokens are concatenated at the input of the attentive probe. Increasing the \ntemporal coverage from 1 clip per video to 8 clips significantly improves the performance for both our VideoMAE baseline \nand V-JEPA. \n\nMethod \nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA \n\nArch. 1 Clip 8 Clips \n\n69.4 \n73.7 77.8 \n80.9 \n\nTable 15 Finetuning results. We evaluate a V-JEPA model with the finetuning protocol on the K400 and SSv2 datasets \nusing 16 frames per clip and multi-view fusion (5×3 or 2×3) for inference. The #Samples Seen entry corresponds to the \nnumber of video clips processed during pretraining, which is larger than the size of the pretraining dataset for multi-epoch \ntraining. We compare V-JEPA with different video self-supervised learning approaches. We report the VideoMAEv2 results \nwithout instruction-turning for consistency with the other approaches. V-JEPA obtains competitive performance using the \nfinetuning protocol. \n\n\n \n \n \n \n [html]VideoMAEv1VideoMAEv276.7\n
MethodArch.Pretraining Data# Samples SeenK400 ( 16 × 5 × 3 )SSv2 ( 16 × 2 × 3 )
ViT - L / 16K400 | SSv2380M | 410M85.474.3
ViT - H / 16K400 | SSv2380M | 410M86.674.8
ViT - H / 16Un. Hybrid1600M86.976.8
MVDViT - L / 16K400 + IN1K2400M86.4
ViT - H / 16K400 + IN1K2400M87.277.3
V - JEPAViT - L / 16VideoMix2M270M85.6
\n\nexamine our multi-masking strategy and find that sampling two masks for each clip (long-range and short-range) to \nbe more effective than sampling just a single mask for each clip. \n\nIn Figure 8c, we explore different average spatial and temporal masking ratio, i.e. the spatial/temporal ratio of \nthe area that is covered by a mask on average for a clip. Recall that each mask is constructed by sampling several \n(possibly overlapping) blocks and taking their union. We change the average spatial or temporal masking ratio by \nchanging a block spatial or temporal size, as well as the overall number of blocks. We found that low spatial or \ntemporal coverage results in a trivial prediction task, which degrades downstream performance. Based on those \nresults, we sample masks that remove roughly 90% of the frame and extend along the entire temporal dimension of \nthe clip by default. \n\nIn Figure 8b , we explore different block size given an effective spatial masking ratio of 90% and temporal ratio of \n100%. We keep the masking ratio approximately constant by changing the block size and the number of block at the \nsame time. We find that sampling several blocks to perform better than sampling a single large block. Figure 9 \nvisually illustrates the effect of sampling several smaller blocks to construct a mask.", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 12 Linear vs. Attentive Probe Evaluation for V-JEPA and VideoMAE. We evaluate the effect of linear (Lin.) \nand attentive (Att.) probing when adapting V-JEPA to the K400 (16 × 5 × 3) and SSv2 (16 × 2 × 2) tasks. V-JEPA and \nVideoMAE benefit from using a non-linear attentive probe. \n\nK400 SSv2 \nMethod Arch. Lin. Att. Lin. Att. \n\nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA 52.5 \n56.7 77.8 \n80.8 41.3 \n50.1 61.2 \n69.5 \n\nTable 13 Linear vs. Attentive Probe Evaluation for DINOv2 and OpenCLIP. We evaluate the effect of linear (Lin.) \nand attentive probing (Att.) when adapting DINOv2 and OpenCLIP. Image-baselines benefit from using an attentive probing \nstrategy. Results shown in gray are reported from the linear probe evaluation in Oquab et al. (2023). \n\n\n \n \n \n \n [html]MethodArch.K400 ASLin.Att.\n
II Lin.Att.Place205Lin.iN Lin.21Att.DINOv2ViT - g / 1478.483.438.350.086.5
86.267.568.485.788.8OpenCLIPViT - G / 1478.381.835.834.886.2
85.369.870.276.083.6
\n\nOne Clip vs Multiple clips. We examine the impact of changing the temporal coverage of a model during downstream \nevaluation on K400 action classification. In Table 14, we evaluate VideoMAE and V-JEPA models using an attentive \nprobe with access to either the feature map of 1 clip randomly sampled from the video, or the concatenated feature \nmap of 8 clips randomly sampled from the video. To sample 8 clips from a video, we first divide the video into 8 \nequal length temporal segments, and sample 1 clip at random from each segment. A single clip corresponds to \n2 \n≈ \nseconds of a video on average, while 8 clips correspond to \n16 seconds. The video encoders processes each clip \nseparately to produce a clip-level feature map, which are then concatenated at the input to the attentive probe. \n≈ \n\nIncreasing the temporal coverage from 1 clip per video to 8 clips improves the performance of both V-JEPA and \nVideoMAE on K400 action classification. We therefore use the multiclip attentive probing setup as our default \nevaluation pipeline. \n\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. \n\nE.3 Sample Efficiency of pretraining", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "× \n\nPretraining. We combine several public datasets to \nconstruct an unsupervised video pretraining dataset, \nwhich we refer to as VideoMix2M. Specifically, we com- \nbine the videos from HowTo100M (HT) (Miech et al., \n2019), Kinetics-400/600/700 (K710) (Kay et al., 2017), \nand Something-Something-v2 (SSv2) (Goyal et al., 2017), \nand remove any overlap with the validation sets of \nKinetics-400/600/700 and Something-Something-v2, re- \nsulting in approximately 2 million videos. We train a \nViT-L/16, a ViT-H/16, and a ViT-H/16384 transformer \nmodel on VideoMix2M. We use a batch size of 3072 for \nthe ViT-L/16 and ViT-H/16 models, and a batch size \nof 2400 for the ViT-H/16384 model. Each model takes \nas input a video clip of 16 frames sampled with a frame- \nskip of 4, corresponding to roughly 3 second clips on \naverage. The ViT-L/16 and ViT-H/16 process the video \nat a spatial resolution of 224, while the ViT-H/16384 \nuses an input resolution of 384; cf. Appendix C.", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv3.pdf" + }, + { + "text": "E.3 Sample Efficiency of pretraining \n\nWe compare the sample efficiency of pretraining various state-of-the-art image and video models. Specifically, we \nlook at the number of samples (image or video clips) processed by the network during pretraining, which is larger \nthan the size of the pretraining dataset for multi-epoch training. Notably, our results with V-JEPA are obtained \nwhile processing an order of magnitude fewer samples than previous methods, and notably two orders of magnitude \nfewer samples than OpenCLIP. We believe that further investment towards improving the video pretraining data \ndistribution could lead to substantial gains in downstream image and video tasks. \n\nE.4 Masking Strategy \n\nAn important component of the V-JEPA pretraining strategy is the 3D clip masking strategy. In this section, we \ndetail 26 ablation experiments exploring different masks. For all the experiments, we pretrain a ViT-B/16 pretrained \non K400. Figure 8 presents a summary of those results. \n\nFigure 8c shows the effect of changing the spatial and temporal masking ratio. Figure 8b ablates the number of \nsampled blocks used to construct the masks given a fixed effective masking ratio of 90%. Finally, in Figure 8a we \n\n21", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 7 Low-Shot Frozen Evaluation. Comparing V-JEPA to other video models in frozen evaluation on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of labeled examples from each dataset available for training the attentive \nprobe. We train the probes in several low-shot settings: using either 5% of the train set, 10%, or 50%, and take 3 random \nsplits in each setting to obtain more robust metrics, resulting in 9 different evaluation experiments for each model. We report \nthe mean performances and standard deviation using the K400 and SSv2 validation sets. V-JEPA is more label-efficient than \nother models; specifically, decreasing the available number of labeled examples from each class increases the performance gap \nbetween V-JEPA and the baselines. \n\n\n \n \n \n \n [html]MethodArch.K400 ( 16 × 8 × 3 )SSv2 ( 16 × 2 × 3 )5 % (~ 29 semples per chas )ViT - H / 16\n
10 % (~ 58 semples per chos )50 % (~ 287 samples per class )5 % (~ 48 samples per das )10 % (~ 96 semples per class )50 % (~ 440 semples per closs )MVD
ViT - L / 1662.6 ± 0.268.3 ± 0.277.2 ± 0.342.9 ± 0.849.5 ± 0.661.0 ± 0.2VideoMAE
ViT - H / 1662.3 ± 0.368.5 ± 0.278.2 ± 0.141.4 ± 0.848.1 ± 0.260.5 ± 0.4VideoMAEv2
ViT - g / 1437.0 ± 0.348.8 ± 0.467.8 ± 0.128.0 ± 1.037.3 ± 0.354.0 ± 0.3V - JEPA
67.0 ± 0.2.72.1 ± 0.180.2 ± 0.251.9 ± 0.357.5 ± 0.467.3 ± 0.2ViT - H / 16384
68.2 ± 0.272.8 ± 0.280.6 ± 0.254.0 ± 0.259.3 ± 0.567.9 ± 0.2
\n\nlayer attentive probe, which can be further improved to \n77.9% using a two-layer attentive probe. More generally, \nwe hypothesize that the datasets used to train V-JEPA \nand other video models are too constrained and lack the \nvisual diversity of the internet-scale pretraining data used \nby the images models; as such, there is value in focusing \nfuture work on building diverse publicly available video \ndatasets. \n\nto 54.0% top-1 when we reduce the number of labeled \nexamples by a factor of 10 \n(from roughly 440 examples \nper class to 48 examples per class). By contrast, Video- \nMAEv2 drops by 26% to 28.0% top-1, VideoMAE drops \nby 19.1% to 41.4% top-1, and MVD drops by 18.1% to \n42.9% top-1. \n\n× \n\n6 Evaluating the Predictor \n\nNext, we seek to qualitatively inspect the V-JEPA mod- \nels. Recall that the predictor network in V-JEPA predicts \nthe representations of a masked spatio-temporal region y \nfrom a visible region x, given the positional information \nof the masked regions (see Section 3). To qualitatively in- \nvestigate the grounding of the feature-space predictions, \nwe freeze the pretrained encoder and predictor networks \nand train a conditional diffusion decoder to map the \nV-JEPA predictions to interpretable pixels. Notably, the \ndecoder is only fed the representations predicted for the \nmissing regions of the video, and does not have access \nto the unmasked regions of the video (see Figure 6a). \n\n5.3 Label-efficiency", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\n\n \n \n \n \n [html]TargetArch.Frozen Evaluation\n
Fine - Tuning
K400 ( 16 × 1 × 1 )SSv2 ( 36 × 1 × 1 )IN1KK400 - ft ( 16 × 5 × 3 )
PixelsViT - L / 1668.666.073.385.4
FeaturesViT - L / 1673.766.274.885.6
\n\nTable 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\n\n \n \n \n \n [html]Frozen EvaluationArch.Data# SamplesK400 ( 96 × 1 × 1 )ViT - L / 16ViT - H / 16\n
SSv2 ( 15 × 1 × 1 )IN1KAvg.
K710700K75.863.273.770.9
K710 + SSv2900K72.967.472.871.0
K710 + HT1900K74.564.274.871.1
VideoMix2M2000K73.766.274.871.5
K710 + SSv2900K75.766.873.772.0
VideoMix2M2000K74.068.575.972.8
\n\nversus pixel prediction objective, b) the construction of \nthe pretraining data distribution, c) the feature pooling \nstrategy for leveraging the model’s representations in \ndownstream tasks, and d) the masking strategy, towards \nidentifying: what to predict from what?", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What is appropriate authority ?", + "target_page": 1, + "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": " \n \n \n [html]communication be to the public generally or to any person or class of persons ) and freedom from interference with his or her correspondence.( 2 ) Nothing contained in or done under the authority of any law shall be heldbe inconsistent with or in contravention of this section to the extent that the law in question makes provision -be inconsistent with or in contravention of this section to the extent that the law in question makes provision( c ) that imposes restrictions upon public officers, employees of local government bodies, or teachers ; orqualified for registration, or of members necessary to consiltute an association of trade unions qualified for registration ) and conditions whereby registration may be refused on the grounds that any other trade union stready registr", + "page_start": 11, + "page_end": 11, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**3.2 User and group administration**\n\nWhen you design a Content Manager OnDemand system, you must determine the best way \nto implement the many authority structures that are available for users and administrators of \nyour system. The span of control for the administration of the system must be considered with \nthe level of user access to the data that is stored in the system. How many different \nadministrators are required? Will all administrators have system administrator authority or will \ndifferent administrators have different levels of authority? What is the most effective way to \nrestrict a user’s access to only the data that is necessary to do that user’s job? \n\nThe answers to these questions depend on the size of the system, the degree of \ncentralization to be exercised over system administration, and the nature of the data and the \nbusiness needs of the users. \n\n**Centralized or decentralized**\nIn a system design that exercises centralized control, one or a few administrators are granted \nsystem administrator authority. A centralized system typically is used when the number of \nreports and users to be added to the system is small. Centralized administration is also \nappropriate where resources are limited and only one person might have the skills and \nknowledge to perform the system administration tasks, or where one user group performs all \nof the administration tasks. \n\nIn a system design with decentralized control, different users are granted different levels of \nadministrative authority. For example, you might have users that have the authority to create \nusers and groups. Other users might have the authority to create application groups and \nfolders, and others might be given full system administration authority.", + "page_start": 89, + "page_end": 89, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n
( a ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health ; or( b ) that is reasonably required for the purpose of protecting the reputations, rights and freedoms of cither persons or the private lives of persons concerned in legal proceedings, preventing the disclosure of information received inc
or regulating the technical administration or the technical operation of telephony, telegraphy, posts, wireless, broadcasting or television ; or( c ) that imposes restrictions upon public officers, employees of local government bodies, or teachers,
and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic aociety.13. Protection of freedom of assembly and association
( 1 ) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of assembly and association, that is to say, his or her right to assemble freely and associate with other persons and in particular to foubeing to trade unions or other associations for the prototion of his or her interests. G2 : Nothing contained in or done under the authority of any law shall be held to
( a ) that is reasonably required in the interests of defence, public satety, public order, public morality or public health ;( d ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons ;
( d ) for the registration of trade unions and associations of trade unions in a register established by or under any law, and for imposing reasonable conditionsrelating to the requirements for entry on such a register ( including conditions as to the minimum number of persons necessary to constitute a trade union
association of trade unions already registered, as the case may be, is sufficiently representative of the whole or of a substantial proportion of the interests in respect of which registration of a trade union or association of tradeunions is sought,
and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be ressonably justifiable in a democratic society. 14. Protection of freedom of movement( 1 ) No person shall be deprived of his or her freedom of movement, and for the
purposes of this section the said freedom means the right to move freely throughout Botowana, the right to reside in any part of Botowana, the right to enter Botowana arimmunity from expulsion from Botowana.( 2 ) Any restriction on a person ’ s freedom of movement that is involved in his or
\n [html]\n
Patients
a person designated by the Secretary of State for the purposes of this regulation.
Power of entry
I2 —( 1 ) A constable may enter premises in order —
( a )
to search for a person who is suspected of conniting an offence of contravening the requirement in paragraph 10 ( dury to self - isolate ) of Schedule 11 ;
( b )
to remove a person of the description in sub - paragraph ( a ) to accommodation designated by the Secretary of State for the purposes of Schedule 11.
( 2 ) T
epower in paragraph ( 1 ) is exercisable if the constable —
( a )
has reasonable grounds to believe that a person of the description in paragraph ( 1 )( a ) is in or on the premises ; and
( b )
has a reasonable belief that it is necessary and proportionate to enter the premises for the purposes specified in paragraph ( 1 )( b ).
( 3 ) A
constable exercising the power in paragraph ( 1 )—
( a )
\n\n**13.**—(1) Subject to the following provisions of this regulation, an operator must ensure that a \npassenger who arrives at a port in England on a relevant service is provided with the information \nrequired by regulation 14 (“the passenger information requirement”) and in the manner required \nby that regulation at each of the times specified in paragraph (2). \n\n(2) The times are— \n\n(a) where prior to departure a booking was made for the passenger to travel on the relevant \nservice, before the booking was made (“the pre-booking information requirement”); \n(b) where, at least 48 hours prior to the scheduled departure time of the relevant service, a \nbooking was made for the passenger to travel on it, between 24 and 48 hours prior to the \nscheduled departure time of that service (“the pre-departure information requirement”); \n(c) where prior to departure the passenger was checked in to travel on the relevant service, at \nthe time of check-in (“the check-in information requirement”); and \n\n(d) while the passenger was on board the vessel, aircraft or train (“the on-board information \n\nrequirement”).", + "page_start": 18, + "page_end": 18, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(4) In this regulation— \n\n“authorised person” means— \n(a) a constable, \n(b) the Civil Aviation Authority, \n(c) the Secretary of State, or \n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the \nAir Navigation Order 2016(**a**); \n\n\n \n \n \n \n [html]“ operator ” has the meaning given in article 4 of the Air Navigation Order 2016 ;“ pilot in command ” und “ private aircraff ” have the meanings given in the Air Navigation Order 2016 ( see Schedule 1 to that Order );“ relevant transport service ”, in relation to an operator, means a transport service provided by or on behalf of that operator ;\n
“ transport service ” means —( a ) a relevant service,
( b ) a shuttle service,( c ) a service ( other than a relevant service ) which —
( i ) is carrying passengers travelling to England from outside the common travel area ( whether for payment or valuable consideration or otherwise ), and( ii ) is provided by means of an aircraft ( other than a private aircraft ), or
( d ) a flight which —( i ) is carrying passengers travelling to England from outside the common travel area ( whether for pasment or valuable consideration or otherwise ), and
( ii ) is provided by means of a private aircraft.PART 5
Offences, proceedings and informationOffences and penalties
I9 —( 1 ) A person (“ P ”) commits an offence where —( a ) without reasonable excuse P contravenes a requirement in regulation 3 ( requirement to provide information );
( b ) without reasonable excuse P contraveness a requirement in regulation 4 ( requirement to possess notification of negative test result );( c ) without reasonable excuse P contravenes a requirement in regulation 6 ( requirement to book and undertake tests );
( d ) without reasonable excuse P contravenes a requirement in regulation 7 ( requirement to undertake workforce tests );( e ) without reasonable excuse P contravenes a requirement in regulation 8 ( requirement for offsbore installation workers to take tests );
( f ) P contravenes a requirement in regulation 9 ( requirement to self - isolate );( g ) without reasonable excuse P contraveness a requirement in or imposed under regulation 11 ( enforcement of requirement to self - isolate ) apart from paragraph ( 2 ) of that regulation ;
", + "page_start": 22, + "page_end": 22, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) \n\nand except so far as that provision or, as the case may be, anything done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**10. Provisions to secure protection of law**\n\n(1) If any person is charged with a criminal offence, then, unless the charge is \n\nwithdrawn, the case shall be afforded a fair hearing within a reasonable time by an \nindependent and impartial court established or recognized by law. \n\n(2) Every person who is charged with a criminal offence- \n\n(a) \n\n(b) \n\n(c) \n\n(d) \n\n(e) \n\nshall be presumed to be innocent until he or she is proved or has pleaded \nguilty; \nshall be informed as soon as reasonably practicable, in a language that he or \nshe understands and in detail, of the nature of the offence charged; \nshall be given adequate time and facilities for the preparation of his or her \ndefence; \nshall be permitted to defend himself or herself before the court in person or, at \nhis or her own expense, by a legal representative of his or her own choice; \nshall be afforded facilities to examine in person or by his or her legal \nrepresentative the witnesses called by the prosecution before the court, and to \nobtain the attendance and carry out the examination of witnesses to testify on \nhis or her behalf before the court on the same conditions as those applying to \nwitnesses called by the prosecution; and \nshall be permitted to have without payment the assistance of an interpreter if he \nor she cannot understand the language used at the trial of the charge, \nand except with his or her own consent the trial shall not take place in his or her absence \nunless he or she so conducts himself or herself as to render the continuance of the \nproceedings in his or her presence impracticable and the court has ordered him or her to \nbe removed and the trial to proceed in his or her absence. \n\n(f) \n\n(3) When a person is tried for any criminal offence, the accused person or any \n\nperson authorized by him or her in that behalf shall, if he or she so requires and subject \nto payment of such reasonable fee as may be prescribed by law, be given within a \nreasonable time after judgment a copy for the use of the accused person of any record \nof the proceedings made by or on behalf of the court.", + "page_start": 8, + "page_end": 8, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "*Figure 16-4 Configuring application group permissions*\n\n**16.2.5 Assigning hold permissions to users**\n\nTo manage holds in Content Manager OnDemand, you must have the appropriate \npermission. Figure 16-5 on page 359 shows you how to define a user type of Hold \nAdministrator and to provide an authority type of Create Holds.", + "page_start": 381, + "page_end": 381, + "source_file": "sg246915.pdf" + }, + { + "text": "**12 ASX CORPORATE GOVERNANCE COUNCIL BEST PRACTICE RECOMMENDATIONS**\n\n\n \n \n \n \n [html]2.13.1Comply\n
ATE GOVERNANCE COUNCIL BEST PRACTICE RECOHINENDATIONS ASX PrincipleReferenceCompliance
Participants ’ and fundation for measurement and needs1.1
Formatise and disclose the functions reserved to the Board and those delegated to management.2.1ComplyPrinciple 2 : Structure to the lood to add villar
A majority of the Board should be independent Directors.2.3Comply2.2
The chairperson should be an independent. Director.2.3Comply2.3
The roles of chairperson and chief executive officer should not be exercised by the same individual.2.3Comply2.4
The Board should establish a Nomination Committee.2.2 ; 2.4Comply2.5
Provide the information indicated in guide to reporting on Principle 2.2.3 : 2.4 ; 4 : 5 ; 7 : Details of Board Member ' s Experience page 41 ; Details of Directors ' Meetings, Item 1 of the Directors ' Statutory Report page 47.ComplyPrinciple 3 : Primite eithical and resonsible decision - making
Establish a code of conduct to guide the Directors, the chief executive officer ( or equivalent ), the chief financial officer ( or equivalent ) and any other key executives as to :9Comply3.1. 1 the practices necessary to maintain confidence in the Company ’ s integrity ; and 3.1. 2 the responsibility and accountability of individuals for reporting and investigating reports of unethical practices.
3.2Disclase the policy concerning trading in Company securities by Directors, officers and employees.10Comply
3.3Provide the information indicated in Guide to reporting on Principle 3.9.10Comply
Principle Nursing Safegard interphy in francial reporting4.1Require the chird executive sefficer ( or epivalent ) and the chird financial sefficer ( or equivalent ) to state in writing to the Board that the Campany ’ s financial reports present a true and for view, in all material respects, of the Compe6.2
4.2The Board should establish an Audit Committee.6Comply
4.3Structure the Audit Correlities within 8 correlitis of : only non - executive Brectors ;• a majority of independent Directors ;• an independent chargence of an independent chargence, who Is not chairpence of the HIV tools • Independent in6.1Comply
\n\n35", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "The skill level of the users might be a determining factor in the degree of authority that is \ngranted. It takes a more skilled user to define indexes and report parameters than to set up \nusers and groups. A decentralized system is typically used when data from different sources \nis stored on the same Content Manager OnDemand system but must be maintained \nindependently of other data. Decentralization also makes sense when report loading and \nprocessing needs are limited to a specific group of users for security purposes or when \nadministrators that add users and groups must be prevented from accessing report data. \n\nThe decision about whether to use a centralized or a decentralized administration model is \nbest made*before*any data is set up in the system. Even though the type of administration that \nis chosen can be changed later, the amount of work that is involved in that change is greater \nthan the amount of work that is necessary to study the requirements of the system and \nimplement the appropriate administration policies from the beginning. \n\nIn this section, we describe different types of users, followed by a description of a \ndecentralized administrative plan. We also introduce a new administrative tool, Content \nManager OnDemand XML Batch Administration, which is a command-line program that is run \non the Content Manager OnDemand server. \n\n**3.2.1 User types, authorities, and functions**\n\nFour types of users are available in a Content Manager OnDemand system. Each type has a \ndifferent level of access, authority, and responsibility in the system: \n\n(cid:2) User: Logs in and queries the system to retrieve documents and reports for viewing. \n\n(cid:2) User administrator: Adds users or other user administrators to the system. \n\n(cid:2) Report administrator: Defines the application groups, applications, folders, and cabinets to \nbe part of the system. The report administrator is responsible for understanding the report \nand document data and for defining the indexes to be extracted from the data and stored. \nA report administrator is also responsible for designing the user interface to the reports \nthrough the folder definition process and for controlling access authority to the reports that \nthe report administrator designs, indexes, and loads. \n\n(cid:2) System administrator: Has the highest level of authority in a Content Manager OnDemand \nsystem. The system administrator has authority for all system functions and can grant \nother users the authority to perform various tasks. The system administrator is the only \nlevel of authority that can create storage sets and define system printers. \n\nWhen the administrative tasks and levels of authorities are understood, you must decide the \nspan of control in the system. Is it better to have one user control all access and functions in \nthe Content Manager OnDemand system, or is it better to spread the administrative tasks \namong several users to smooth the workload based on system requirements? The answer to \nthis question depends on whether your environment uses centralized or decentralized \nadministrative control. \n\nA centralized administrative plan is best suited for a Content Manager OnDemand system \nwith a few users and relatively few reports to define. In the next section, we focus on the \ndecentralized system and describe the different aspects of a decentralized administrative \nplan.", + "page_start": 90, + "page_end": 90, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n [html]justifiable in the circumstances of any situation arising or existing during that period or as a result of that other emergency or calamity, for the purpose of dealing with that situation ; orany labour reasonably required as part of reasonable and normal communal or other civic obligations.7.( 1 ) No person shall be subjected to torture or to inhuman or degrading ment or other treatment.be inconsistent with or in contravention of this section to the extent that the law inB. Protection from deprivation of propertyno interest in or right over property of any description shall be compulsorily acquired, except where the following conditions are satisfied, that is to say -the taking of possession or acquisition is necessary or expedient -in the interests of defence, public safety, public order, public morality, public health, town and country planning or land settlement ;in order to secure the development or utilization of that, or other, property for a purpose beneficial to the community ; orin order to secure the development or utilization of the mineral resources of Botswana ; andprovision is made by a law applicable to that taking of possession or acquisition -for the prompt payment of adequate compensation ; andsecuring to any percein having an interest in or right over the property a right of secones to the High Count withine direct or on appeak from any other authority, for the determination of his or her interest or right, the legally of the taking", + "page_start": 6, + "page_end": 6, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The High Court shall have jurisdiction to hear and determine any question \n\nwhether- \n(a) \n\nany person has been validly elected as an Elected Member of the National \nAssembly or the seat of any such Member has become vacant; \nany person has been validly elected as Speaker of the Assembly or, having \nbeen so elected, has vacated the office of Speaker. \n\n(2) Any question whether any person has been validly elected as a Specially \n\nElected Member of the National Assembly or whether the seat of any such Member has \nbecome vacant shall be determined by the Speaker. \n\n(3) Parliament may make provision with respect to- \n\nthe persons who may apply to the High Court for the determination of any \nquestion under this section; \nthe circumstances and manner in which the conditions upon which any such \napplication may be made; and \nthe powers, practice and procedure of the High Court in relation to any such \napplication. \n**70. Clerk of the Assembly**\n\n(a) \n\n(b) \n\n(c) \n\n(1) There shall be a Clerk of the National Assembly and an Assistant Clerk of the \n\nNational Assembly and their offices shall be offices in the public service. \n\n(2) There shall be such other offices in the department of the Clerk of the \nAssembly as may be prescribed by resolution of the National Assembly and such offices \nshall be offices in the public service. \n\n**PART II**\n**General Provisions Relating to Procedure in National Assembly (ss 71-76)**\n\n**71. Oaths to be taken by Speaker and Members**\n\nThe Speaker, before assuming the duties of his or her office, and every Member \nof the National Assembly before taking his or her seat therein, shall take and subscribe \nbefore the Assembly the oath of allegiance. \n**72. Presiding in Assembly**\n\nThere shall preside at any sitting of the National Assembly- \n\n(a) \n(b) \n(c) \n\nthe Speaker; \nin the absence of the Speaker, the Deputy Speaker; or \nin the absence of the Speaker and the Deputy Speaker, such Member of the \nAssembly (not being the President or Vice-President or a Minister or Assistant \nMinister) as the Assembly may elect for that sitting. \n\n**73. Quorum in Assembly**\n\nIf objection is taken by any Member of the National Assembly present that there \n\nare present in the Assembly (besides the person presiding) less than one third of the \nMembers of the Assembly and, after such interval as may be prescribed in the rules of \nprocedure of the Assembly, the person presiding ascertains that the number of Members \npresent is less than one third, he or she shall thereupon adjourn the Assembly. \n**74. Voting in Assembly**\n\n(1) Save as otherwise provided in this Constitution, any question proposed for \ndecision in the National Assembly shall be determined by a majority of the votes of the \nMembers present and voting. \n\n(2) ... \n(3) The person presiding in the National Assembly shall have neither an original \n\nvote nor a casting vote and if upon any question before the Assembly the votes are \nequally divided the motion shall be lost. \n**75. Unqualified persons sitting or voting**\n\nAny person who sits or votes in the National Assembly knowing or having", + "page_start": 33, + "page_end": 33, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What criteria must a lactation room meet?", + "target_page": 1, + "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. \n\n‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or \n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. \n\nLEGISLATIVE HISTORY—H.R. 866 (S. 528): \n\n\n \n \n \n
( e )
Protection from inhuman treatment
( 2 ) Nothing contained in or done under the authority of any law shall be held to
question authorizes the infliction of any description of punishment that was lawful in the country immediately before the coming into operation of this Constitution.
( 1 ) No property of any description shall be compulsorily taken possession of, and
( a )
( i )
( ii )
( iii )
( b )
( i )
( ii )
( 2 ) No person who is entitled to compensation under this section shall be
prevented from remttiting, within a reasonable forme after has reashed any amount of that compensation, the whole of that amount ( hee from any deduction, charge or tax made or level in respect of its remission ) to any country of his or her coto any Lew applicable to the taking of possession of minerals or the acquisition of rights to minerals if that law makes provision for the payment at reasonable intervals of adequate royatilies.( 4 ) Nothing contained in or done under the authority of any law shall be held to
be inconsistent with or in contravention of subsection ( 2 ) of this section to the extent that the law in question authorizes -( a )the attachment, by order of a court, of any amount of compensation to which a person is entitled in satisfaction of the judgment of a count or pending the determination of civil proceedings to which he or she is a party ; or
( b )the imposition of reasonable restrictions on the manner in which any amount of
\n [html]\n
Feb. 6, considered and passed House. June 26, considered and passed SenateTable
TableTable
\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "\n \n \n \n \n [html]dotabasets results resultion nurses to include horiginal care flip senior transition to the care senior transition to the care to the care transient trainee to takin workers to the workers workers workers workers workers workers worke wbfloat16 A10.80G\n
Hyper - parameterViT - L / 16224ViT - H / 16224ViT - H / 16384
VideoMix2M4564554 ( 0.3, 1.0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M444 ( 0.31.1. 0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M1616416344444444.03 ( 0.75.1. 35 )( 0.75.1. 5 )shortrange_mask_num_blocks shortrange_mask_spatial_scale longrange_mask_num_blocks longrange_mask_spatial_scale
80.1520.780.1520.780.1520.7optimization batch_size total_number_ol_iterations warmup_iterations
30729000012000307290000120002400900012000lr start_lr
6.25e - 42 × 10 − 46.25 × 10 − 42 × 10 − 46.25 × 10 − 42 × 10 − 4final_lr start − momentum final_momentums
1 × 10 − 60.9981.001 × 10 − 60.9981.001 × 10 − 60.9981.00start_weight_decay final_weight_decay scheduler_scale_factor
0.040.41.250.040.41.250.040.41.25architecture patch size tubelet. size pred_depth pred_dembed_dim
162123841621238416212384hardware : dtypeaccelerator
bfloat16 A10.80Gbfloat16A10.80G
\n\nMulti-Mask Prediction. To increase the efficiency of V-JEPA, we use a multi-masking strategy (Caron et al., \n2020; Baevski et al., 2022a), which enables us to amortize the cost of the target computation. As mentioned in \nSection 3, for a given video clip, we sample 2 different masks, short-range and long-range. While we need to forward \npropagate the x-encoder and predictor separately for each mask, we only need to compute the y-representation once. \n\nC Pretraining details \n\nIn section, we report V-JEPA pretraining details. Table 8 summarizes the main hyperparameters used during \npretraining. \n\nArchitectures. We use Vision Transformer (Dosovitskiy et al., 2020) (ViT) architectures for the x-encoder and \ny-encoder. We train three V-JEPA encoders: a ViT-L/16224, a ViT-H/16224 and a ViT-H/16384. All three encoders \ntake as input a short video clip of 16 frames with a temporal stride of 4 between consecutive frames. The subscripts, \n224 and 384, indicate the spatial resolution of the video clip. V-JEPA flattens the video clip into a sequence of \n2 (see Figure 7). For all three models, the predictor is \nnon-overlapping spatio-temporal patches of size 16 \n× \ndesigned as a narrow ViT architecture, consisting of 12 transformer blocks with an embedding dimension of 384. For \nsimplicity, we keep the number of self-attention heads in the predictor equal to that of the backbone used for the \ncontext-encoder/target-encoder. V-JEPA is pretrained without using a [cls] token. \n\n16 \n×", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
>is employed, or has previously been employed in an executive capacity by the Company, and there has not been a period of at least three years between ceasing such employment and serving on the Board ;Performance Review
Board and Senior EEach year the Board receives management detailing intera outlining the expressed views>
has within the last three years been a prin - cipal of a material professional adviser or a material consultant to the Company, or an employee materially associated with the above mentioned adviser / consultant ;shareholders. The Nomination responsible for evaluation of committees and its leey execu>
is a material supplier or customer of the Company, or an officer of or otherwise associated directly or indirectly with a material supplier or customer ; andPerformance evaluations of ti committees, the individual Di executives were undertalien in cial year in accordance with the processes.λ
has a material contractual relationship with the Company other than as a Director.The Managing Director under review of the performance of Executive against individual t objectives.‘ The concept of ‘ maternality ’ is conseleved from the patients ’ the patients ’ the patients ’ the determinants ’ the patients ’ the determinants ’ or the better of fatilities in midwister go the patients ’ the patients ’ the patients ’ the der
Independent ProfesDirectors are able to access n management team at any tim vant information.It is also Board policy that Dir independent advice at the Co
Board CommitteesTo assist the Board in fulfilling ties, the Board has establishe tees to consider certain issueAppointment of Directors
These committees are as follow - upNominations of new Directors, recommended by the Nomination Committee, are considered by≥ 3 Audit Committee ;
≥ Remuneration Committee≥ Nomination Committee.The Nomination Committee employs external consultants to access a wide base of potential Directors, considering their range of slells and experience required in light of the :
Each committee operates un>current composition of the Board ;
The members of the Audit Co date of this Report are :λneed for independence ;
date of this Report are :3the Company ' s Diversity Policy ; strategic direction and progressCompany ; and
3 Mr Craig Carracher ( Chair Committee );≥ 3 Mr Ross Smyth - Kirk ; and3
nature of the Company ' s business.≥ 3 Mr Peter McAleer.The Board assesses nominated Directors against a range of criteria including experience, professional expertise, personal qualities, potential conflicts of interest and their capacity to commit themselves to the Board ’ s activitie
The Committee has appropriatise. All members of the Come literate and have an appropriathe industry in which the Communitie. CommunityThe Audit Committee ' s role is to fulfill its responsibilities ass Company ' s accounts, its exte reporting, its internal control
", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "do I go about arranging nursery school?” \n\nIt also includes preparatory exercises for \n\nexpectant mothers and support lectures \n\non child-raising leave after they return to \n\nthe workplace. \n\n\n\n\n \n \n \n \n [html]\n
BeforeAfter
Total care leave93 days ( Including staggered and reduced working hours )1 year ( Excluding staggered and reduced working hours )
Staggered and shorter working hours to care for sick family members93 days ( Including care leave )3 years in each case ( Excluding care leave )
More flexible approach to daily scheduling of care leaveDelay start of working day by one hour orEnd working day one hour earlierOffer menu of work - scheduling options ( Work six or seven hour day ), with option of selecting working days
\n\n\n\n\n\n(1) Consultation with Public Health Nurses and other nurses, \ngeriatric care managers and other experts \nSMBC employees and their family members (2) Information about care facilities \n\n\n \n \n \n \n [html]\n
SMBC employees and their family members
( 1 ) Consultation with Public Health Nurses and other nurses, geriatric care managers and other experts( 2 ) Information about care facilities
( 3 ) Care service agency
( 4 ) Other preferential services
\n\n**CSR REPORT 2011**20", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "to spirometry to avoid influencing patients’ perceptions \nof their dyspnea. \n\nprerecorded message then inquired whether any house- \nhold member was $ 18 years of age and had experi- \nenced respiratory symptoms (eg, shortness of breath, \nwheezing, \nsputum, prolonged \ncough) within the past 6 months. Households with affir- \nmative responses were subsequently contacted by the \nlocal study coordinator for a follow-up call. The house- \nhold member \nreporting respiratory symptoms was \nverbally consented and screened for eligibility to partic- \nipate in the study over the telephone.8,9 \n\nincreased mucus or \n\nExclusion criteria included the following: (1) a history of \ndiagnosis of lung or airway disease, (2) use of respiratory \ninhalers aside from as-needed salbutamol, (3) contrain- \ndications for spirometry (eg, occurrences of myocardial \ninfarction, stroke, aortic or cerebral aneurysm, eye sur- \ngery, detached retina within the last 3 months), (4) \ninability or refusal to provide informed consent, (5) be- \ning in the third trimester of pregnancy, and (6) being < \n18 years of age. \n\nClassification of Undiagnosed Cases \nCertified study personnel administered spirometry tests \nbefore and after BD use. Participants showing an in- \ncrease of at least 12% and 200 mL in their FEV1 after \nreceiving 400 mg of salbutamol were classified as having \nspirometry indicative of asthma.17 Those whose post-BD \nratio of FEV1/FVC fell below the lower 95% confidence \nlimit (ie, FEV1/FVC < lower limit of normal) were clas- \nsified as having spirometry indicative of COPD.18 Partic- \nipants meeting the criteria for both conditions were \nlabeled as having COPD. Those with a post-BD \n< 80% of the predicted normal and a post-BD \nFEV1 \nFEV1/FVC ratio > 0.70 were classified as having \nspirometry indicative of preserved ratio impaired \nspirometry (PRISm). PRISm was defined based on \npost-BD spirometry values for a more specific classifica- \ntion.19 Participants not meeting criteria for asthma, \nCOPD, or PRISm were labeled as having normal \nspirometry. \n\nEach participant completed the Asthma Screening Ques- \ntionnaire (ASQ)10 via telephone. Individuals aged $ 60 \nyears, and those aged < 60 years who scored < 6 points \non the ASQ, also completed the COPD-Diagnostic \nQuestionnaire.11,12 Participants scoring $ 6 points on \nthe ASQ or $ 20 points on the COPD-Diagnostic Ques- \ntionnaire were invited to the study site for pre- and post- \nbronchodilator (BD) spirometry. \n\nAssessment of the Impact of Participants’ Dyspnea \n\nA control group without respiratory symptoms was \nselected randomly using identical random digit dialing \nreported no respiratory \nmethods. Control patients \nsymptoms in the preceding 6 months and obtained a \nscore of 0 on the ASQ. Participants were recruited as \ncontrol patients if they could be matched with an indi- \nvidual from the undiagnosed group based on age ((cid:2) 5 \nyears) and sex. This matching process aimed to have \nsimilar demographic profiles between the control group \nand the newly found cases. This matching was imple- \nmented solely to ensure demographic comparability \nacross the study groups and not for pairing patients \nfor statistical analysis purposes.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "heuristic rules, our summarization system produced ED handoff notes with various sections for \n\ndownstream clinical tasks. The inference process is shown in the**Figure**. \n\n\n \n \n \n \n [html]\n
Type of dataDescription
DescriptiveDate of birth, medical record record reumber, encounter number, and total time of stay in ED
EncounterED arrival date and time, IP admit date and time
Laboratory tests ( all results available )Examples : hemoglobin, hemotocrit, white blood cell covert, mestrophil covert, platelets, serform, potassium, chlorida, blcarbosata, crastisina, blood uriva nitrogan, troponin, D diliner, Sactata, srinalysis, ketone, blood, mi
Laboratory tests ( only if abnormal )Examples : β - human chorionic gonadatropin hormone, all sarrum drug lewis ( alcohol lawel, sxkicylate level, Tylenol level ), magnesium, lipese, and erythrocyte selimentation rate
Notes ( in order of hierarchy )EM clinician notes, coresultation notes, EM progress notes, and EM procedure notes
VitalsHeight, weight, temperature, hexrt rate, blood pressure, and peripheral capillary oxygen saturation
OrdersMedications, consults, and radiology results
\n\nAbbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Patients
a person designated by the Secretary of State for the purposes of this regulation.
Power of entry
I2 —( 1 ) A constable may enter premises in order —
( a )
to search for a person who is suspected of conniting an offence of contravening the requirement in paragraph 10 ( dury to self - isolate ) of Schedule 11 ;
( b )
to remove a person of the description in sub - paragraph ( a ) to accommodation designated by the Secretary of State for the purposes of Schedule 11.
( 2 ) T
epower in paragraph ( 1 ) is exercisable if the constable —
( a )
has reasonable grounds to believe that a person of the description in paragraph ( 1 )( a ) is in or on the premises ; and
( b )
has a reasonable belief that it is necessary and proportionate to enter the premises for the purposes specified in paragraph ( 1 )( b ).
( 3 ) A
constable exercising the power in paragraph ( 1 )—
( a )
\n\n**13.**—(1) Subject to the following provisions of this regulation, an operator must ensure that a \npassenger who arrives at a port in England on a relevant service is provided with the information \nrequired by regulation 14 (“the passenger information requirement”) and in the manner required \nby that regulation at each of the times specified in paragraph (2). \n\n(2) The times are— \n\n(a) where prior to departure a booking was made for the passenger to travel on the relevant \nservice, before the booking was made (“the pre-booking information requirement”); \n(b) where, at least 48 hours prior to the scheduled departure time of the relevant service, a \nbooking was made for the passenger to travel on it, between 24 and 48 hours prior to the \nscheduled departure time of that service (“the pre-departure information requirement”); \n(c) where prior to departure the passenger was checked in to travel on the relevant service, at \nthe time of check-in (“the check-in information requirement”); and \n\n(d) while the passenger was on board the vessel, aircraft or train (“the on-board information \n\nrequirement”).", + "page_start": 18, + "page_end": 18, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Contents ............................................................................................................................................... 2**\n\n\n \n \n \n \n [html]\n
Summary, summary, summary, summary, summary, summary, summary, summary, and antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, anticoantal, anticoantaminantal, an1. Drug Interventions Programme Data........................................................................................................................................................................
2. Estimating an incidence trend from treatment data...........................................................................................................................................................Conclusion..............................................................................................................................................................................................
\n\n\n \n \n \n \n [html]\n
1. Drug Interventions Programme Data........................................................................................................................................................................2. Estimating an incidence trend from treatment data...........................................................................................................................................................
Conclusion. 30Appetics. S1
", + "page_start": 1, + "page_end": 1, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", + "target_page": 2, + "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. \n\n‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or \n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. \n\nLEGISLATIVE HISTORY—H.R. 866 (S. 528): \n\n\n \n \n \n \n [html]\n
Feb. 6, considered and passed House. June 26, considered and passed SenateTable
TableTable
\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 \n\nS \nW \nA \nL \nB \nU \nP \nh \nt \ni \n\nw \nD \nO \nR \nP \n2 \nB \nH \n8 \n2 \nC \nB \nK \nS \nD \nn \no \ne \ns \nu \na \nr \nk \nd", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "*Consumer Laws and Regulations*\n\nWe are also subject to certain consumer laws and regulations that are designed to protect consumers in \ntransactions with banks. While the following list is not exhaustive, these laws and regulations include the Truth in \nLending Act, the Truth in Savings Act, the Electronic Funds Transfer Act, the Expedited Funds Availability Act, the \nEqual Credit Opportunity Act, and the Fair Housing Act, among others. These laws and regulations among other \nthings prohibit discrimination on the basis of race, gender or other designated characteristics and mandate various \ndisclosure requirements and regulate the manner in which financial institutions must deal with customers when \ntaking deposits or making loans to such customers. These and other laws also limit finance charges or other fees or \ncharges earned in our activities. We must comply with the applicable provisions of these consumer protection laws \nand regulations as part of our ongoing customer relations. \n\n*Technology Risk Management and Consumer Privacy*\n\nState and federal banking regulators have issued various policy statements emphasizing the importance of \ntechnology risk management and supervision in evaluating the safety and soundness of depository institutions with \nrespect to banks that contract with outside vendors to provide data processing and core banking functions. The use \nof technology-related products, services, delivery channels and processes expose a bank to various risks, particularly \noperational, privacy, security, strategic, reputation and compliance risk. Banks are generally expected to prudently \nmanage technology-related risks as part of their comprehensive risk management policies by identifying, measuring, \nmonitoring and controlling risks associated with the use of technology. \n\nUnder Section 501 of the Gramm-Leach-Bliley Act, the federal banking agencies have established appropriate \nstandards for financial institutions regarding the implementation of safeguards to ensure the security and \nconfidentiality of customer records and information, protection against any anticipated threats or hazards to the \nsecurity or integrity of such records and protection against unauthorized access to or use of such records or \ninformation in a way that could result in substantial harm or inconvenience to a customer. Among other matters, the \nrules require each bank to implement a comprehensive written information security program that includes \nadministrative, technical and physical safeguards relating to customer information. \n\nUnder the Gramm-Leach-Bliley Act, a financial institution must also provide its customers with a notice of \nprivacy policies and practices. Section 502 prohibits a financial institution from disclosing nonpublic personal \ninformation about a consumer to nonaffiliated third parties unless the institution satisfies various notice and opt-out \nrequirements and the customer has not elected to opt out of the disclosure. Under Section 504, the agencies are \nauthorized to issue regulations as necessary to implement notice requirements and restrictions on a financial \ninstitution’s ability to disclose nonpublic personal information about consumers to nonaffiliated third parties. \nUnder the final rule the regulators adopted, all banks must develop initial and annual privacy notices which describe \nin general terms the bank’s information sharing practices. Banks that share nonpublic personal information about \ncustomers with nonaffiliated third parties must also provide customers with an opt-out notice and a reasonable \nperiod of time for the customer to opt out of any such disclosure (with certain exceptions). Limitations are placed on \nthe extent to which a bank can disclose an account number or access code for credit card, deposit, or transaction \naccounts to any nonaffiliated third party for use in marketing. \n\n*Monetary Policy*", + "page_start": 37, + "page_end": 37, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**Contents ............................................................................................................................................... 2**\n\n\n \n \n \n \n [html]\n
Summary, summary, summary, summary, summary, summary, summary, summary, and antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, anticoantal, anticoantaminantal, an1. Drug Interventions Programme Data........................................................................................................................................................................
2. Estimating an incidence trend from treatment data...........................................................................................................................................................Conclusion..............................................................................................................................................................................................
\n\n\n \n \n \n \n [html]\n
1. Drug Interventions Programme Data........................................................................................................................................................................2. Estimating an incidence trend from treatment data...........................................................................................................................................................
Conclusion. 30Appetics. S1
", + "page_start": 1, + "page_end": 1, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**116. Power of Commissions in relation to pensions, etc.**\n\n\n \n \n \n \n [html]\n
decide whether or not any persistens benefits shall be granted or withfrold, reduce in amcunt or suspend any such benefits that have been anded, filts shall be granted and may not be withheild, reduced in amount or unless the appropriate Co
, as the case may be, in the decision to withhold them, reduce them in amountI them.
Where the amount of any persions benefits that may be granted to any fived by lare, the amount of the benefits to be granted to him or her shall be amount for which he or she is eligible unless the appropriate Commission his or her being granted b
The appropriate Commission shall not concur under subsection ( 1 ) or ( 2 ) of this section in action taken on the ground that any person who holds or effice of a judge of the Cout of Appeal or of the High Court or the Auditor - Director of Prosecuti
In this section “ the appropriate Commission ” means the cases of benefits for which any person may be eligible in respect of the environment in the public service of a person who, immediately better he or she assed to be a public stiffican, wa
any sther case, the Public Service Commission. In this section “ persons benefit ” means ary persons, compensation, a child ” was alwances to persons in respect of their service as public officers, and appending to personal interviews. As
Solidated Fund
Prevenues or cher monitys ratioed or received for the purposes of their distaxeans ( not being reversues or other moneys that are payuble by or law into some other fund established for a specific purpose or that may by or law be retained by the
abnoredish from Gonsolidation # under other public hundships within the public human providers and expertised more assigned / use that is charged upon the Fund by the Constitution or term the supportise that is changed spon the Fund by tha
\n\n(a) \n(b) \n\n(3) If in any financial year it is found- \n\n(a) \n\nthat the amount appropriated by the Appropriation Act for the purposes included \nin any organisation of expenditure is insufficient or that a need has arisen for \nexpenditure for a purpose for which no amount has been appropriated by the \nAppropriation Act; or \nthat any moneys have been expended on any organisation of expenditure in \nexcess of the amount appropriated for the purposes included in that \norganisation by the Appropriation Act or for a purpose for which no amount has \nbeen appropriated by the Appropriation Act, \n\n(b) \n\na supplementary estimate showing the sums required or spent shall be laid before the \nNational Assembly and the organisations of expenditure shall be included in a \nsupplementary Appropriation Bill, or in a motion or motions approving such expenditure, \nwhich shall be introduced or moved in the Assembly. \n\n(4) Where any supplementary expenditure has been approved in a financial year \nby a resolution of the National Assembly in accordance with the provisions of subsection \n(3) of this section, a supplementary Appropriation Bill shall be introduced in the National \nAssembly, not later than the end of the financial year next following, providing for the \nappropriation of the sums so approved. \n**120. Authorization of expenditure in advance of appropriation**", + "page_start": 50, + "page_end": 50, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "All rights reserved. No part of this publication may be reproduced or transmitted \n\nin any form or by any means, electronic or mechanical, including photocopying, \n\nrecording, or any information storage or retrieval system, without prior permission in \n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in \n\nthe case of electronically supplied publications, a person may engage in fair dealing \n\nwith a copy of this publication for his or her personal or private use, or his or her \n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978. \n\nThe authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition.", + "page_start": 1, + "page_end": 1, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "(a) \n\ngrant to any person convicted of any offence a pardon, either free or subject to \nlawful conditions; \ngrant to any person a respite, either indefinite or for a specified period, of the \nexecution of any punishment imposed on that person for any offence; \nsubstitute a less severe form of punishment for any punishment imposed on \nany person for any offence; and \nremit the whole or part of any punishment imposed on any person for any \noffence or of any penalty or forfeiture otherwise due to the Government on \naccount of any offence. \n\n(b) \n\n(c) \n\n(d) \n\n**54. Advisory Committee on Prerogative of Mercy**\n\n(1) There shall be an Advisory Committee on the Prerogative of Mercy which \n\nshall consist of- \n\n(a) \n\nthe Vice-President or a Minister appointed by the President by instrument in \nwriting under his or her hand; \nthe Attorney-General; and \na person qualified to practise in Botswana as a medical practitioner, appointed \nby the President by instrument in writing under his or her hand. \n\n(2) A member of the Committee appointed under subsection (1)(a) or (c) of this \n\nsection shall hold his or her seat thereon for such period as may be specified in the \ninstrument by which he or she was appointed: \n\nProvided that his or her seat shall become vacant- \n\n(i) \n\nin the case of a person who, at the date of his or her appointment, was the \nVice-President or a Minister, if he or she ceases to be the Vice-President or a \nMinister; or \nif the President, by instrument in writing under his or her hand, so directs. (ii) \n\n(3) The Committee shall not be summoned except by the authority of the \n\nPresident who shall, as far as is practicable, attend and preside at all meetings of the \nCommittee, and, in the absence of the President, the member of the Committee \nappointed under subsection (1)(a) of this section shall preside. \n\n(4) The Committee may act notwithstanding any vacancy in its membership and \n\nits proceedings shall not be invalidated by the presence or participation of any person \nnot entitled to be present at or to participate in those proceedings. \n\n(5) Subject to the provisions of this section, the Committee may regulate its own \n\nprocedure. \n**55. Functions of Advisory Committee on Prerogative of Mercy**\n\n(1) Where any person has been sentenced to death for any offence, the \nPresident shall cause a written report of the case from the trial judge, together with such \nother information derived from the record of the case or elsewhere as he or she may \nrequire, to be considered at a meeting of the Advisory Committee on the Prerogative of \nMercy; and after obtaining the advice of the Committee he or she shall decide whether to \nexercise any of his or her powers under section 53 of this Constitution. \n\n(2) The President may consult with the Committee before deciding whether to \n\nexercise any of his or her powers under the said section 53 in any case not falling within \nsubsection (1) of this section. \n**56. Constitution of offices**\n\nSubject to the provisions of this Constitution and of any Act of Parliament, the \npowers of constituting and abolishing offices for Botswana shall vest in the President. \n\n**CHAPTER V**\n**Parliament (ss 57-94)**\n**PART I**\n**Composition (ss 57-70)**", + "page_start": 25, + "page_end": 25, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Some of these groups are**directly addressed by European and national legislation**, for example, \nworkers with disabilities, young workers or pregnant women. For other groups of workers, for example, \nfor women or migrant workers, the legislative protection is formulated as a general ‘equal treatment’ \nprescription, like to provide preventive measures for all groups in an enterprise (Framework Directive, \nArticle 15 ‘Risk groups’), or to provide solutions that fit to the individual (Framework Directive, Art. 6.2.d.). \nThere are some prescriptions that refer to specific preventive activities, for example, to provide written \ninstructions in different languages for safe work with chemicals. \n\n**3.6 Conclusions**\nThe exposure**to psychosocial risks**is increasing, with mental health prevalence still emerging. Major \nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, \nlonger working hours and poor communication. There is also some evidence that countries with over- \naverage employment in sectors like health and care or other human and client-oriented services \n(education, social work, tourism, entertainment) suffer from longer working hours and more mental \nburden. The northern countries are at the top of the countries with highest mental burden. The southern \ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment, \ncharacterised by atypical working times and issues with difficult clients. \n\n\n \n \n \n \n [html]\n
Concerning the sectors, national context appears to be related to differences in psychosocial risk
management in all types of organisations, although in some sectors this relationship is weak. In the apriculture, forestry and fishing sector and the sectors of mining, condruction, electricity, trade,
transport, and accommodation and food, the low level of psychosocial risk management ’ as observed also in a bounzational rational contained. An explanation for this finding might relate to the large proportion of small organisationst
\n\nThere is a stable**block of ‘conventional’ physical health risks**— ergonomics and risk from the work \nenvironment — and ergonomic risks that did not significantly change since 1990. It varies between 15% \nfor exposure to smoke, fumes and dusts to over 60% for repetitive hand/arm movements.**Ergonomic**\n**risks**develop in two directions: 1) traditional risks stagnate in total, that is, lifting and moving heavy \nloads, painful or tiring positions, and shifts between sectors (from industry to transport, health and care); \n2) risks of inactivity and highly repetitive hand/arm movements increase. Beside sectoral and \noccupational differences, it can be noted that in general higher percentages of exposed employed \npersons (workers and self-employed) are working in eastern and southern Member States. \n\nSince 2006 the average**working time**per week went down by 15 minutes for employees, and a slight \nreduction of most atypical — or unsocial — working times can be observed. Work intensification has \nemerged until 2005 but seems to stagnate since then. There are strong indications but no quantitative \nevidence on the extent to which working long hours, work at atypical times and probably also work with \nhigher risks were**transferred to workers in non-standard types of employment**.", + "page_start": 58, + "page_end": 58, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "}\n \n \n \n [html]", + "page_start": 55, + "page_end": 55, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When is it not necessary to review an EHC plan ?", + "target_page": 3, + "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. \n\n**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, the requirement for the local authority \nto review the making and use of direct payments within the first three months of them being \nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read \ninstead as a requirement for such action to be taken as soon as reasonably practicable.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n**Open Access.**This is an open access article distributed under the terms of the CC-BY License. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\n**21**. Singleton JM, Sanchez LD, Masser BA, Reich B. Efficiency of electronic signout for ED-to-inpatient admission \nat a non-teaching hospital. Intern Emerg Med. 2018;13(7):1105-1110. doi:10.1007/s11739-018-1816-z \n\n**22**. Downing NL, Bates DW, Longhurst CA. Physician burnout in the electronic health record era: are we ignoring \nthe real cause? Ann Intern Med. 2018;169(1):50-51. doi:10.7326/M18-0139 \n\n**23**. Pivovarov R, Elhadad N. Automated methods for the summarization of electronic health records. J Am Med \nInform Assoc. 2015;22(5):938-947. doi:10.1093/jamia/ocv032 \n\n**24**. Hartman VC, Bapat SS, Weiner MG, Navi BB, Sholle ET, Campion TR Jr. A method to automate the discharge \nsummary hospital course for neurology patients. J Am Med Inform Assoc. 2023;30(12):1995-2003. doi:10.1093/ \njamia/ocad177 \n\n**25**. Zhang Y, Merck D, Tsai EB, Manning CD, Langlotz CP. Optimizing the factual correctness of a summary: a study \nof summarizing radiology reports. arXiv. Preprint posted online November 6, 2019. doi:10.48550/arXiv.1911.02541 \n\n**26**. Mukherjee S, Gamble P, Ausin MS, et al. Polaris: a safety-focused LLM constellation architecture for healthcare. \narXiv. Preprint posted online March 20, 2024. doi:10.48550/arXiv.2403.13313 \n\n**27**. Hegselmann S, Shen SZ, Gierse F, Agrawal M, Sontag D, Jiang X. A data-centric approach to generate faithful \nand high quality patient summaries with large language models. arXiv. Preprint posted online February 23, 2024. \ndoi:10.48550/arXiv.2402.15422 \n\n**28**. Krishna K, Khosla S, Bigham JP, Lipton ZC. Generating SOAP Notes from Doctor-Patient Conversations Using \nModular Summarization Techniques. In: Proceedings of the 59th Annual Meeting of the Association for \nComputational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: \nLong Papers); 2021. Accessed October 23, 2024. https://aclanthology.org/2021.acl-long.0/ \n\n**29**. Ayers JW, Poliak A, Dredze M, et al. Comparing physician and artificial intelligence chatbot responses to \npatient questions posted to a public social media forum. JAMA Intern Med. 2023;183(6):589-596. doi:10.1001/ \njamainternmed.2023.1838 \n\n**30**. Williams CY, Bains J, Tang T, et al. Evaluating large language models for drafting emergency department \ndischarge summaries. medRxiv. Preprint posted online April 4, 2024. doi:10.1101/2024.04.03.24305088 \n\n**31**. Cao Z, Wei F, Li W, Li S. Faithful to the original: fact aware neural abstractive summarization. In: Proceedings of \nthe AAAI Conference on Artificial Intelligence April 26, 2018; New Orleans, LA. Accessed October 23, 2024. https:// \naaai.org/proceeding/01-thirty-second-aaai-conference-on-artificial-intelligence-2018/ \n\n**32**. Singhal K, Tu T, Gottweis J, et al. Towards expert-level medical question answering with large language models. \narXiv. Preprint posted online May 16, 2023. doi:10.48550/arXiv.2305.09617 \n\n**33**. Wang G, Yang G, Du Z, Fan L, Li X. ClinicalGPT: large language models finetuned with diverse medical data and \ncomprehensive evaluation. arXiv. Preprint posted online June 16, 2023. doi:10.48550/arXiv.2306.09968 \n\n**34**. Shing HC, Shivade C, Pourdamghani N, et al. Towards clinical encounter summarization: learning to compose \ndischarge summaries from prior notes. arXiv. Preprint posted online April 27, 2021. doi:10.48550/arXiv. \n2104.13498 \n\n**35**. Van Veen D, Van Uden C, Blankemeier L, et al. Adapted large language models can outperform medical experts \nin clinical text summarization. Nat Med. 2024;30(4):1134-1142. doi:10.1038/s41591-024-02855-5 \n\n**36**. Tang L, Sun Z, Idnay B, et al. Evaluating large language models on medical evidence summarization. NPJ Digit \nMed. 2023;6(1):158. doi:10.1038/s41746-023-00896-7", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a \n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the \n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician- \n\nwritten note (unmitigated). \n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the \n\nframework and evaluated 10 separate cases from the test dataset that were not included in the \n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to \n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was \n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for \n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software \n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity \n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 \nrepresents no agreement.52 Data were analyzed from October 2023 to March 2024. \n\n**Results**\n\n**Automated Tasks**\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In**Table 2**, \n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and \n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we \n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that \n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456, \n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician \n\nsummaries. \n\n**Clinical Evaluation Tasks**\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are \n\nshown in**Table 3**and**Table 4**. The mean clinical quality scores of the automated summaries are in a \n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries \n\nwere observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient \n\n**Methods**\n\n**Data Collection**\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was \n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with \n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 \n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from \n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient \n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time. \n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided \n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then \n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), \n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used \n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of \n\nObservational Studies in Epidemiology (STROBE) reporting guidelines. \n\n**EM-to-IP Handoff Note Template**\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff \n\nnote structure used at the study site. The generated EM handoff note consists of components \n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult \n\norders, and radiology impressions) and components generated by the trained abstractive \n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans, \n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage \n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the \n\ntotal time of patient’s stay in the ED. \n\n**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\ncuration (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52 \n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]). \n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on \n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues \n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case \n\nscenarios in eTable 2 in Supplement 1). While the incompleteness and faulty logic identified in the \n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively; \n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create \n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the \n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4 \n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no \n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) \n\ncompared with the physician-written notes (2.0%), although very few hallucinations. \n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, \n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, \n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters. \n\n**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "could represent a transformative advancement in the quality of EM-to-IP transitions of care. \n\n**ARTICLE INFORMATION**\n**Accepted for Publication:**October 7, 2024. \n\n\n \n \n \n
Shall be construed as a reference to that law as it had effect on 29th September,( 15 ) The Interpretation Act, 1889 shall apply, with the necessary adaptations, for posse of interpreting this Constitution and otherwise in relation theretic as it appliep purpose of interpreting and in relation to Acts of the Parliame
FIRST SOHEDULE TO THE CONSTITUTION ( Section 58 ( 2 )( b ))ELEOTION OF SPEOIALLY ELECTED MEMBERS OF
THE NATIONAL ASSEMBLYn this Schedule -
- election * means an election to fill a vacancy among the Specially Elected Membersng otherwise than upon a dissolution of Parliament ;neral election * means an election to fill the vacancies among the Specially Elected ors occurring upon a dissolution of Parilament ;
Speaker * means the Speaker of the National Assembly ; and escribed * means prescribed by rules made under paragraph 2RI any time when the office of Speaker is vacant or the holder of that office is unable by of absence or illness to exercise the functions vested in him or her by this Schedule the
may be exercised by the Deputy Speaker of the National Assembly or, if there is no Speaker or the Deputy Speaker is unable by reason of absence or illness to exerciseunctions, by such Member of the Assembly ( not being the President or Vice - President or as or Assistant Minister ) as the Assembly may elect for that purpose.
ect to the provisions of this Schedule the National Assembly may make rules for the of Its Specially Elected Members.tions of Specially Elected Members shall be conducted by the Speaker and, subject to the one of this Schedule and of any rules made under paragraph 2 thereof, shall be conducted manner as he or she may direct.
President shall nominate four candidates for election in the case of a general election or she shall nominate one candidate for election in the case of a by - election.The names of the four candidates or, as the case may be, the name of the one candidate
Itemsed for election by the President under the forepoing subparagraph shall be presented to tional Assembly in such manner as may be prescribed, and any Elected Member of the bly ( other than the President if he or she is an Elected Member ) sinate four candidates for election in the case of a general election and one candidate for in the case of a by - election.
A list of the candidates nominaled for election by the President and the Elected MembersNational Assembly under the foregoing provisions of this paragraph shall be prepared, and lected Mamber of the Assembly shall be entitled to vols - in the case of a general election, for four candidates ; and in the case of a by - election, fon
list so constitutedThe vole of every Exected Member of the National Assembly shall be given by ballot in manner as not to disclose how he or she has voled. An Elected Member of the National Assembly shall not cast more than one vote for arr
nodidate. he Speaker shall cause elections of Specially Elected Members to be held -in the case of a general election, as soon as practicable after the holding of a general election of the Elected Members of the National Assembly and before the Assembly first meets after that general election ; and
\n [html]\n
Published : Uecember 3, ZULR, 00x10.10010.1001gimisnetworkopen. J024.4861.5
Open Access This is an open access anticle distributed under the terms of the CC - BY Lickenses. R 2024 Hartman V et al. J484 Network Open.
Corresponding Author : Vince Netman, MS, Abstractive Heilth, 330 E 95 % CI : Apt. Thi, New York, NY 10022 ( kinee @ abstractivehelith. cort ).
Authors effilliations : Alter - line - free first - lines first - lines ( Diarrhoea, Divedile ), Deartment of Emergency Medicine, New / York - Preolyterian / Well Correll Medicine, New York : Well - Orty, Fortenlio, Sharma, Sheetli, Orepari
Author Contributions : Nortmen and Dr 2heng hed full access to all of the data in the study and take responsibility for the integrity of the data and the accuracy of the data analysis.
Concept and design Hartman, Zhang, Poddar, McCarty, Fortenko, Campion, Steel.
Acquisition, analysis, or interpretation of dota : All authors.
Draffting of the manascript : Hartman. Zhang. Poddar. McCerty. Campion. Steel.
Critical review of the manuscript for important intellectual content : All authors.
Statistical analysis : Hartman, Zhang, Poddar, Sholle.
Obtained funding : Hartman, Campion.
Administrative, technicol, or moterial support Hartman, Zhang, Poddar, Sholle, Sharma, Campion, Steel.
Supervision : Zhang, Poddar, McCarty, Sharma, Campion, Steel.
Conflict of Interest Disclosures : Dr Hartnan reported holding equity in Abstractive Health during the conduct of the study and holding a patient for automated summarization of a hospital stay using machine learning issued to Abstracta
Funding : Support : Our research received support from New / fork - Preobyterian and Weell Correll Medicine, including the Joint Clinical Trials Office and Clinical and Translational Science Center ( grant No. IL1TR0022384 ).
Role of the Funder / Sponsor : The funder had no role in the design and conduct of the study, collection, management, analysis, and interpretation of the data preparation, review, or approval of the manuscript, and decision to submit the ma
Data Sharing Statement : See Supplement 2.
", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsuperior performance. However, while the manual clinical evaluation demonstrated the majority of \n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on \n\naverage, inferior to the clinician-written notes. \n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and \n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst- \n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician \n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance \nand expertise.49 As such, none of the incorrect output text elements reached life-threatening risk. \nHowever, incompleteness and faulty logic identified in the automated summaries were not always \n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to \n\ncreate significant patient safety risk compared with the physician-written summaries. These critical \n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further \n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model \n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM \n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see \n\neAppendix 1 in Supplement 1). This physician-in-the-loop process has also been identified as critical \nin other recent work implementing LLMs into clinical workflows.29,53 \n\nWhile the automated methods of SCALE and MPNet-based sentence transformers \n\ndemonstrated a cursory view of the faithfulness performance of the models, the clinical evaluation \n\nprovided the nuanced context of the true factuality of our system on a word by word level. When \n\ncomparing with the source notes, the automatic evaluations rewarded the summaries with more \n\ndetails, more semantic similarities, and more entailment logics, while physician-written notes tended \n\nto be more concise with more shortcuts and clinical jargon, which are penalized by automatic \n\nevaluation metrics. In addition, LLM-generated summaries are completely based on the source \n\nnotes, while physician-written summaries are often composed with additional knowledge that \n\ncannot be found from the source notes. \n\nThe divergence of the automated and clinical evaluation results of an LLM intended for \n\nintegration into a critical clinical workflow is an important finding. First, this observed finding \n\nvalidates the importance of clinical evaluations in addition to conventional automated evaluations to \ndetermine accuracy.54 While other LLM clinical evaluation frameworks have been described to \nmeasure conventional model output quality categories (such as incorrectness domains and other \nperformance gaps),30,35 to our knowledge, our novel framework is the first to incorporate \nanticipated patient safety implications for each individual category deficiency. \n\n**Limitations**\nThere were several limitations to the study that were primarily driven from constraints of \n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location, \n\nthe data were required to remain on premise at all times and the infrastructure that was provided \n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model \n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable \ndifference between our fine-tuned LLM 2 model and third party LLMs32,55 because of the study \nlocation’s restrictions and concerns with the data retention policies. Nevertheless, our study \n\ndemonstrates the potential capability of integrating state-of-the-art open source LLMs at \n\norganizations that are less open to integrating third-party LLMs.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "Give me some info about the scroll bars in excel", + "target_page": 6, + "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet \n\n\n\n\n\n\n\n**Handy to Know…**\n***Chart layouts***are predefined themes \n\ncreated by Microsoft. Even if you choose one \nof these layouts you can still make your own \nmodifications to the way the elements and \nobjects are positioned and how they appear. \n\n**For Your Reference…**\nTo***change***the***chart layout***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Quick Layout***in the***Chart***\n***Layouts***group \n\n3. Select the desired layout", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**SELECTING ROWS**\n\nIf you want to make changes to an***entire row***, \nsuch as bolding all of the headings in a row or \nchanging the font of all the cell entries, you must \nfirst select the row. This is done by clicking on the \n\n\n\n\nrow header to the left of the row. Remember that \nany changes you make will apply to every cell in \nthe row all the way across to column XFD, so be \ncareful! \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n **6**\n\nto select this row \n\n\n and click on the \n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous file*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*with this exercise, or open the file*\n*E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \nthe active cell \n to make cell***A1***\n\nrow heading for row***5***\n\n*Notice that the mouse pointer*\n*changes to a black arrow that*\n*points towards the row…*\n\n Click once on row heading***5***to \n Click in cell***B7***and press \n\n*This is the key combination for*\n*selecting an entire row…*\n\n Click on the row header for row***7***\n Hold down row header for row***10***\n\n*All rows from 7 to 10 will be*\n*selected…*\n\n Click in the row header for row***5***, \n\nthen hold down the left mouse \nbutton and drag down the row \nheaders to row***10***\n\n*This is another technique for*\n*selecting rows, but it does require*\n*a steady hand!*\n\n\n\nselect the entire row \n\n\n\n + \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n When***every cell***in a row or column is \n\nselected, the corresponding row or column \nheader is filled in dark blue. When only***some***\nof the cells are selected, the row or column \nheader is filled in orange. These indicators \nhelp you locate the active cell(s) on the \nworksheet. \n\n", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**SELECTING COLUMNS**\n\nIf you want to make changes to an***entire***\n***column***, such as bolding all of the headings in a \ncolumn or changing the font of all the cell entries, \nyou must first select the column. This is done by \n\n\n\n\nclicking on the column header directly above the \ncolumn. Remember that any changes you make \nwill apply to every cell in the column all the way \ndown to row 1,048,576! \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\ncolumn***B***to select it \n\n\n and click on the \n**6**\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*file with this exercise, or open*\n*the file E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \n to make \ncell***A1***the active cell \n\ncolumn heading for column***B***\n\n*Notice that the mouse pointer*\n*changes to a black arrow*\n*pointing down the column…*\n\n Click once to select the column \n\n*This time the row headers*\n*change to orange to indicate*\n*that at least one cell (but not*\n*all) in each row is selected…*\n\n Click in cell***D6***and press \n+ \n\n*This key combination also*\n*selects an entire column…*\n\n Click on the column header for \n Hold down column header for column***D***\n\n*This time, columns B, C, and D*\n*are all selected…*\n\n Click in the column header for \n\ncolumn***A***, then hold down the \nleft mouse button and drag the \nmouse pointer across the \ncolumn headings to column***E***\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Make sure that you check your worksheet \n\ncarefully after you’ve made changes to entire \ncolumns. Remember that all of the cells in \nthat column are affected – even those in \nrows below the visible area.", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**\n\n\n\nrename the other worksheets: \n\n\n\n\n\n**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press \n\n**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct.", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_7.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it and display \nthe chart commands on \nthe ribbon \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Change***\n***Chart Type***in the***Type***\ngroup to display the \n***Change Chart Type***\ndialog box \n\n Click on***3-D Column***, \n Click on**[OK]**to apply \n Click on the***Chart Data***\n\nas shown \n\nthe change to the chart \n\nworksheet tab to return \nto the worksheet \n\n\n\n\n\n\n\n\n\n **4**\n\n**Handy to Know…**\n You can use***Change Chart Type***in the \n***Type***group on the***CHART TOOLS:***\n***DESIGN***tab for either embedded charts or \ncharts that have their own worksheet tabs. \n\n**For Your Reference…**\nTo***change***the***chart type***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Change Chart Type***in the \n***Type***group \n\n3. Click on the desired chart and click on**[OK]**", + "page_start": 52, + "page_end": 52, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "***Style 9***\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_9.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it \n\n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to see a \ngallery of style options, \nas shown \n\n Scroll through the \n\ngallery and point to \neach style to see how \nyour chart will look in \nLive Preview \n\n Scroll to and click on \n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to close the \ngallery \n\n Click on the***Chart Data***\nworksheet tab \n\n\n\n\n\n\n\n**Handy to Know…**\n \n\nInstead of using the***Chart Styles***tool to the \nright of the chart, you can also choose chart \nstyles from the***CHART TOOLS: DESIGN***\ntab on the ribbon when a chart is selected. \n\n**For Your Reference…**\nTo***change***the***chart style***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***Chart Styles***tool to the right of \nthe chart \n\n3. Click on the desired style", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "***Figure 44. Data Entry Grid Export to Excel screen***\n\n\n\n\n \n \n \n \n [html]\n
TableTableTableTable
TableTableNAIIS - User - Mamual. DocsPage 30
10 / 02 / 2013
", + "page_start": 29, + "page_end": 29, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**Tasks:**\n\n*Before starting this exercise you MUST have completed all of the topics in*\n*the chapter Font Formatting…*\n\n Open the workbook called***PE_Font Formatting.xlsx***(it can be found in \n Format the heading in cell***A1***as***Cambria***,***36 pt***,***bold***,***Orange Accent 2***\n Format the other headings as bold, italic or underline as shown on the \n Use***Orange, Accent 2, Lighter 80%***to fill the area behind the headings \n Add the superscript 1 in cell***H3***and in cell***B27***with the following comment \n\nthe same folder as the student files) \n\nfollowing page \n\nas shown on the following page \n\n**1 Fee may be reduced as the result of Government Assistance**\n\n*Your completed worksheet should appear as shown on the following*\n*page...*\n\n Use the***Save As***command to save the workbook as***PE_Font Formatting***\n***(Completed).xlsx***\n\n\n\n\n\n\n \n \n \n \n [html]Reservations for January 2009Error, per, Child, per, Dencb\n
$ 33.00
Age Group5DateDay547 - 899 - 1213 - 14 [Total
Fees6.6 / 01 / 2014Monday101415847
$ 1.351.007.7 / 01 / 2014Tuesday9.14.12.7 |42
$ 1.386.0088 / 01 / 2014Wednesday11.1513847
$ 1.351.0099 / 01 / 2014Thursday1216121050
$ 1.650.001010 / 01 / 2014Friday1115151253
$ 1.749.00111213 / 01 / 2014Monday13182014 ]
67$ 2.211.0013.14 / 01 / 2014Tuesday14.1917.12 ]
62$ 2.046.00 ]1415 / 01 / 2014Wednesday16201813 ]
67$ 2.211.001516 / 01 / 2014Thursday17171725
66$ 2.178.001617 / 01 / 2014Friday26202017 |
73$ 2.409.00171820 / 01 / 2014Mondey162020
1369$ 2.277.0019.21 / 01 / 2014Tuesday14.1817.
1261$ 2.013.002022 / 01 / 2014Wednesday162018
14 ]68$ 2.244.002123 / 01 / 2014Thursday181917
1569$ 2.277.002224 / 01 / 2014Friday172020
17 |74$ 2.442.002324Total Children819792
n30$ 11.253.002326273 Fee may be reduced as the result of Government Assistance28
", + "page_start": 26, + "page_end": 26, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**NAVIGATING IN A FILE**\n\n\n \n \n \n \n [html]\n
Arrow KeysMove one cell to the right, left, up or down
TabMove once cell to the right
Ctrl + HomeTo beginning file
Ctrl + EndTo end of typed information
HomeBeginning of a line
EndEnd of a line
Page DownDown one screen
Page UpUp one screen
F5To a specific page
Scroll barsAppear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document.
", + "page_start": 5, + "page_end": 5, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this exercise*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*you MUST open the file E723*\n*Cell Alignment_9.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click in cell***A5***\n\n*This cell contains a long text*\n*entry that spills across several*\n*columns…*\n\n Click on the***Expand Formula***\n\n***Bar***tool \nformula bar to see all of the \ntext \n\n to the right of the \n\n Click on the***Wrap Text***\n\ncommand \n***Alignment***group on the \n***Home***tab to wrap the text in \ncell***A5***\n\n in the \n\n**5**\n\n*Notice how the row height has*\n*now increased…*\n\n Hold down the \n\n key and \nclick in cell***E5***to select the \nrange***A5:E5***\n\n Click on the drop arrow \n\nfor***Merge & Centre***\n in the \n***Alignment***group and select \n**Merge Cells**to merge the cells \nin the range \n\n Move the mouse pointer to the \n\nbottom of the row***5***heading \nborder and drag the row height \nup until you reach***30***points \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n \n\nTo wrap text - click in the cell to merge and \nclick on the***Wrap Text***command \n in the \n***Alignment***group on the***Home***tab \n\nTo merge text - click on the drop arrow  \n\nfor***Merge & Centre***\ngroup and select**Merge Cells**\n\n in the***Alignment***\n\n\n\n\n\n**Handy to Know…**\n \n\nIn the example above, wrapping forced the \ntext into one cell and Excel expanded the \nrow height so that all of the text was \naccommodated. We then merged the text \nacross several horizontal cells in the exercise \nabove so that we could reduce the row \nheight to a more acceptable level. \n\n", + "page_start": 25, + "page_end": 25, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "How to rename a worksheet in Excel ?", + "target_page": 12, + "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**\n\n\n\nrename the other worksheets: \n\n\n\n\n\n**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press \n\n**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct.", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "press to clear it \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***copy***a***worksheet***: \n\n1. Right-click on the worksheet to copy, then \nselect***Move or Copy***\n\n2. Click on***Create a copy***so it appears ticked \n3. Click on**[OK]**\n\n**Handy to Know…**\n You can copy the current worksheet using \nthe***HOME***tab by clicking on***Format***in the \n***Cells***group, then clicking on***Move or Copy***\n***Sheet***. \n\n The***Before sheet***options in the***Move or***\n***Copy***dialog box allow you to position the \ncopied worksheet where you want.", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Before starting this exercise*\n*you MUST open the file*\n*E1324 Worksheet*\n*Techniques_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Examine the workbook – it \ncurrently contains one \nworksheet named***Sheet1***\n\n Click on the***New Sheet***icon \nat the end of the worksheet \ntabs \n\n*A new worksheet named*\n*Sheet2 will be inserted. You*\n*can also use the keyboard*\n*shortcut...*\n\n Press + \nanother new worksheet \n\n to insert \n\n*This sheet is named Sheet3*\n*and is inserted before the*\n*currently selected sheet.*\n*Now let’s delete a sheet...*\n\n Right-click on the***Sheet3***\nworksheet tab to display the \nshortcut menu \n\n Select**Delete**to remove the \nworksheet \n\n*As the worksheet contains no*\n*data, the sheet will be*\n*deleted immediately. If a*\n*worksheet contains data,*\n*Excel will ask you to confirm*\n*your actions...*\n\n Repeat steps***4***and***5***to \n\n\ndelete***Sheet2***\n\n\n\n\n\n\n\n**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. \n\n**For Your Reference…**\nTo***insert***a***new worksheet***into a***workbook***: \n\n Click on the***New Sheet***icon to the right of \nthe worksheet tabs \n\nTo***delete***a***worksheet***from a***workbook***: \n\n Right click on the worksheet tab, then select \n**Delete**", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the previous*\n***e***\n*file with this exercise, or*\n*open the file E1324*\n*Worksheet*\n*Techniques_8.xlsx...*\n Click on the***Admin***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab, hold down \n, then click on the***Shop***\n\nworksheet tab to select the \nfirst three worksheets \n\n Click in cell***A1***to select the \n Click on the***HOME***tab, then \nclick on***Italics***in the***Font***\ngroup \n\n*This will italicise the text in*\n*cell A1 on this and all other*\n*worksheets in the group…*\n\n Click on the***Maintenance***\n\nworksheet tab, then the \n***Shop***worksheet tab to see \nthat the changes have been \napplied here \n\n Click on the***IT***worksheet \n\ntab to see that the changes \nhave*not*been applied to \nthis worksheet \n\n*Since this was not part of*\n*the grouped sheets the*\n*changes have not been*\n*applied here. Notice too that*\n*clicking on a tab deselects*\n*the previous grouping*\n\n\n\ncell \n\n\n\n\n\n\n\n**For Your Reference…**\nTo***group worksheet tabs***: \n\n1. Click on the first worksheet tab \n2. Hold down , then click on the last \n\nworksheet tab \n\n**Handy to Know…**\n To deselect a group, either click on the tab of \na worksheet that is not in the group, or right- \nclick on a tab and select**Ungroup Sheets**. \n\n Most formatting and text changes done on a \nworksheet in a group will be applied to other \nsheets in that grouping.", + "page_start": 14, + "page_end": 14, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**4** **2**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_6.xlsx...*\n Click on the***Maintenance***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab \n\n*We’ll copy this completed*\n*data to another workbook...*\n\n Right-click on the \n\nworksheet tab to display \nthe shortcut menu, then \nclick on***Move or Copy***to \ndisplay the***Move or Copy***\ndialog box \n\n Click on the drop arrow for \n***To book***, then select**(new**\n**book)**\n\n Click on***Create a copy***so \nit appears ticked \n\n*This will create a new*\n*workbook as well as*\n*making a copy of the*\n*worksheet...*\n\n Click on**[OK]**\n\n*A new workbook will be*\n*created and Maintenance*\n*will be the only worksheet*\n*in the workbook…*\n\n Save the new workbook as \n***Maintenance.xlsx***, then \nclose it \n\n\n\n\n\n\n\n**Handy to Know…**\n To copy a worksheet into an existing \n\nworkbook, make sure that you open the \ndestination workbook first to ensure that it is \nlisted in***To book***in the***Move or Copy***\ndialog box. \n\n**For Your Reference…**\nTo***copy***a***sheet***to***another workbook***: \n\n1. Right click on the worksheet tab, then click \non***Move or Copy***\n\n2. Select either***(new book)***or the name of \nanother workbook in***To book***\n\n3. Tick***Create a copy***, then click on**[OK]**", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_6.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the chart to \n\nselect it and display the \n***CHART TOOLS:DESIGN***\nand***CHART TOOLS:***\n***FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Move Chart***\nin the***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***New Sheet***, then \ntype**Revenue Chart**\n\n*This will become the*\n*sheet name for the*\n*chart…*\n\n Click on**[OK]**to move the \nembedded chart to its \nown sheet \n\n Click on the***Chart Data***\nworksheet tab to see the \ndata again \n\n*Notice that the chart is no*\n*longer embedded on this*\n*worksheet*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***create***a***chart sheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on***New Sheet***, type a name for the \nsheet and click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Keeping charts on their own sheets makes \nthem easier to work with as they do not \nobstruct the data.", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n To apply the same colour to two or more \n\nsheets at once, select them first. Hold down \n to select consecutive worksheets or \n to select non-consecutive \n\n\nhold down \nworksheets. \n\n**For Your Reference…**\nTo***change the colour***of a***worksheet tab***: \n\n1. Right-click on the worksheet tab to display \nthe shortcut menu \n\n2. Point to***Tab colour***to display a palette of \ncolour options \n\n3. Click on the desired colour", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "***Chart***worksheet tab \n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_11.xlsx...*\n Click on the***Revenue***\n Click on the***CHART***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***TOOLS: DESIGN***tab, \nthen click on the***Move***\n***Chart***tool in the \n***Location***group to \ndisplay the***Move Chart***\ndialog box \n\n Click on***Object in***, then \nclick on the drop arrow \nand click on***Sheet 2***\n\n Click on**[OK]**to move \nthe chart to the \nworksheet \n**5**\n\n Reposition the chart by \n\ndragging it to the top \nleft of the sheet, then \ndrag the resizing \nhandles to resize it as \nshown \n\n Click on the***Chart Data***\nworksheet tab \n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***embed***a***chart***in a***worksheet***: \n\n1. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Move Chart***in the***Location***\ngroup \n\n2. Click on the drop arrow, select the sheet to \nembed it into, then click on**[OK]**\n\n\n\n\n\n**Handy to Know…**\n Embedding is normally only done when it is \nnecessary to print the worksheet and the \ndata together.", + "page_start": 56, + "page_end": 56, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_7.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it and display \nthe chart commands on \nthe ribbon \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Change***\n***Chart Type***in the***Type***\ngroup to display the \n***Change Chart Type***\ndialog box \n\n Click on***3-D Column***, \n Click on**[OK]**to apply \n Click on the***Chart Data***\n\nas shown \n\nthe change to the chart \n\nworksheet tab to return \nto the worksheet \n\n\n\n\n\n\n\n\n\n **4**\n\n**Handy to Know…**\n You can use***Change Chart Type***in the \n***Type***group on the***CHART TOOLS:***\n***DESIGN***tab for either embedded charts or \ncharts that have their own worksheet tabs. \n\n**For Your Reference…**\nTo***change***the***chart type***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Change Chart Type***in the \n***Type***group \n\n3. Click on the desired chart and click on**[OK]**", + "page_start": 52, + "page_end": 52, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Figure 11-52 Renaming the selected FlashCopy mappings \n\n**Renaming a Consistency Group**\nTo rename a Consistency Group, complete the following steps: \n\n1. Open the Consistency Groups panel. \n\n2. Right-click the consistency group you want to rename and select**Rename**, as shown in \nFigure 11-53. \n\n3. Enter the new name that you want to assign to the Consistency Group and click**Rename**, \nas shown in Figure 11-54. \n\n**Note:**It is not possible to select multiple consistency groups to edit their names all at \nthe same time.", + "page_start": 512, + "page_end": 512, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "I want to freeze a pane in my Excel worksheet ", + "target_page": 16, + "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Try This Yourself:**\n\n*Continue using the previous file*\n*with this exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_11.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n\n\n\n\n***25***is below row***5***\n\n + \n\n\n\n Click on the***Maintenance***\nworksheet tab, then spend a few \nmoments examining the worksheet \n\n*Depending on your screen, it is*\n*possible that you won’t be able to*\n*see all of the figures on the screen*\n*at once...*\n\n Click in cell***B6***to select the cell \n Click on the***VIEW***tab, click on \n***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n*Thin black lines appear above and*\n*to the left of the selected cell. This*\n*indicates that the areas above and*\n*to the left are frozen...*\n\n Scroll to the right until***Yearly***\n***Average***in column***L***appears next \nto column***A***\n\n Scroll down until***Overheads***in row \n Press \n\n to move to cell \n***B6***– this is our temporary home \ncell, as the cells above and to the \nleft are frozen \n\n On the***VIEW***tab, click on***Freeze***\n\n***Panes***in the***Freeze Panes***group, \nthen click on***Unfreeze Panes***to \nunfreeze the rows and columns \n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***freeze panes***in a***worksheet***: \n\n1. Click in the cell below and to the right of the \narea you want to freeze/unfreeze \n\n2. Click on the***VIEW***tab \n3. Click on***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n**Handy to Know…**\n \n\nIf you want to freeze only the rows above the \nselected cell (leaving all columns unfrozen), \nselect the cell in column***A***of that row – e.g. \nto freeze rows***1***to***6***, click in cell***A7***. The \nsame applies to freezing only columns and \nleaving the rows unfrozen: select the cell in \nrow***1***.", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "press to clear it \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\nTo***copy***a***worksheet***: \n\n1. Right-click on the worksheet to copy, then \nselect***Move or Copy***\n\n2. Click on***Create a copy***so it appears ticked \n3. Click on**[OK]**\n\n**Handy to Know…**\n You can copy the current worksheet using \nthe***HOME***tab by clicking on***Format***in the \n***Cells***group, then clicking on***Move or Copy***\n***Sheet***. \n\n The***Before sheet***options in the***Move or***\n***Copy***dialog box allow you to position the \ncopied worksheet where you want.", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n To apply the same colour to two or more \n\nsheets at once, select them first. Hold down \n to select consecutive worksheets or \n to select non-consecutive \n\n\nhold down \nworksheets. \n\n**For Your Reference…**\nTo***change the colour***of a***worksheet tab***: \n\n1. Right-click on the worksheet tab to display \nthe shortcut menu \n\n2. Point to***Tab colour***to display a palette of \ncolour options \n\n3. Click on the desired colour", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Before starting this exercise*\n*you MUST open the file*\n*E1324 Worksheet*\n*Techniques_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Examine the workbook – it \ncurrently contains one \nworksheet named***Sheet1***\n\n Click on the***New Sheet***icon \nat the end of the worksheet \ntabs \n\n*A new worksheet named*\n*Sheet2 will be inserted. You*\n*can also use the keyboard*\n*shortcut...*\n\n Press + \nanother new worksheet \n\n to insert \n\n*This sheet is named Sheet3*\n*and is inserted before the*\n*currently selected sheet.*\n*Now let’s delete a sheet...*\n\n Right-click on the***Sheet3***\nworksheet tab to display the \nshortcut menu \n\n Select**Delete**to remove the \nworksheet \n\n*As the worksheet contains no*\n*data, the sheet will be*\n*deleted immediately. If a*\n*worksheet contains data,*\n*Excel will ask you to confirm*\n*your actions...*\n\n Repeat steps***4***and***5***to \n\n\ndelete***Sheet2***\n\n\n\n\n\n\n\n**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. \n\n**For Your Reference…**\nTo***insert***a***new worksheet***into a***workbook***: \n\n Click on the***New Sheet***icon to the right of \nthe worksheet tabs \n\nTo***delete***a***worksheet***from a***workbook***: \n\n Right click on the worksheet tab, then select \n**Delete**", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet \n\n\n\n\n\n\n\n**Handy to Know…**\n***Chart layouts***are predefined themes \n\ncreated by Microsoft. Even if you choose one \nof these layouts you can still make your own \nmodifications to the way the elements and \nobjects are positioned and how they appear. \n\n**For Your Reference…**\nTo***change***the***chart layout***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Quick Layout***in the***Chart***\n***Layouts***group \n\n3. Select the desired layout", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this*\n*exercise you MUST open*\n*the file E1317*\n*Charting_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A3***, hold down \n\n, then click in cell***G7***\nto select the range***A3:G7***\n\n*Note that we have*\n*selected the data*\n*including headings but*\n*excluding the totalling…*\n\n Click on the***INSERT***tab, \n\nthen click on***Insert***\n***Column Chart***in the \n***Charts***group to see a \ngallery of***Column***chart \ntypes \n\n Under***2-D Column***, click \non***Clustered Column***\n\n*The chart will be*\n*embedded in the*\n*worksheet. The chart will*\n*be active (selected) and*\n*you’ll see additional tabs*\n*on the ribbon for working*\n*with the chart…*\n\n Point to the chart, then \n\nclick to select it and drag \nthe chart so that it is \nunderneath the data, as \nshown \n\n Click in cell***A1***to deselect \n\n\nthe chart \n\n\n\n\n\n**Handy to Know…**\n When a chart gallery appears after you’ve \nused the***Insert chart***command, you can \npoint over each image in the gallery to see a \nLive Preview of the chart in the worksheet. \nThis will help you to select the right chart for \nyour needs. \n\n**For Your Reference…**\nTo***create a chart***from***scratch***: \n1. Select the range to chart \n2. Click on the***INSERT***tab, then click on the \nappropriate***Insert***command in the***Charts***\ngroup \n\n3. Click on the desired chart type", + "page_start": 46, + "page_end": 46, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the previous*\n***e***\n*file with this exercise, or*\n*open the file E1324*\n*Worksheet*\n*Techniques_8.xlsx...*\n Click on the***Admin***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab, hold down \n, then click on the***Shop***\n\nworksheet tab to select the \nfirst three worksheets \n\n Click in cell***A1***to select the \n Click on the***HOME***tab, then \nclick on***Italics***in the***Font***\ngroup \n\n*This will italicise the text in*\n*cell A1 on this and all other*\n*worksheets in the group…*\n\n Click on the***Maintenance***\n\nworksheet tab, then the \n***Shop***worksheet tab to see \nthat the changes have been \napplied here \n\n Click on the***IT***worksheet \n\ntab to see that the changes \nhave*not*been applied to \nthis worksheet \n\n*Since this was not part of*\n*the grouped sheets the*\n*changes have not been*\n*applied here. Notice too that*\n*clicking on a tab deselects*\n*the previous grouping*\n\n\n\ncell \n\n\n\n\n\n\n\n**For Your Reference…**\nTo***group worksheet tabs***: \n\n1. Click on the first worksheet tab \n2. Hold down , then click on the last \n\nworksheet tab \n\n**Handy to Know…**\n To deselect a group, either click on the tab of \na worksheet that is not in the group, or right- \nclick on a tab and select**Ungroup Sheets**. \n\n Most formatting and text changes done on a \nworksheet in a group will be applied to other \nsheets in that grouping.", + "page_start": 14, + "page_end": 14, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_12.xlsx...*\n Click on***Sheet 2***to \n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nsee the chart in the \nworksheet, then click \non the chart to select it \n\n Press \n to delete \nthe chart \n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n Because it is so easy to delete a chart object \n\nit is also easy to delete it by accident! \nRemember, you can use the***Undo***feature in \nExcel to restore accidental deletions. \n\n**For Your Reference…**\nTo***delete***a***chart***: \n\n1. Click on the worksheet to see the chart, then \nclick on the chart to select it \n\n\n2. Press", + "page_start": 57, + "page_end": 57, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "tool to roll up the wizard, \n\n\n\n\n**6** to complete the \n\n\n\n\n\n**=MIN(B9,B14,B19,B24)**\n\n\n to complete the \n\n\n\n**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or*\n*open the file E710*\n*Formulas_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on***B31***then click on \n\nthe***Insert Function***tool \nto display the***Insert***\n***Function***dialog box \n\n Click on the drop arrow \n\nfor the***Or select a category***\nbox and click on***Statistical***\n\n Scroll down and click on***MIN***\n\nin***Select a function***then \nclick on**[OK]**to display the \n***Function Arguments***dialog \nbox \n\n Click on the***Range Selector***\n\nthen hold down \nselect the following ranges: \n\n and \n\n**B6:B8**\n**B11:B13** **B16:B18**\n**B21:B23**\n\n Press \n\nrange specifications, then \nclick on**[OK]**to complete the \nprocess \n\n*Let’s simply type the function*\n*this time…*\n\n Click on***B36***and type \n Press formula \n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n You might use a***Minimum***function in real \n\nlife to find the lowest value in a large range of \nnumbers. For example, in a large inventory it \ncan be used to work out which product is the \nslowest seller. \n\n**For Your Reference…**\nTo***insert***a***minimum function***: \n\n1. Click in the cell then click on the***Insert***\n\n***Function***tool \n\n2. Click on***MIN***in***Select a function***\n3. \nInsert the required ranges then click on \n**[OK]**", + "page_start": 32, + "page_end": 32, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "to make it the active object \n\n**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the border of the \n\nchart and click once to \nselect the chart as an \nobject \n\n*The border of the chart will*\n*thicken to indicate that the*\n*chart is selected, the*\n*range of data used for the*\n*chart will be coloured, the*\n*ribbon will show*\n*chart-specific tabs and*\n*commands, and additional*\n*tools will appear to the*\n*right of the chart…*\n\n Click on the chart***legend***\nto make it the active object \nin the chart \n\n Click on the**vertical axis**\n Click on the**horizontal**\n**axis**to make it the active \nobject \n\n Click on the border of the \n\nchart to make the overall \nchart the active object \nagain – notice that the \nrange of data has been \ncoloured again \n\n Click in cell***A1***to deselect \nthe chart \n**3**\n\n\n\n\n\n\n\n**Handy to Know…**\n Once an object is selected, be it a chart, a \n\nlegend on the chart, or the like, you can right- \nclick on the object to see a shortcut menu \nspecific to the selected object.", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What is the msodocexStructTypeArticle type value ?", + "target_page": 21, + "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "typedef struct_MsoDocexStructNode \n{ \n int idNode; \n MSODOCEXSTRUCTTYPE nodetype; \n WCHAR*pwchAltText; \n union \n { \n int iHeadingLevel; \n ULONG idPara; \n ULONG idDropCap; \n int iPage; \n WCHAR*pwchActualText; \n MSODOCEXLINEBREAKTYPE bt; \n int iListLevel; \n MSODOCEXLISTTYPE listType; \n ULONG idAtn; \n long cpLim; \n int shapeProperty; \n MsoDocexTableAttr tableAttr; \n WCHAR*idTableHeader; \n int iTargetParentId; \n }; \n} MSODOCEXSTRUCTNODE; \n\nThe**idNode**member specifies the ID of the node being passed in the call to \n\n**HrBeginStructNode**. This member may not have a value of**0**. A value of**-1**indicates that \n\nchild nodes do not use the*idNodeParent*parameter to specify this node as their parent. \n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple \n\nnodes can have an ID of**-1**. If the ID is not**-1**, the value is unique across the document. \n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted \n\ndifferently depending on the type of node: \n\n**iHeadingLevel**is the heading level for an msodocexStructTypeHeading. \n\n**idPara**is the paragraph id for a P, TOCI, or ListBody. \n\n**idDropCap**is the id of an msodocexStructTypeDropCap. \n\n**iPage**is the page number for an msodocexStructTypePage. \n\n**bt**is the line break type for an msodocexStructTypeTextLine. \n\n**iListLevel**is the list level for an msodocexStructTypeList or \n\nmsodocexStructTypeListItem. \n\n**listType**is the list type for an msodocexStructTypeListItem. \n\n**idAtn**is the id of an msodocexStructTypeAnnotationBegin or \n\nmsodocexStructTypeAnnotationEnd. \n\n**cpLim**is used to determine the nesting order of tables within tables for an \n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or \n\nmsodocexStructTypeListBody.", + "page_start": 8, + "page_end": 8, + "source_file": "office-pdf.pdf" + }, + { + "text": "**shapeProperty**is for a msodocexStructTypeFigure where the content is a shape, \n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY \n\nenumeration. \n\n**tableAttr**is the table cell attributes for a msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**idTableHeader**is the unique id for an msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**iTargetParentId**is the id of the node to reparent an msodocexStructTypeDiagram \n\nto. \n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexLineBreakTypeNormalNormal line break.
msodocexLineBreakTypeManualManual line break.
msodocexLineBreakTypeEOPEnd of paragraph.
\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexListTypeNoneNo bullets or numbering.
msodocexListTypeBulletDiscDisc - shaped bullets.
msodocexListTypeBulletCircleCircle - shaped bullets.
msodocexListTypeBulletSquareSquare - shaped bullets.
msodocexListTypeBulletDecimalDecimal numbering.
msodocexListTypeUpperRomanUppercase Roman numeral numbering.
msodocexListTypeLowerRomanLowercase Roman numberal numbering.
msodocexListTypeUpperAlphaUppercase alphabetic numbering.
msodocexListTypeLowerAlphaLowercase alphabetic numbering.
", + "page_start": 9, + "page_end": 9, + "source_file": "office-pdf.pdf" + }, + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataCreationDateThe creation date for the document.
msodocexMetadataModDateThe last - modified date for the document.
\n\nSYSTEMTIME st = { 0 }; \nWCHAR s[100]; \nFileTimeToSystemTime(pfiletime, &st); \nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\", st.wYear % 10000, \n st.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100, \n st.wSecond % 100);", + "page_start": 35, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeParaRTLAttrA block of text within an article with right - to - left layout.
msodocexStructTypeTableRTLAttrA block of text forming a table with right - to - left layout.
msodocexStructTypeHeadingRTLAttrA heading in the text with right - to - left layout.
msodocexStructTypeListItemRTLAttrA block of text forming a list item with right - to - left layout.
msodocexStructTypeParaUnannotatableAttrA block of text within an article that is not annotable.
msodocexStructTypeTHeadThe header row area in a table.
msodocexStructTypeTBodyThe body area in a table, i. e. the portion between the THead and TFoot.
msodocexStructTypeLabelA label.
msodocexStructTypeEquationAn equation.
msodocexStructTypeIntLinkNoteRefA footnote or endnote reference mark link.
msodocexStructTypeTFootThe footer row area in a table.
\n\n**fContentNode**Specifies whether a**DocExComment_EndStructNode**structure marks \n\nthe end of this structure node. If**fContentNode**is**true**, a \n\n**DocExComment_EndStructNode**structure closes off the content bounded by the node. \n\nIf this**fContentNode**has a**false**value, then the node does not bound any content. \n\nThe**fContentNode**member affects the interpretation of the parent ID value of \n\nsubsequent nodes. If**fContentNode**is**true**, nodes that are inserted between this \n\n**DocExComment_BeginStructNode**and a subsequent**DocExComment_EndStructNode**, \n\nand that have a parent ID of**-1**, are children of this node. However, if**fContentNode**is \n\n**true**, nodes inserted after this**DocExComment_BeginStructNode**, and that have a \n\nparent ID of**-1**, are not children of this node. They are children of the next-most-recently \n\nspecified node that has**fContentNode**equal to**false**. \n\nYou can nest document structure nodes to arbitrary depth. \n\n**cwchAltText**Specifies the number of Unicode characters in the block of alternate text \n\nthat follows the structure. This Unicode string specifies alternate text for the node (for \n\nexample, alternate text for an image).", + "page_start": 22, + "page_end": 22, + "source_file": "office-pdf.pdf" + }, + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA \n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataTitleThe title of the document.
msodocexMetadataAuthorThe author of the document
msodocexMetadataSubjectString that describes the subject matter of the document ( for example, business or science ).
msodocexMetadataKeywordsKeyword relevant to the document content.
msodocexMetadataCreatorThe creator of the document, possibly distinct from the author.
msodocexMetadataProducerThe producer of the document, possibly distinct from the author or creator.
msodocexMetadataCategoryString that describes the type of document ( for example, memo, article, or book ).
msodocexMetadataStatusStatus of the document. This field can reflect where the document is in the publication process ( for example, draft or final ).
msodocexMetadataCommentsMiscellaneous comments relevant to the document.
\n\nFor a given document, each metadata type can have only one string associated with it. \n\nSo, for example, if the document has multiple keywords, they are passed to the add-in \n\nas one concatenated string. \n\nThe*pwchValue*parameter specifies a Unicode string that contains the metadata itself. \n\nHow the add-in incorporates the text-string metadata into the exported document \n\ndepends on the implementation details of the export code and the type of fixed-format \n\nused in the exported document.", + "page_start": 34, + "page_end": 34, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeTOCA table of contents.
msodocexStructTypeTOCIAn item in a table of contents.
msodocexStructTypeExtLinkA link to an external resource.
msodocexStructTypeIntLinkA link to an internal resource.
msodocexStructTypeFootnoteA footnote.
msodocexStructTypeEndnoteAn endnote.
msodocexStructTypeTextboxA text box.
msodocexStructTypeHeaderA block of text forming a header.
msodocexStructTypeFooterA footer.
msodocexStructInlineShapeAn inline shape.
msodocexStructAnnotationAn annotation.
msodocexStructTypeSpanBlockA block of text.
msodocexStructTypeWorkbookA workbook.
msodocexStructTypeWorksheetA worksheet.
msodocexStructTypeMacrosheetA macrosheet.
msodocexStructTypeChartsheetA chartsheet.
msodocexStructTypeDialogsheetA dialogsheet.
msodocexStructTypeSlideA slide.
msodocexStructTypeChartA chart.
msodocexStructTypeDiagramA SmartArt diagram.
msodocexStructTypeBulletTextBuller text.
msodocexStructTypeTextLineA line of text.
msodocexStructTypeDropCapA drop cap.
msodocexStructTypeSectionA section.
msodocexStructTypeAnnotationBeginThe beginning of an annotation.
msodocexStructTypeAnnotationEndThe end of an annotation.
", + "page_start": 21, + "page_end": 21, + "source_file": "office-pdf.pdf" + }, + { + "text": "int idNode {}; \n WCHAR rgwchNodeText[cwchMaxNodeText]; \n int iDestPage {}; \n float dytfvDestPage {}; \n float dxtfvDestOffset {}; \n float dytfvDestOffset {}; \n} MSODOCEXOUTLINENODE; \n\nThe members of the**MSODOCEXOUTLINENODE**are described as follows: \n\n**idNode**The ID for the node. A value of**-1**indicates that this node cannot have \n\nchild nodes in the outline. Otherwise, this member has a value that is unique across \n\nthe document. \n\n**rgwchNodeText**A Unicode string that represents the title text for each node. This \n\ntext is not required to be unique across the outline. \n\n**iDestPage**The page number of the page that contains the destination location \n\nwithin the document. \n\n**dytfvDestPage**The height of the destination page in points. The offset specified \n\nby the**dytfvDestOffset**member is relative to the upper-left corner of the page. \n\nHowever, some fixed-format types use a coordinate system that is relative to the \n\nbottom-left corner of the page. For these types of documents, the page height is \n\nrequired to convert the offset. \n\n**dxtfvDestOffset**The horizontal offset of the destination location on the \n\ndestination page. \n\n**dytfvDestOffset**The vertical offset of the destination location on the destination \n\npage.", + "page_start": 33, + "page_end": 33, + "source_file": "office-pdf.pdf" + }, + { + "text": "typedef struct \n{ \n DWORD ident {}; \n DWORD iComment {}; \n COLORREF cmykAlt { 0 }; \n COLORREF rgbAlt { 0 }; \n float flTintMin {}; \n float flTintMax {}; \n char szSpotName[1]; \n} DocExComment_EPSColorSpotImage; \n\nThe members of the**DocExComment_EPSColorSpotImage**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSSpotImage. \n\n**cmykAlt**Specifies a CMYK color ID. \n\n**rgbAlt**Specifies an RGB color ID. \n\n**flTintMin**Specifies the minimum tint. \n\n**flTintMax**Specifies the maximum tint. \n\n**szSpotName[1]**Specifies a variable length, zero-terminated string that contains \n\nthe spot name. \n\n**Extended Color Support**\n\nTo support extended color spaces in Publisher, additional EMF semantic records and \n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors. \n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, \n\nwhich are commonly used in commercial printing. \n\nPublisher uses color mapping to represent extended colors in the document EMF. \n\nPublisher builds a color table for all colors used in the document and replaces actual \n\ncolors with color IDs in the EMF. The type for the color ID is**COLORREF**, which is the", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColor**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSColor. \n\n**colorInfo[]**Specifies the color information for the EPS file. The add-in should pass \n\nthis information to Publisher using the**IMsoDocExporterSite::SetEPSInfo**method. \n\n**DocExComment_EPSColorCMYKJPEG**\n\nThe**DocExComment_EPSColorCMYKJPEG**structure specifies the start, in the EMF, of a \n\nbinary object that is a CMYKJPEG file stream. For more information about this structure, \n\nsee the section Extended Color Support. \n\nThe members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG;", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "struct DocExComment_InternalHyperlink \n{ \n DWORD ident {}; \n DWORD iComment {}; \n union \n { \n RECT rcdvRegion; \n struct \n { \n float xLeft; \n float yTop; \n float dxWidth; \n float dyHeight; \n } rctfvRegion; \n }; \n DWORD iTargetPage {}; \n float xtfvTarget {}; \n float ytfvTarget {}; \n float dytfTargetPage {}; \n}; \n\nThe members of**DocExComment_InternalHyperlink(Rctfv)**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentInternalHyperlink or msodocexcommentInternalHyperlinkRctfv. \n\n**rcdvRegion**and**rctfvRegion**As with the**DocExComment_ExternalHyperlink**\n\nstructure, this member is a union that specifies the region of the page that is the \n\nsource location of the hyperlink. The region can be represented as a RECT type \n\n(rcdvRegion) that uses device pixels as the unit of measure, or as a structure that \n\ncontains floating-point coordinates (rctfvRegion), in which case the unit of \n\nmeasure is points. \n\nIf the**iComment**member is equal to msodocexcommentInternalHyperlink, the \n\nadd-in should use**rcdvRegion**. In this case, the add-in needs to apply the current \n\nEMF transformation matrix to**rcdvRegion**to convert it to the page space. \n\nIf the**iComment**member is equal to msodocexcommentInternalHyperlinkRctfv, \n\nthe add-in should use**rctfvRegion**. In this case,**rctfvRegion**is already in the page", + "page_start": 16, + "page_end": 16, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are vector colors ?", + "target_page": 29, + "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "**Non-Recolored Images**\n\nEMF supports CMYK*images*using GDI+. Therefore, images in the EMF may be either \n\nRGB or CMYK. If the image is a CMYK image, the add-in needs to convert the image to \n\nthe target color space. \n\nPublisher maintains a target color space for the document. The add-in can use this \n\ntarget color space by calling the**IMsoDocExporterSite::HrConvertImageColorSpace**\n\nmethod with the image's color space. \n\n**Color from EPS Files**\n\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces. \n\nUser who embed EPS images in a Publisher document expect the color information to \n\nbe used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with \n\nEPS-related semantic records. This EMF is then embedded in the page EMF file that the \n\napplication passes to the add-in. \n\nTo support color in EPS files, the add-in needs to do the following: \n\nCall the**IMsoDocExporterSite::SetEPSInfo**method for**DocExComment_EPSColor**\n\nrecords encountered in the EMF. \n\nExtract the CMYK image from the**DocExComment_EPSColorCMYKJPEG**record in \n\nthe EMF. This record contains a binary object that is the actual CMYK JPEG file \n\nstream. Use it to replace the RGB image specified in the subsequent call to the \n\n**StretchDIBits**function. \n\nThe**DocExComment_EPSColorSpotImage**record provides spot color information \n\nfor the subsequent RGB image, which is always an index image. The add-in needs \n\nto convert the spot image to the target color space. \n\nThe add-in can optionally call the**IMsoDocExporterSite:: HrGetSpotRecolorInfo**\n\nmethod to obtain the document's target color from Publisher. Then the add-in can \n\nrecolor the subsequent RGB image by mapping colors from the palette of the RGB \n\nimage to**flTintMin**and**flTintMax**tints specified in the \n\n**DoxExComment_EPSColorSpotImage**record. The luminosity for each color of the \n\npalette is used for the mapping.", + "page_start": 29, + "page_end": 29, + "source_file": "office-pdf.pdf" + }, + { + "text": "typedef struct \n{ \n DWORD ident {}; \n DWORD iComment {}; \n COLORREF cmykAlt { 0 }; \n COLORREF rgbAlt { 0 }; \n float flTintMin {}; \n float flTintMax {}; \n char szSpotName[1]; \n} DocExComment_EPSColorSpotImage; \n\nThe members of the**DocExComment_EPSColorSpotImage**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSSpotImage. \n\n**cmykAlt**Specifies a CMYK color ID. \n\n**rgbAlt**Specifies an RGB color ID. \n\n**flTintMin**Specifies the minimum tint. \n\n**flTintMax**Specifies the maximum tint. \n\n**szSpotName[1]**Specifies a variable length, zero-terminated string that contains \n\nthe spot name. \n\n**Extended Color Support**\n\nTo support extended color spaces in Publisher, additional EMF semantic records and \n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors. \n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, \n\nwhich are commonly used in commercial printing. \n\nPublisher uses color mapping to represent extended colors in the document EMF. \n\nPublisher builds a color table for all colors used in the document and replaces actual \n\ncolors with color IDs in the EMF. The type for the color ID is**COLORREF**, which is the", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my \n\nfilm leads to an effective 2d-like trend. Region ii) looks \nhowever more intriguing, and requires a more accurate \ndiscussion, which can benefit from a careful comparison \nof the behaviour of a given quantity in regions i) and ii). \n\n0 \n7 0 1 2 3 4 \n\n6 \n*l*\n\n8 9 10 11 12 5 \n\nFIG. 9: ∆ϕl for a BCT lattice and n = 12, when the six \ncoupling constants set employed in Ref. 14,15 (see text) is \nused. The temperature range has been chosen around TC(n) \n(error bars lye within point size). \n\nFor this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. \n\nIn a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- \n\ngled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColor**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSColor. \n\n**colorInfo[]**Specifies the color information for the EPS file. The add-in should pass \n\nthis information to Publisher using the**IMsoDocExporterSite::SetEPSInfo**method. \n\n**DocExComment_EPSColorCMYKJPEG**\n\nThe**DocExComment_EPSColorCMYKJPEG**structure specifies the start, in the EMF, of a \n\nbinary object that is a CMYKJPEG file stream. For more information about this structure, \n\nsee the section Extended Color Support. \n\nThe members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG;", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "**Figure 6.**Chain traces. Each color signifies an individual chain. \n\n**Figure 7.**Posterior estimates of the*α*parameter plotted against the prior for two synthetic subjects, \none from each group. \n(cid:7) (cid:4) \n\n# Sample from the model prior \nprior_chains = sample ( model , Prior (), 1000 ) \n# Rename parameters from the prior chains to match the posterior chains \nrenamed_prior_chains = rename_chains ( prior_chains , model ) \n\n# Plot the posterior and prior for the first subject \nplot_parameters ( renamed_prior_chains [: ,1 :1 ,: ], renamed_posterior_chains [:,1:1,:]) \n# Visualize the true alpha value \nvline !([ data [1,: Alpha ]] , line =: dash , color = : darkorange2 , label = \" Generative Alpha \" ) \n\n# Plot the posterior and prior for the last subject \nplot_parameters ( renamed_prior_chains [: , 10 : 10 ,: ], renamed_posterior_chains [:, 10 : 10 ,: ]) \n# Visualize the true alpha value \nvline !([ data [ 3000 ,: Alpha ]], line = : dash , color = : darkorange2 , label = \" Generative Alpha \") \n(cid:6) (cid:5) \n\nWe then, as is often the case in computational psychiatry, wanted to compare the \ndistributions of parameter values between the two groups. We extracted the median of the \nestimated posteriors for each subject and plotted them against the value used to generate", + "page_start": 26, + "page_end": 26, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Interceolor IDs in the EMF back to the extend color space, the add - in calls back to isher through the HrResolveColor method of the IMooDocExporterSite interface.add - in passes Publisher an interface pointer to an IDOCEXCOLOR interface as one
No parameters to HrResolveColor. Publisher takes the color IDs, also specified in theHrResolveColor, converts them to extended color ( RGB, CMYK, or spot color ), and
them back to the add - in through the methods in the IDOCEXCOR interface.Table
ctor Color and Recolored Imagesor colors are any COLORREF values that the add - in receives from Publisher. For
nple, text color, line stroke color, and color for metafile recolor. When colorping is enabled, Publisher uses a color ID for COLDRREF rather than a real RGB
r value. If Publisher provides the add - in an IMsoDockporterSite interface pointeralling the SetDocExporterSite method of the IMsoDocExporter interface, the add - in
Jid always call the IMsoDocExporterSite :: HrResolveColor method to convert theORREF to an extended color, which the add - in receives through the methods in the
CEXCOLOR interventionLooport vector color mapping, the add - in needs to do the following :
Implement class support for an IDOCEXCDLOR interface. The methods in thisinterface enable Publisher to pass extended color back to the add - in.
Cache the following color state values from the semantic records in the EMF.Set foreground color for recoloring. This is set through the
DocExComment_Colorlnfo structure.Set background color for recoloring. This is set through the
DocExComment_ColorInfo structure.Determine when color mapping is enabled. This is set through the
DocExComment ColorEnable structure.For a vector color, create an IDOCEXCOLOR interface with the color ID, so that
IDOCEXCOLOR :: GetUnresolvedRGB returns the color ID. The add - in should call theIMsoDocExporterSite :: HrResolveColor method with the IDOCEXCOLOR interface
", + "page_start": 28, + "page_end": 28, + "source_file": "office-pdf.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults \n\n\n\n\n\n\n\n\n\n\n\n**Handy to Know…**\n To apply the same colour to two or more \n\nsheets at once, select them first. Hold down \n to select consecutive worksheets or \n to select non-consecutive \n\n\nhold down \nworksheets. \n\n**For Your Reference…**\nTo***change the colour***of a***worksheet tab***: \n\n1. Right-click on the worksheet tab to display \nthe shortcut menu \n\n2. Point to***Tab colour***to display a palette of \ncolour options \n\n3. Click on the desired colour", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "The cells in the grid have different colors.**White**grid cells denote that the user can enter data,**green**cells mean that \nthe data is automatically calculated by the NAIIS application,**light blue**cells signify that data are automatically \ncopied from a different node (for example in 1.B.1.a.1.i), and**yellow**cells mean that a default value (for example, \nfraction of carbon stored in reference approach) is provided. Where the cell is**grey,**no input is necessary. (figure 24) \n\nIn the energy sector, users are provided a dropdown list to select a unit in reporting the consumption and production \n\nof fuels. This is marked with . \n\n**4.4 Data input**\n\nData can be**entered**into the**white**grid cells only. It is also possible to**copy**and**paste**data from one cell to another \nby using the shortcut keys ‘**Ctrl + c**’ to copy and ‘**Ctrl + v**’ to paste.**Each value entered is automatically saved**. \nWhen the data is entered, it is first shown in bold, and then changes to normal font indicating that the value has been \nsaved.**Saving occurs immediately**(usually within 1 second), but in case the system becomes slower,**the user**\n**should wait until data are shown in regular font before exiting the grid**. Otherwise, the data entered will not be \nsaved. \n\nAs mentioned in the previous section, default values are provided for some parameters (yellow cells in the grid). \nThese values can be overwritten if the Party has more accurate data. \n\nNote: Data that has been entered will be automatically saved. \n\n**4.5 Add/delete new nodes – user defined source categories**\n\n**4.5.1 Add new nodes**\n\nNew nodes, for example, can be added to the navigation tree in order to add either a category, a fluorinated gas (F- \ngas), a fuel, a livestock type, or a subdivision in the LULUCF sector. \n\nUser-defined items can be added for: \n\n Categories indicated as “Other (please specify)” \n \n User-defined fuels \n\nLULUCF subdivision", + "page_start": 17, + "page_end": 17, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Silvia L Pintea, Jan C van Gemert, and Arnold WM Smeul- \nders. Déja vu: Motion prediction in static images. In \nComputer Vision–ECCV 2014: 13th European Conference, \nZurich, Switzerland, September 6-12, 2014, Proceedings, \nPart III 13, pages 172–187. Springer, 2014. \nWill Kay, Joao Carreira, Karen Simonyan, Brian Zhang, \nChloe Hillier, Sudheendra Vijayanarasimhan, Fabio Vi- \nola, Tim Green, Trevor Back, Paul Natsev, et al. The \nkinetics human action video dataset. \narXiv preprint \narXiv:1705.06950, 2017. \n\nAlec Radford, Jong Wook Kim, Chris Hallacy, Aditya \nRamesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, \nAmanda Askell, Pamela Mishkin, Jack Clark, et al. Learn- \ning transferable visual models from natural language su- \npervision. In International conference on machine learning, \npages 8748–8763. PMLR, 2021. \n\nChristoph Kayser, Wolfgang Einhäuser, Olaf Dümmer, Peter \nKönig, and Konrad Körding. Extracting slow subspaces \nfrom natural videos leads to complex cells. In Artificial \nNeural Networks—ICANN 2001: International Conference \nVienna, Austria, August 21–25, 2001 Proceedings 11, pages \n1075–1080. Springer, 2001. \n\nRajesh PN Rao and Dana H Ballard. Predictive coding \nin the visual cortex: a functional interpretation of some \nextra-classical receptive-field effects. Nature neuroscience, \n2(1):79–87, 1999. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nLearning representations for automatic colorization. 2016. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nColorization as a proxy task for visual understanding. 2017. \n\nOlga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, San- \njeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, \nAditya Khosla, Michael Bernstein, Alexander C. Berg, and", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are msodocexMetadataComments ?", + "target_page": 35, + "target_passage": "Miscellaneous comments relevant to the document.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA \n\nノ**Expand table**\n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataCreationDateThe creation date for the document.
msodocexMetadataModDateThe last - modified date for the document.
\n\nSYSTEMTIME st = { 0 }; \nWCHAR s[100]; \nFileTimeToSystemTime(pfiletime, &st); \nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\", st.wYear % 10000, \n st.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100, \n st.wSecond % 100);", + "page_start": 35, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA \n\n\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataTitleThe title of the document.
msodocexMetadataAuthorThe author of the document
msodocexMetadataSubjectString that describes the subject matter of the document ( for example, business or science ).
msodocexMetadataKeywordsKeyword relevant to the document content.
msodocexMetadataCreatorThe creator of the document, possibly distinct from the author.
msodocexMetadataProducerThe producer of the document, possibly distinct from the author or creator.
msodocexMetadataCategoryString that describes the type of document ( for example, memo, article, or book ).
msodocexMetadataStatusStatus of the document. This field can reflect where the document is in the publication process ( for example, draft or final ).
msodocexMetadataCommentsMiscellaneous comments relevant to the document.
\n\nFor a given document, each metadata type can have only one string associated with it. \n\nSo, for example, if the document has multiple keywords, they are passed to the add-in \n\nas one concatenated string. \n\nThe*pwchValue*parameter specifies a Unicode string that contains the metadata itself. \n\nHow the add-in incorporates the text-string metadata into the exported document \n\ndepends on the implementation details of the export code and the type of fixed-format \n\nused in the exported document.", + "page_start": 34, + "page_end": 34, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColor**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSColor. \n\n**colorInfo[]**Specifies the color information for the EPS file. The add-in should pass \n\nthis information to Publisher using the**IMsoDocExporterSite::SetEPSInfo**method. \n\n**DocExComment_EPSColorCMYKJPEG**\n\nThe**DocExComment_EPSColorCMYKJPEG**structure specifies the start, in the EMF, of a \n\nbinary object that is a CMYKJPEG file stream. For more information about this structure, \n\nsee the section Extended Color Support. \n\nThe members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG;", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. \n\n**DocExComment_BeginTextRun**\n\nThe**DocExComment_BeginTextRun**structure identifies the language of a sequence of \n\ntext in the document and provides the Unicode code points for the text. \n\nAlthough some text-rendering EMF records use Unicode as the text representation, \n\nothers use the glyphs that are drawn on the screen, rather than the original source text. \n\nA glyph is the index of a given shape in the font, which can be different from font to \n\nfont. \n\nThere can be cases where several Unicode code points are combined into a single glyph \n\nor where a single Unicode code point is broken into multiple glyphs. Because the \n\nmapping from code points to glyphs is context-dependent, a user cannot text search or \n\ncopy/paste in a document that contains only glyphs. Therefore, Publisher sometimes \n\nprovides the Unicode text as well as the glyphs.", + "page_start": 23, + "page_end": 23, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_BeginTextRun**structure are as follows: \n\n**Ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentBeginTextRun. \n\n**lcid**Specifies the LCID for the text sequence. \n\n**cGlyphIndex**Specifies the size of an array that follows this structure. This array \n\nimplements a glyph index table that maps Unicode code points in the actual text \n\nto the corresponding glyphs in the EMF. Each element of the array corresponds to \n\na code point in the text. The value of that element specifies the first glyph used to \n\nrender that code point in the EMF. Two or more adjacent code points may have the \n\nsame value in the array, which means that they both resolve to the same glyph. \n\nThe value can also be**0**, which means that this code point does not map to any \n\nglyph. \n\n**cwchActualText**Specifies the size of the sequence of Unicode code points that \n\nfollow the glyph index table. This is the text that a consumer of the document can \n\nuse for searching, copying/pasting, and accessibility. The value of this member can \n\nbe**0**, which means that no Unicode text is provided.", + "page_start": 24, + "page_end": 24, + "source_file": "office-pdf.pdf" + }, + { + "text": "**DocExComment_UnicodeForNextTextOut**\n\nThe**DocExComment_UnicodeForNextTextOut**structure functions similarly to the \n\n**DocExComment_BeginTextRun**and**DocExComment_EndTextRun**structures. However, \n\n**DocExComment_UnicodeForNextTextOut**specifies Unicode code points for only the \n\nfollowing EMF TextOut record, rather than for a block of EMF content bounded by begin \n\nand end structures. \n\nThe members of the**DocExComment_UnicodeForNextTextOut**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentUnicodeForNextTextOut. \n\n**cGlyphIndex**Specifies the size of an array that follows this structure. This array \n\nimplements a glyph index table that maps Unicode code points in the actual text \n\nto the corresponding glyphs in the EMF. Each element of the array corresponds to \n\na code point in the text. The value of that element specifies the first glyph used to \n\nrender that code point in the EMF. Two or more adjacent code points may have the \n\nsame value in the array, which means that they both resolve to the same glyph. \n\n**cwchActualText**Specifies the size of the sequence of Unicode code points that \n\nfollow the glyph index table. This is the text that a consumer of the document can \n\nuse for searching, copying/pasting, and accessibility.", + "page_start": 25, + "page_end": 25, + "source_file": "office-pdf.pdf" + }, + { + "text": "int idNode {}; \n WCHAR rgwchNodeText[cwchMaxNodeText]; \n int iDestPage {}; \n float dytfvDestPage {}; \n float dxtfvDestOffset {}; \n float dytfvDestOffset {}; \n} MSODOCEXOUTLINENODE; \n\nThe members of the**MSODOCEXOUTLINENODE**are described as follows: \n\n**idNode**The ID for the node. A value of**-1**indicates that this node cannot have \n\nchild nodes in the outline. Otherwise, this member has a value that is unique across \n\nthe document. \n\n**rgwchNodeText**A Unicode string that represents the title text for each node. This \n\ntext is not required to be unique across the outline. \n\n**iDestPage**The page number of the page that contains the destination location \n\nwithin the document. \n\n**dytfvDestPage**The height of the destination page in points. The offset specified \n\nby the**dytfvDestOffset**member is relative to the upper-left corner of the page. \n\nHowever, some fixed-format types use a coordinate system that is relative to the \n\nbottom-left corner of the page. For these types of documents, the page height is \n\nrequired to convert the offset. \n\n**dxtfvDestOffset**The horizontal offset of the destination location on the \n\ndestination page. \n\n**dytfvDestOffset**The vertical offset of the destination location on the destination \n\npage.", + "page_start": 33, + "page_end": 33, + "source_file": "office-pdf.pdf" + }, + { + "text": "typedef struct_MsoDocexStructNode \n{ \n int idNode; \n MSODOCEXSTRUCTTYPE nodetype; \n WCHAR*pwchAltText; \n union \n { \n int iHeadingLevel; \n ULONG idPara; \n ULONG idDropCap; \n int iPage; \n WCHAR*pwchActualText; \n MSODOCEXLINEBREAKTYPE bt; \n int iListLevel; \n MSODOCEXLISTTYPE listType; \n ULONG idAtn; \n long cpLim; \n int shapeProperty; \n MsoDocexTableAttr tableAttr; \n WCHAR*idTableHeader; \n int iTargetParentId; \n }; \n} MSODOCEXSTRUCTNODE; \n\nThe**idNode**member specifies the ID of the node being passed in the call to \n\n**HrBeginStructNode**. This member may not have a value of**0**. A value of**-1**indicates that \n\nchild nodes do not use the*idNodeParent*parameter to specify this node as their parent. \n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple \n\nnodes can have an ID of**-1**. If the ID is not**-1**, the value is unique across the document. \n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted \n\ndifferently depending on the type of node: \n\n**iHeadingLevel**is the heading level for an msodocexStructTypeHeading. \n\n**idPara**is the paragraph id for a P, TOCI, or ListBody. \n\n**idDropCap**is the id of an msodocexStructTypeDropCap. \n\n**iPage**is the page number for an msodocexStructTypePage. \n\n**bt**is the line break type for an msodocexStructTypeTextLine. \n\n**iListLevel**is the list level for an msodocexStructTypeList or \n\nmsodocexStructTypeListItem. \n\n**listType**is the list type for an msodocexStructTypeListItem. \n\n**idAtn**is the id of an msodocexStructTypeAnnotationBegin or \n\nmsodocexStructTypeAnnotationEnd. \n\n**cpLim**is used to determine the nesting order of tables within tables for an \n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or \n\nmsodocexStructTypeListBody.", + "page_start": 8, + "page_end": 8, + "source_file": "office-pdf.pdf" + }, + { + "text": "masters[ masters ]ms tnode01. doma1n. example. com# host group for etcd[ etcd ]ms tnode01. doma1n. example. com[ nodes ]rs1 : nodelTL. doma1n. examp1e. com opens31112_node_group_name = ' node = conf1g - mas1er - 1n7ra '", + "page_start": 142, + "page_end": 142, + "source_file": "sg248459.pdf" + }, + { + "text": "**3.6 Metadata Quality Assurance (MQA)**\n\nThe Metadata Quality Assurance is a component to monitor the quality of the metadata that is \nharvested from other portals or stored manually with the EDP metadata creation form. Currently \nquality measurement is based on metadata schema violation against DCAT-AP 1.1 and availability of \nthe distributions of a dataset. The MQA is running checks on a weekly basis. Each check has a \nduration of a couple of days. This is due to the HTTP GET requests against each single distribution in \nthe portal, checking their availability. \n\nIn addition to the navigation buttons in the dark blue bar at the top of the page, a drop down menu \nallows the downloading of a report file, in which all the data generated by the MQA is contained. The \nreport is available in various formats. The PDF report includes the charts displayed. \n\n**3.6.1 The Global Dashboard View**\n\nThis is the landing page of the MQA. It gives an overview of the quality situation across all catalogues, \ndatasets and distributions in the Portal. If the user wants to investigate the mentioned issues with \ndatasets or distributions in detail, he/she can use the catalogue selection menue on top of the page \nto navigate to the selected catalogue details page. \n\nAn information icon in the upper right corner is indicating that the user can get explanation texts for \nall diagrams on the page. The introduction text shows the planned schedule for the next check to be \nperformed by the MQA. The bottom of the page shows the date when the last check started. If the \nMQA is currently running a check, then a spinning wheel beside the last check date is indicating this.", + "page_start": 49, + "page_end": 49, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", + "target_page": 6, + "target_passage": "178,471,109", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. \n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents \ncontributions receivable from two grants, as well as contributions receivable from payment processors.", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**2024** **2023**\n\nNet assets without donor restrictions: \n\nSupport and revenue: \n\nContributions of cash and other financial assets \nContributions of nonfinancial assets and services \nForeign currency losses \nOther income, net \nInvestment income, net \nRelease of net assets with donor restrictions \n\n$ \n\n168,212,977 \n263,476 \n(300,907) \n5,629,773 \n5,096,842 \n6,481,350 164,121,185 \n1,040,453 \n(94,868) \n3,824,240 \n3,002,929 \n4,732,654 \n\nTotal support and revenue 185,383,511 176,626,593 \n\nOperating expenses: \n\nSalaries and benefits \nAwards and grants \nInternet hosting \nIn-kind service expenses \nDonation processing expenses \nProfessional service expenses \nOther operating expenses \nTravel and conferences \nDepreciation and amortization 106,793,960 \n26,820,080 \n3,116,445 \n263,476 \n7,547,718 \n13,090,040 \n10,798,140 \n5,824,979 \n4,216,271 101,305,706 \n24,433,682 \n3,120,819 \n1,040,453 \n6,855,680 \n15,464,635 \n7,393,982 \n4,878,359 \n4,602,064 \n\nTotal operating expenses \n\nChange in net assets without donor restrictions \n\nfrom operating activities \n\nNonoperating activities: \n\nUnrealized gains on investments, net \n\nChange in net assets without donor restrictions \n\nNet assets with donor restrictions: \n\nContributions with donor restrictions \nNet assets released from restrictions \n\nIncrease (decrease) in net assets with donor \n\nrestrictions \n\nIncrease in net assets \n\nNet assets at beginning of year \n\nNet assets at end of year", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. \n\n*Responsibilities of Management for the Consolidated Financial Statements*\n\nManagement is responsible for the preparation and fair presentation of the consolidated financial statements in \naccordance with U.S. generally accepted accounting principles, and for the design, implementation, and \nmaintenance of internal control relevant to the preparation and fair presentation of consolidated financial \nstatements that are free from material misstatement, whether due to fraud or error. \n\nIn preparing the consolidated financial statements, management is required to evaluate whether there are \nconditions or events, considered in the aggregate, that raise substantial doubt about the Foundation’s ability to \ncontinue as a going concern for one year after the date that the consolidated financial statements are available \nto be issued. \n\n*Auditors’ Responsibilities for the Audit of the Consolidated Financial Statements*\n\nOur objectives are to obtain reasonable assurance about whether the consolidated financial statements as a \nwhole are free from material misstatement, whether due to fraud or error, and to issue an auditors’ report that \nincludes our opinion. Reasonable assurance is a high level of assurance but is not absolute assurance and \ntherefore is not a guarantee that an audit conducted in accordance with GAAS will always detect a material \nmisstatement when it exists. The risk of not detecting a material misstatement resulting from fraud is higher \nthan for one resulting from error, as fraud may involve collusion, forgery, intentional omissions, \nmisrepresentations, or the override of internal control. Misstatements are considered material if there is a \nsubstantial likelihood that, individually or in the aggregate, they would influence the judgment made by a \nreasonable user based on the consolidated financial statements.", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What external events can affect Wikimedia Fundation in raising funds ?", + "target_page": 8, + "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. \n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable \nremaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on \ndaily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the \noption to extend the lease term for one additional period of five years. The Foundation determined during \nthe year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and \n$1,489,134 for the year ended June 30, 2024 and 2023, respectively. \n\nUndiscounted lease payments as of June 30, 2024 were as follows: \n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. \nEmployees are eligible to participate in the Plan upon employment. The Foundation matches employee \ncontributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation \ncontributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, \nrespectively.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. \n\n*Responsibilities of Management for the Consolidated Financial Statements*\n\nManagement is responsible for the preparation and fair presentation of the consolidated financial statements in \naccordance with U.S. generally accepted accounting principles, and for the design, implementation, and \nmaintenance of internal control relevant to the preparation and fair presentation of consolidated financial \nstatements that are free from material misstatement, whether due to fraud or error. \n\nIn preparing the consolidated financial statements, management is required to evaluate whether there are \nconditions or events, considered in the aggregate, that raise substantial doubt about the Foundation’s ability to \ncontinue as a going concern for one year after the date that the consolidated financial statements are available \nto be issued. \n\n*Auditors’ Responsibilities for the Audit of the Consolidated Financial Statements*\n\nOur objectives are to obtain reasonable assurance about whether the consolidated financial statements as a \nwhole are free from material misstatement, whether due to fraud or error, and to issue an auditors’ report that \nincludes our opinion. Reasonable assurance is a high level of assurance but is not absolute assurance and \ntherefore is not a guarantee that an audit conducted in accordance with GAAS will always detect a material \nmisstatement when it exists. The risk of not detecting a material misstatement resulting from fraud is higher \nthan for one resulting from error, as fraud may involve collusion, forgery, intentional omissions, \nmisrepresentations, or the override of internal control. Misstatements are considered material if there is a \nsubstantial likelihood that, individually or in the aggregate, they would influence the judgment made by a \nreasonable user based on the consolidated financial statements.", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. \n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents \ncontributions receivable from two grants, as well as contributions receivable from payment processors.", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation���s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above.", + "page_start": 16, + "page_end": 16, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What include Wikimedia Fundation restricted cash ?", + "target_page": 9, + "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net.", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. \n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTable18
", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. \n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
donor sigulations that limit the use of the donated assets or are restricted as to time. When a restriction expires. that is, when a sigulated time restriction ends or purpose restriction is explored, inel assets with donor restrictionssTherebutions of Nonfinancial Assets and Services
Items of nonfinancial assets and services include contributed services, as described below.Industed services are reported at lais value in the consolidated francial statements for voluntary forms of services when those services ( 1 ) create or enhance roofinancial assols, ( 2 ) require lacks provided by individuals possessinc
stantial number of volunteers make significant contributions of their time in the furtherance of the dation ’ s projects. The value of this contributed time is not reflected in the accompanying( fluid persistencia research and experimental not the consistablest sidements of advice consistents of advision of advision of advised intervisition of advision of advision of advised intervision of advisors and advisors and advict
Recognition – Contracts With CustomersFoundation recognizes reversue from contracts with customers related b Wkimedia, LLC under unting Standards Codification Topic B9, Revenue from Contracts with Customers, which illishes a principle that reversue is recognized uponz
\n\nThe Foundation determines the amount of revenue to be recognized through the application of the \nfollowing 5-step process: 1) identification of the contract, or contracts, with a customer; 2) identification \nof the performance obligations in the contract; 3) determination of the transaction price; 4) allocation of \nthe transaction price to the performance obligations in the contract; and 5) recognition of revenue when \nor as the Foundation satisfies the performance obligations.", + "page_start": 10, + "page_end": 10, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. \n\n*Responsibilities of Management for the Consolidated Financial Statements*\n\nManagement is responsible for the preparation and fair presentation of the consolidated financial statements in \naccordance with U.S. generally accepted accounting principles, and for the design, implementation, and \nmaintenance of internal control relevant to the preparation and fair presentation of consolidated financial \nstatements that are free from material misstatement, whether due to fraud or error. \n\nIn preparing the consolidated financial statements, management is required to evaluate whether there are \nconditions or events, considered in the aggregate, that raise substantial doubt about the Foundation’s ability to \ncontinue as a going concern for one year after the date that the consolidated financial statements are available \nto be issued. \n\n*Auditors’ Responsibilities for the Audit of the Consolidated Financial Statements*\n\nOur objectives are to obtain reasonable assurance about whether the consolidated financial statements as a \nwhole are free from material misstatement, whether due to fraud or error, and to issue an auditors’ report that \nincludes our opinion. Reasonable assurance is a high level of assurance but is not absolute assurance and \ntherefore is not a guarantee that an audit conducted in accordance with GAAS will always detect a material \nmisstatement when it exists. The risk of not detecting a material misstatement resulting from fraud is higher \nthan for one resulting from error, as fraud may involve collusion, forgery, intentional omissions, \nmisrepresentations, or the override of internal control. Misstatements are considered material if there is a \nsubstantial likelihood that, individually or in the aggregate, they would influence the judgment made by a \nreasonable user based on the consolidated financial statements.", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The fair value of assets that are legally restricted for purposes of settling Ñnal capping, closure and post- \nclosure obligations was approximately $7.5 million at December 31, 2004 and are included as restricted cash in \nthe Company's Consolidated Balance Sheets.", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "At December 31, 2004, the Company had $237.0 million of restricted cash deposits and $38.7 million of \nrestricted marketable securities held as Ñnancial guarantees, including $119.0 million of restricted cash held \nfor capital expenditures under certain debt facilities, and $34.3 million and $38.7 million of restricted cash and \nrestricted marketable securities, respectively, pledged to regulatory agencies and governmental entities as \nÑnancial guarantees of the Company's performance related to its Ñnal capping, closure and post-closure \nobligations at its landÑlls. The Company's restricted marketable securities consist of mutual funds invested in \nshort-term investment grade securities, including mortgage-backed securities and U.S. Government obliga- \ntions. These securities are available for sale and, as a result, are stated at fair value based upon quoted market", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "The re s e rve has remained frozen during the year as the laws in Hungary have now changed and no longer re q u i re this accounting. However, \nthe change in the law is not re t roactive and the historical re s e rve remains undistributable. \n\n**( 6 ) Restricted Cash**\n\nThe restricted cash balances as of December 31, 2000 and 1999, were as follows: \n\n\n \n \n \n \n [html]December 31,20001999( in thousomels )\n
NTM deposits871086.567
Deposits for financial instruments3.649
Other1.393713
82.103810.929
\n\nThe ATM deposit balances held are equivalent to the value of certain banks’ cash held in Euro n e t ’s ATM network. The Company also has \ndeposits with commercial banks to cover guarantees and deposits with customs officials to cover future charg e s .", + "page_start": 33, + "page_end": 33, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 8, + "target_passage": "£6.90", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. \n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. \n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency \nmeasure and no significant impact on business, charities or voluntary bodies is foreseen. \n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk. \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. \n\n**Day 8 tests: general test requirements**\n\n**8.**—(1) For the purposes of regulation 6(12)(b), a day 8 test complies with this paragraph \n\nwhere— \n\n(a) it is a test provided by a public provider; or \n(b) it is a test provided by a private provider— \n\n(i) in respect of— \n\n(aa) a non-Schedule 11 passenger, on or after 1st March 2021; \n(bb) a Schedule 11 passenger, on 1st or 2nd March 2021, \n\n(ii) where the test complies with sub-paragraph (2), and \n(iii) where the private provider complies with paragraph 9. \n\n(2) A test complies with this sub-paragraph where— \n\n(a) it is a semi-quantitative test for the detection of coronavirus which targets a minimum of \ntwo distinguishable SARS-CoV-2 genes other than the S gene and performance reference \ncontrols; \n\n(b) it is, in relation to a Schedule 11 passenger— \n\n(i) a test which requires laboratory processing, and \n(ii) a test which can be self-administered; \n\n(c) the manufacturer of any device used for the purposes of the test states that the device— \n\n(i) uses an extracted molecular method, \n(ii) has a specificity and a sensitivity greater than 95% (with a 95% two-sided \nconfidence interval entirely above 90%), and \n\n(iii) has a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per \n\nmillilitre; and \n\n(d) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, and \n(ii) has been validated no more than 18 months before the test is administered or \n\nprovided to P. \n\n(3) For the purposes of sub-paragraph (2) “validated”, in relation to a device, has the meaning \n\ngiven by paragraph 2(2) of Schedule 10. \n\n**Day 8 tests: private provider requirements**\n\n**9.**—(1) For the purposes of paragraph 8(1)(b)(iii), a private provider complies with this \n\nparagraph where— \n\n(a) they comply with the requirements of paragraph 3(1)(a) and (e) to (h) of Schedule 10 as if \nany reference in those provisions to an appropriate test were a reference to a day 8 test; \n(b) if the provider is a laboratory that conducts diagnostic test evaluation for testing in \naccordance with this Schedule, they have made a declaration to the Department of Health \nand Social Care that they meet the minimum standards for private sector-provided testing \nat https://support-covid-19-testing.dhsc.gov.uk/InternationalTesting; \n\n(c) they have provided the Department of Health and Social Care with a list of all \norganisations that they work with (whether by sub-contract or otherwise) to carry out the \ntesting service or to carry out genomic sequencing, indicating the nature of the service \nthat each organisation is providing and kept that list updated as appropriate; \n\n(d) in relation to a test which requires laboratory processing— \n\n(i) the person responsible for the taking of samples meets the relevant requirements for \naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the \ntaking of samples, and \n\n(ii) the laboratory used by the test provider for the processing of samples meets the \nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard \n17025 in respect of the processing of samples; \n\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to \nISO Standard 15189 and ISO standard 22870; \n\n(f)", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", + "page_start": 30, + "page_end": 30, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 1, + "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \n\n(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. \n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. \n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency \nmeasure and no significant impact on business, charities or voluntary bodies is foreseen. \n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk. \n\n© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. \n\n**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**18.**Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the \n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these \nRegulations. \n\n**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. \n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess \n\neducational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. \n\n**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]2021 No. 582PUBLIC HEALTH, ENGLANDThe Health Protection ( Coronavirus, International Travel and Operator Liability ) ( England ) Regulations 2021at 2.30 p. m. on 14th May 2021Coming into force-at 4.00 a. m. on 17th May 202132.33.4.5.6.7.8.91310.1711.1712.1913.\n
Made-
--
at 10.32 a. m. on 14th May 2021Laid before Parliament
-CONTENTS
PART 1Introductory1.Citation, commencement, extent and application
Interpretation and introduction of Schedules 1 to 4PART 2
Requirements on persons arriving in EnglandRequirement on passengers to provide information
5Requirement to possess notification of negative test result
6Requirements relating to tests
7Requirement to book and undertake tests
9Requirement to undertake workforce tests
10Test requirements : offshore installation workers
12Further requirements on arrivals from category 2 countries and territories
Further requirements on arrivals from category 3 countries or territoriesPART 3
EnforcementEnforcement of requirement to self - isolate
Power of entryPART 4
Requirements on operatorsPassenger information requirement
", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "The Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984(**a**). \n\nPART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. \n\n**Interpretation and introduction of Schedules 1 to 4**\n\n**2.**—(1) In these Regulations— \n\n“category 1 arrival” means person who has arrived in England from a category 1 country or \nterritory, and has not been in a category 2 country or territory or a category 3 country or \nterritory in the period beginning with the 10th day before the date of their arrival in England; \n\n“category 1 country or territory” means a country or territory, or part of a country or territory, \nspecified in Schedule 1(**b**); \n\n“category 2 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 2(**c**); \n\n“category 3 country or territory” means a country or territory or part of a country or territory \nspecified in Schedule 3(**d**); \n\n“child” means a person under the age of 18; \n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act \n1971(**e**); \n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be \ncaused by coronavirus); \n\n“designated port” means a port designated for the purposes of Schedule 11; \n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation \n2(1) of the Medical Devices Regulations 2002(**f**); \n\n“disability” has the meaning given in the Equality Act 2010(**g**) (see section 6 of, and Schedule \n1 to, that Act); \n\n“immigration officer” means a person appointed by the Secretary of State as an immigration \nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971(**h**); \n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11; \n\n“operator” except in regulation 18, means an operator of a relevant service; \n\n(**a**) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14). \n(**b**) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories. \n(**c**) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories. \n(**d**) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories. \n(**e**) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland \nare collectively referred to in that Act as “the common travel area”. \n\n(**f**) S.I. 2002/618. \n(**g**) 2010 c. 15. \n(**h**) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. \n1993/1813.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. \n\n**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. \n\nSCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 6 \n\nFinal provisions \n\n**Review of need for requirements**\n\n**24.**The Secretary of State must review the need for the requirements imposed by these \n\nRegulations by 14th June 2021 and at least once every 28 days thereafter. \n\n**Expiry of Regulations**\n\n**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", + "page_start": 30, + "page_end": 30, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "Who is Daniel Casali ?", + "target_page": 12, + "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "emanticscholar.org/CorpusID:4402158). \nCarnielli, Walter; Pizzi, Claudio (2008).*Modalities and Multimodalities*. Springer Science & \nBusiness Media. p. 3. ISBN 978-1-4020-8590-1.", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia1.pdf" + }, + { + "text": "[html]Group ( n = 33 )Drew RussellJamison SepelakCalvinSmith. Ir.Stere StapletonMarlena ferranaJoe TurpinMichael WattsLesley WilliansJake RussellEnriqueSepalvedaCandace : SmithAlbert 5tope It.Carlos femalesSkylerTsterNethan WattsUsa WilliomsJohn Russill Job Matters RussellScottSetzer Ronald SererCassidy Smith Charlie W. SmitJeshua Stapp fregory SterchFrederick Terrell Adam TerryRichantTuttle Zachary TwistLacy lifaugh leshso WaychMelissa Williams Michael WilliomsMafthex Russell Michelle RussellRonald Severin Ramon Sevilla 0rtizChorlie W. Smith Charlie W. Smith. ItGregony Storcher Brian Stark Jr.Adam ferry Jacob TerryLochory Twist David TyreeIrshse Waychoff Tony Waychoff. IrMiched Willioms Phillip IIIiliansRicky RisssellBerb Seston0.9 ± 0.9Chris SterkMelanic TerryBrooke UnruhIsan WeathertonRrd WillionsIohn - butanBen SestonClaude SmithMichael StarkeyRidx ThaderFelixUrbinaAudrey lifeaverSonji RIIIiiamsTong RutigliansJaceb SegmentCliften SmifhKevin Starks Jt.Brittany TromsMelissa VahlbergBrian WeaverTimothy WilliamsBritanni RufledgeLoriShabazianDaniel SmittJin Starr. Ir.Christopher ThomasEeorgi WajarovDerrick WeaverTyler WilliansMalignanciesLesShadelt.Dese : SmithJesen StathemDemmy ThornMax lingiesonDustin WeaverIlloye WilliersTyson RutiedgeRichant ShafeDasid M. SnittBrian StatlerJim ThomasFrank Van Alstyne IIIMatthea WeavesIIIalt WilloughbyTyson RutiedgeRichant ShafeDavid M. SnithBrian StatlerJim ThomasFrank Van Alstyne IIIMatthea WeavesIIIalt Willoughby0. hase RyanWednesday ShaferDeniceSmithEmerson3teeleJesh ThomasGeorge Van0eusePat WeaverBetino WillsDentis RyansBill ShafferElizabeth SmithMile SteeleKimberly ThomasCaleb Van DolahRess WearerAlanL WilsorDerek RylantEric ShofferGenrge SmithZachory StrellLeviThomasTom Ven RirkRathy ’ ReeksBrandon III - IsonJaine SaenzMichelle ShafferIvan SmithGary StephensisTodd ThomasDavid Wan WinkleCollin WisitedCandace WilsonJawer SaenzAndrew ShanklesJeffSmithLynnStephensTravis ThomasRisk - diseaseMarissa Weichbrodit0 Iff WilsonRJSaladinMatt ShandyJeffery N. SmithTasha StephensBen ThompsonMellisa Vasquez CancinoDan WeinmeisterCody IIIiIsonEdustrition SalderaKedy ShannonJensifer SmithTotal StephensonBraditionalDevid WasserLaurenWeirEric IIIIIsonRamses SalinasKenneth SharpJessica SmithCalvin StevensCameron ®. ThompssnRibert VaughnCody IllieisingesEmie WilsonTobie5alisburyTrentShamJetery Smith", + "page_start": 45, + "page_end": 45, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Nick Morgan, Daniel Heap, Amy Elliott, Tim Millar \n\n\n \n \n \n \n [html]\n
January 2016
", + "page_start": 0, + "page_end": 0, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "“Your company has undergone several defining moments throughout its history.” \n\nF \nrom its roots some 35 years ago with the opening \nof the International Hotel, we have played a \nleading role in continuously redefining the Las \n\nVegas experience. \n\nment will come in the months ahead, I am pleased to tell \nyou that we have secured the services of the internationally \nacclaimed architect Cesar Pelli to design our anchor resort \nat the heart of Project CityCenter. \n\nWe announced two significant initiatives in 2004 that, \ntaken together, give your company unrivaled momentum \nto set industry standards for creativity, performance and \nresponsibility for decades to come. Cesar Pelli & Associates has worked with corporate, \n\ngovernment and private clients to design major public \nspaces, museums, airports, research centers, performing arts \ncenters, academic buildings, hotels, office and residential \ntowers and mixed-use projects. \n\nand our plans to develop Project CityCenter on the Las \nVegas Strip are among the most significant announcements \nin Las Vegas history. As this fabled city begins its second \nhundred years, MGM MIRAGE is positioned like no other \ncompany to take advantage of unsurpassed growth oppor- \ntunities in the most dynamic gaming and entertainment \nmarket in the world. \n\nThe work of Cesar Pelli is not constrained by a personal \nstyle or a signature that would limit his architecture; instead, \nit celebrates the unique characteristics of each project. Using \nthis approach, he has designed several exceptional buildings \nin the United States and abroad. \n\n\n\n\n\n\n\n\n\n\n\n**BELLAGIO SPA TOWER**\nThe quintessential luxury \nhotel is now even more \nopulent. This expansion \nincludes 928 rooms and \nsuites, 80,000 square feet \nof convention space, retail \noutlets, and restaurants. \n\nWe are very excited about our partnership with Mr. \n\nPelli and his colleagues and believe they will deliver for \nMGM MIRAGE and the residents of Southern Nevada \na building of iconic stature around the world. \n**J. TERRENCE LANNI**Chairman & Chief Executive Officer \n\n**SHIBUYA**MGM GRAND \nDesigned by superstar team \nYabu Pushelberg, Shibuya \nfeatures stellar sushi and the \nwidest sake selection this \nside of the Pacific, all served \nin a sleek, airy ambiance. \n**CRAVINGS**THE MIRAGE \nThe zenith of all-you-can-eat. \nDesigned by Adam Tihany, Cravings \nboasts 11 cooking stations, a \nstreet of unique restaurants, \nand an array of temptations in \nwhat’s unquestionably the ultimate \nbuffet dining experience.", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "HowerdRyanLeeAllen J. Piller IIMicahAssulinJ. 0. BryartJeffComeliusJanxdEsparaLance HaffnerJasan HoweDave lenpoldGregPBBlerJensifor AtwellKala BuergerJustin - ComellJensthan EutherkLorny RagelbergRenneth Rubbard0 ndy lewisGregony MillerRoger AveritJoshuaBuieStere ComettGary EvansRobert HagerdonRactel frubbardFred LewisMattheve PillerDasid. RreryTodd BulesPreston - CorpJesty EvansWoyne HaireChenylHudeklames leftwefRonaldE. MillerEd BxxCliften BullardDiego CortezRicky EvansFredity HaleMark HughesRaren LilesToni MillicanMisty BasesBlair BuechMario CerfezRenald EvansRimRiltyRanholl RightsTime ( indleyAutrey MinbsTimeworkNikiBurchJanice - CoryLearn ErersBillyHallmanKirk HungerfordTrey LittauBenjamin MinerAllen BagleyRoger BurfordBob - CostelliRomie EzemackJehnRamiltorFrankie Hunt( harles livingsfonTeramePinkMichael BalrenbursDarrel BurghandtBobby CostellsRicky FarrisworthJey HamiltonBret HunterRosaldLoefflerDustin MintonRorald BaileyMicroscopyKody fostelloAndree FamisNethan RomiltTami Runter0ayton LengSantisge MinoridaButch BairdJohn Burkhouse IrLamy CostelloManie FarrisNathan HanksEbetidietBleningGeorge Moats. kCharles A. Baker........................................................................................................................................................................................................Stoney CestellsStrylo FostJseHamaLowd149ef1Teresalong", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "The film,*Le Roi Danse*(2000; translated:*The King Dances*), directed by Gérard Corbiau, reveals Louis through \nthe eyes of Jean-Baptiste Lully, his court musician. \nJulian Sands portrayed Louis in Roland Jaffe's*Vatel*(2000). \nAlan Rickman directed, co-wrote, and stars as Louis XIV in the film,*A Little Chaos*, which centres on construction \nin the gardens of Versaille, at the time immediately before and after the death of Queen Maria Theresa. \nThe 2016 film*The Death of Louis XIV*, directed by Albert Serra, is set during the last two weeks of Louis XIV's life \nbefore dying of gangrene, with the monarch played by Jean-Pierre Léaud. \n\n\n \n \n \n \n [html]\n
ConstructPPPPPPPTableTableMedAll....................................................................................................................................................................................................................................................
\n\n**Musicals**\n\n\n\n**Health and death**\n\nDespite the image of a healthy and virile king that Louis sought to project, evidence exists \nto suggest that his health was not very good. He had many ailments: for example, \nsymptoms of diabetes, as confirmed in reports of suppurating periostitis in 1678, dental \nabscesses in 1696, along with recurring boils, fainting spells, gout, dizziness, hot flushes, \nand headaches.", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "CarterDustin LockeTodd BlrightEvelyt - DanielMetas LikeStacy SlaterJulius Adamslee BradfordDenristemyGennge lomanUnnYreaseyRibbile DeanReroliflopezIslie SlafonRistrert AdemsEvereft BradleyDasid - ChisumClint LordLori ZangDavid Del. alJustinLucasClay SmithTony AdamRenny BraggMile ( hurchwellJecen LeversTableNerve [ nEarnanceMark SmithRisk - didingtonDavidBranhamTong ClarkJackLowry2004 ( bp )Kelly Dobbs.Lukelyons.Monte SmithOvista AdkinsDebraBranhanMichael 0intonSergio LujanGreg AdamsJethna DodsonStanles MejolewelSreedJamie AdkinsEail - BranhamKim LongsShane Lukasek InJustin AdamsKin DoughertsTara PlartinEail SpencerJeff A. AdjunsDel BrazealTomCorleySharoe LsttrellCarol MidleDustin DrewLok - MartinezRiskert Sperandioleft l. Adkins0risBrennanBriain L. losi. It.Mark MabetargetUtuck DuginskiImpelin MartinezAdria Spngler95ayme AdkinsJurgan BriniBryantoxAliMollettStephanic ATEPegji BlottBillM : BrayerTerry StaffnedNercy AguilerRonaldBrisencMichaelliramerJereny MarpleTimAndrewsBrian EllithorpJuten PloCartneyDaryl StallingsReford. AlcomBrent BromlowAnn - troenShelly RertinRinald BabersCarlos EvarsKelly : R < underline > Connell Sterc SteadhamBillarightDoeso BrownJarodCunninghamAlex McCalmostKristi BaconRebin EvantsDuane PkDowellJoe StewartGroup AllenRichard BrownWendy 0. inninghamDenielle Mi : KoyJeffrey BoileyShellaEvenMike MtGinnisPete Stewart0wJeillenRathyBodleyJohn D. DavisKeneth McGuire StBobby BakeRon EverettDoesaPkGriffDavid StoreErim AllenNichole BuersmeyerkedinessMenecoalMickoneJeffEelloriUbity ForeingNetalicMcNeiTravis StratSandy Alkanado", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "[html]MPLOYEESLindsay PalazzoloScsttRobinsonJustin E. SmithErin Leigh WalkerYemiAjiolaiyaMencedes BelesRichard - ChunleyJensenDobyJenie Polma Kurt PalmerPral Referreg Joel RodtiguedKede Smifh Michael C SmiNoeh Weller Christopher IIIallaceClinical RaymoRichontifielt faregibonmerTehn Churchwell Resa Cisseros0 - effy 0olinan DiaddromeRobertPalmer Jr Betty PaoliniMaria A. glodrigraez Robert RodriguezMichael E. Smith Mitzi SnithDonnic Illollis Matthew WalterAdrien. Alenic Israel Alaniz Jr.Testin ® end DustinBosmeBefh Clarifon Darin OantonIIIiliam Drinshoe III Michael DoxischCandy ParkerSarah RedrigaesMonte R. SmithMott WarrenLesnardo Alcantan - LopezlaredBerenMstt 0arkAdem DotsJulie Parker CarlaParrishJuanRodriguez - HuertakenessRusty Snith Brige SniderWill Warren Keith WyshingtonJehn Alcorta Depbie JillenRyan Bose Renald BowSteridan Dark Dusty - OayfonEary DriskellUmesh PatelBailey RiollineCtead SnowMatt Watkins *Rorsia AllerClayton - BowermanOvaries ClevengerJed DadleyMonth : PattersonDanielle RisperRichSnader JrDushy RistsonTurker AllenLesley Bowm( oltOiresmithTim DuganJohn PaulVinsonRoperPamSoltaniJames fillatsonJacob AllynMike BowndsThomas Clouette IIBuckOuncanMichael PayneGlennRrseAnnie5outherdUse WatsanAntiy AminChris BoydWoyne Cloufetlw : sh 0upuyDanielPeanceRictant RissBecky SoutherlandMatthew 8. WatsonJeff AmasDiarra BoydAndree CludiusBunky Dussetschleger it.Blain PearsonRobert RossPeteSpodeforeRrdWeafferbyBrc AntersRyle G. BradfrerdRyanCoalmerBrian DuvelKim PearsonGreg RossmanRo dreey SpencerLauren WebbCody AndersonCasey BradyTobie CoffeyLaurenDyeAriel Pene Danielle PeritandSceffRotrack LoniRowanLou Søitmegle Derek SpreierJobn Weber Jobn WebsterDusty Anderson Mariteth AndersonDenmy Bran Jordan BranDon - toger Stephanie CoilLeren Exsley litandall EasleyTerry PentweDesid RovelondStereStaffordBrad WechslerRisk AndersonEugene BronhamRyle ColdirenRess EasonJow PerezDanielRudeerCraig StaleyDonald WeedWayne AndersorJoe BrantamAdamColeDan EatonMarty PierceEric RuckerJacen StaleyJosty WeigherClerdo AndrewsErike BraverAshley toleInsephF. Eddy. Ir.James PineMichaelliushingDon Stanley Jr.Thoreas WeidnerStere ArcherDensis BreakfieldDustinColeGloto EdwardsMaft PinionDenaRussellRomnie StaffonMalt WeinreichKelby AmoldDerryl BrelondBritish ColemanIwonElderJeffPinterDonikusselliJetnn StephensJohn Weit J.Reger Amold XLance BrelandRibert T. ColemanJames Blard JrRogerPigpins.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "GlenesyinkelBrendo EuronRrwdy HownesJoeHooverJames JacksonTanner KanciliaFrank LaborWhitney LivelyRonnie GlenesyinkelBrendo EuronRrwdy HownesJoeHooverJames JacksonTanner KanciliaFrank LaborWhitney LivelyHenry GlensBarbara faskinStere HeardJon - frooverJasan JadisonisstifapctinsisGibraniaceyThonsasLlrydJeff5, GlennCarly GustatherBen RearnsbergerJeshaaHooverJeff JackssnChristopher Rapelccak< underline > Itrain Lacher JshnLoesel ’ ASally GlemGalen - fustavusRoxanne Heath *Jaine HopkinsJeffrey JadessJaobKapsonSethizadyShana ListasoScottGlennJimmy EastavisLee - Rebert IVJacem HogkinsJrefl. JadisonMark KarickhoffBrian LagemanSare LoftinWilbert Glower IIISteren GustavusTrey HebertKarenHoppeJesh JacksonRacteri RarkerSottlairReenan LohndingSpencer EeadInseph GathrieJeremy HerATemi ReferenceMichelle JackserRris KerresStephaniel. ambWesley Long IrAllisonGodieThoreas GuthrieKele HedrickTanser HomNathan JacksasStawn # areHarry LammyJames LoemisRyan GodderdInequtiemesLynn ReidebrechtMichael HornerRendy L. lacksonStankis : spskiWessley LamoreasxAlex UspezJon - foodsyJoseL. Gutiemw.Clay HellerWilliamHomerThoreas JadisonRyle KaukEvaniandersAlfredo Lopez. IrDenaGreLeopelitis - faitiementInnathan RemsleyChristopher HorrobyToby JadisonMick KeskJasen Landis", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "# dy longRirby MillerMatthew NeubertVenkatPokkuluriTyler EmrichMatt GrassmyerDean HigganbothamRon JuratovaDan - C. LopataMarianne MillerBenjamin NesillAngie PoolThomas ErpMikeGravesDuke HightowerAlex KarimJehm LorentzMile E. Miller SrColin - fliewhouse0 harles PoeleChistopher ExchesJames Grav XChristopher HBIClinical disasterJames LouisoSedrick Mille07Ryan fiewtorsRany PoolsJewon EsosberStonfordGray0. hase Hines< underline > Value 0wen - LrveTimMiller0nris / NictrolsTyPercheKeith EubanksTrey GraybillitiesEdgar HinojosMark KeitzFrancisco LozanoDamya MillsJonathanNic# anneth PorterDonEversLance - freenKerry HirsleyChoolKelleyPetre Locano0eRaren MillsLuke NichelsAdie PowellJacan EvenerMile GreenCory HisonJerdan KelleyThompsonRichard MinstewSean NictolsNathan PrewelLyric EwingWhit - yearAngi HodgeMott RemperBonnic LocasDenelle : MintoRennefh NickesonNotalie ProfileRichardFariesAllan GreenawaltSteeren HodgesJesh RendrickCody I. LucasTommy PlitchCassiefilemannChadPreston( hrisFeacell0ustin GreemeayJaine HodsonGregKennetyHervey Luces JtChris MitchelJasonNieavenhsisTerren PrestorZachary fegleyJosh - faelinerRussell L. HogueChenylKerrTylerizumpkinRandall MitchellJustinferman#, dePrestonAmy N. FerequencyLong - t GrimDustinHolbenJohn KiehlmeierBilluskRisk of difficultJames NovakJanes PriceRoenie fergusonBrian GrowBrandon HolleyJohn KilgalloDustin LynnJames ModeConnie NowellDefiney Prior", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "When does IBM close its acquisition of Red Hat ?", + "target_page": 20, + "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "This publication describes how Red Hat and IBM can advance your cloud journey and speed \ngrowth and innovation for your business by using Red Hat OpenShift on IBM Power Systems. \n\n**Note:**Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of \nRed Hat’s open source development heritage and unique development culture. Red Hat’s \nunwavering commitment to open source remains unchanged and it continues to offer \ncustomers choice and flexibility.", + "page_start": 20, + "page_end": 20, + "source_file": "sg248459.pdf" + }, + { + "text": "**First Edition (March 2020)**\n\nThis edition applies to: \n\n(cid:2) Red Hat OpenShift Container Platform for Power Enterprise V3.11 \n(cid:2) Red Hat Enterprise Linux Server release V7.6 (Maipo) for ppc64le \n(cid:2) IBM Virtual I/O Server V3.1.1.0 \n(cid:2) IBM Cloud PowerVC Manager V1.4.3.1 \n(cid:2) Terraform V0.12.9 \n(cid:2) provider.null V2.1.2 \n(cid:2) provider.openstack V1.22.0 \n\n**© Copyright International Business Machines Corporation 2020. All rights reserved.**\nNote to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule \nContract with IBM Corp.", + "page_start": 3, + "page_end": 3, + "source_file": "sg248459.pdf" + }, + { + "text": "**1.1 Introduction**\n\nMost companies started or are contemplating their journey to cloud. Although in recent years \nthe adoption of cloud became much more common place, the scope of what a cloud is or can \nbe also increased. This broadening of possibilities unfortunately added confusion and can \nresult in companies being unsure of how their existing application estate can change to \nintegrate with the cloud model. \n\nAs such, doubts still exist around how to start and progress on this journey. It is also true that \nalthough people understand traditional enterprise applications and more modern \ncloud-hosted applications, the integration or co-existence of both can prove equally confusing \nand contradicting. \n\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek \nto bring some clarity to the landscape while providing new modernization opportunities for \nexisting enterprise applications and familiar environments. \n\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat \nOpenShift, which is hosted on IBM Power Systems. Although individually much can be written \nabout either topic, the relationship this publication highlights is between Red Hat OpenShift \nand IBM Power Systems. \n\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically \ndiscuss how it can be deployed and added into existing familiar Power System environments, \nand the benefits that integration and co-existence can provide from an existing enterprise \napplication viewpoint. \n\nThis publication is a first volume in a planned multi-volume publication over the next 12 - 18 \nmonths. Within this initial volume, we explain the fundamental perspective (which is accurate \nas of the time of this writing) while providing pointers to future direction that will be discussed \nin future volumes. \n\n**Note:**This initial publication relates to Red Hat OpenShift 3.11, because this release was \nthe current OpenShift Container Platform (OCP) release for IBM Power Systems at the \ntime of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM \nPOWER® to accelerate agility for enterprise clients through integrated tooling and a \nfeature-rich Kubernetes container platform for cloud-native development on POWER9 and \nIBM POWER8® processor-based servers. \n\n**1.2 Red Hat and IBM**\n\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and \nopen source technology. \n\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid \ncloud for your business. By combining the power and flexibility of Red Hat’s open hybrid cloud \ntechnologies with the scale and depth of IBM innovation and industry expertise, you now have \nthe tools to accelerate your cloud journey. \n\nIBM and Red Hat worked together for more than 20 years in making open source a \ncompetitive advantage for businesses on x86, IBM Power Systems, and IBM z Systems®. \nTogether, we are both on a mission to improve open source technology and help your \ncompanies capture the business value of the cloud.", + "page_start": 19, + "page_end": 19, + "source_file": "sg248459.pdf" + }, + { + "text": "**Red Hat OpenShift and IBM Cloud**\n**Paks on IBM Power Systems**\n**Volume 1**\n\n\n \n \n \n \n [html]\n
Dino QuinteroSudipto Pal
Ricardo Dobelin BarrosBogdan Savu
Daniel CasaliRichard Wale
Luis Ferreira
Alain Fisher
Federico Fros
Luis Daniel Gonzalez
Miguel Gomez Gonzalez
Mahesh Gurugunti
Rogelio Rivera Gutierrez
Nicolas Joly
Boris Litichevsky
Ismael Solis Moreno
Gabriel Padilla
\n\n\n\n**Redbooks**", + "page_start": 0, + "page_end": 0, + "source_file": "sg248459.pdf" + }, + { + "text": "**IBM Redbooks**\n\nThe IBM Redbooks publication IBM PowerVM Best Practices, SG24-8062, provides more \ninformation about the topic in this document. Note that this publication might be available in \nsoftcopy only. \n\nYou can search for, view, download or order this documents and other Redbooks, Redpapers, \nWeb Docs, draft, and other materials, at the following website: \n\n**ibm.com**/redbooks \n\n**Online resources**\n\nThe following websites are also relevant as further information sources: \n\n(cid:2) Deploying Red Hat OpenShift Container Platform 3.11 on Red Hat OpenStack Platform 13 \n\nhttps://red.ht/2pEFNpV \n\n(cid:2) OpenShift on POWER \n\nhttps://red.ht/337zOIT \n\n(cid:2) Kubernetes concepts \n\nhttps://kubernetes.io/docs/concepts/services-networking/service/ \n\n(cid:2) IBM PowerVC \n\nhttps://www.ibm.com/us-en/marketplace/powervc \n\n(cid:2) Using PowerVC storage \n\nhttps://ibm.co/34Cko06 \n\n(cid:2) Red Hat OpenShift Container Platform 3.11 CLI Reference \n\nhttps://red.ht/2XZGBmz", + "page_start": 264, + "page_end": 264, + "source_file": "sg248459.pdf" + }, + { + "text": "**Blackiron Data (Blackiron)**\nOn April 17, 2013, we closed an agreement to acquire 100% of the \ncommon shares of Blackiron for cash consideration of $198 million. \nBlackiron provides Business Solutions the ability to enhance its suite of \nenterprise-level data centre and cloud computing services along with \nfibre-based network connectivity services. \n\nNOTE 7: BUSINESS COMBINATIONS \n\nWe made several acquisitions in 2013, which we describe below. We \naccounted for these using the acquisition method of accounting in \naccordance with IFRS 3, Business Combinations, and included the \nthe acquired entities from the dates of \nresults of operations of \nincome. Goodwill \nacquisition in our consolidated statements of \nrecognized on these acquisitions is not tax deductible. It represents the \nexpected operational synergies with the business acquired and/or \nintangible assets that do not qualify to be recognized separately. \n\n**Score Media Inc. (theScore)**\nOn April 30, 2013, we received final regulatory approval to acquire \ntheScore. We had already paid $167 million on October 19, 2012 to \nobtain 100% of the common shares of theScore. These shares were \nheld in trust until we received regulatory approval and obtained control \nof the business. The acquisition builds on our sports broadcasting \ncapabilities and reinforces our delivery of premium sports content to its \naudiences on their platform of choice. \n\n**Transactions with Shaw Communications Inc. (Shaw)**\nIn January 2013, we entered into an agreement with Shaw to secure an \noption to purchase Shaw’s Advanced Wireless Services (AWS) spectrum \nholdings in 2014, and to acquire Mountain Cable, Shaw’s cable system \nin Hamilton, Ontario. As part of the agreement, Shaw acquired our \none-third equity interest in TVtropolis. \n\nWe also paid deposits totalling $45 million in late 2013 related to the \nacquisition of certain dealer stores, which closed on January 2, 2014. \nThis deposit is included in other long-term assets (note 15). The fair \nvalues of the assets acquired and liabilities assumed in this acquisition is \nunder review and expected to be finalized in the first quarter of 2014. \n\n**Pivot Data Centres (Pivot)**\nOn October 1, 2013, we purchased 100% of the common shares of \nPivot for cash consideration of $158 million. Pivot further positions \nBusiness Solutions as a leader in Canadian data centre and hosting \nservices and will enhance Business Solutions’ ability to serve key markets \nwith enhanced managed and cloud service offering. \n\n*Spectrum Licence Option Deposit*\nIn 2013, we paid total deposits of $250 million for the option to \npurchase Shaw’s AWS spectrum holdings pending regulatory approval, \nand included the deposits in other long-term assets in the consolidated \nstatements of financial position. Under the agreement, $200 million of \nthis balance is refundable if the transaction does not close. We do not \nexpect to exercise the spectrum licence option until late 2014, and it is \nsubject to approval by Industry Canada. \n**Other**\nIn 2013, we completed other individually immaterial acquisitions for \ntotal cash consideration of $40 million. \n\n*Acquisition of Mountain Cable*\nOn May 1, 2013, we closed the agreement with Shaw to purchase \n100% of the common shares of Mountain Cable for cash consideration \nof $398 million. Mountain Cable delivers a full bundle of advanced \ncable television, \nits recently \nupgraded hybrid fibre and coaxial cable network. The acquisition \nexpands our cable business in the Southern Ontario area and will allow \nus to drive synergies through a larger service area and cost efficiencies. \n\nInternet and telephony services over \n\n*Sale of TVtropolis*\nIn 2013, we closed the transaction to sell our one-third interest in \nTVtropolis after obtaining regulatory approval from the CRTC. We \nreceived proceeds of $59 million and recorded a gain of $47 million in \nother income.", + "page_start": 107, + "page_end": 107, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Notices**\n\nThis information was developed for products and services offered in the U.S.A. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \n*IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.*\n\n**The following paragraph does not apply to the United Kingdom or any other country where such**\n**provisions are inconsistent with local law:**INTERNATIONAL BUSINESS MACHINES CORPORATION \nPROVIDES THIS PUBLICATION \"AS IS\" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR \nIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, \nMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of \nexpress or implied warranties in certain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you supply in any way it believes appropriate without incurring \nany obligation to you. \n\nAny performance data contained herein was determined in a controlled environment. Therefore, the results \nobtained in other operating environments may vary significantly. Some measurements may have been made \non development-level systems and there is no guarantee that these measurements will be the same on \ngenerally available systems. Furthermore, some measurements may have been estimated through \nextrapolation. Actual results may vary. Users of this document should verify the applicable data for their \nspecific environment. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to the names and addresses used by an actual business \nenterprise is entirely coincidental. \n\nCOPYRIGHT LICENSE:", + "page_start": 12, + "page_end": 12, + "source_file": "sg246915.pdf" + }, + { + "text": "**Notices**\n\nThis information was developed for products and services offered in the US. This material might be available \nfrom IBM in other languages. However, you may be required to own a copy of the product or product version in \nthat language in order to access it. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \nIBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US \n\nINTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” \nWITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED \nTO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A \nPARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in \ncertain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you provide in any way it believes appropriate without \nincurring any obligation to you. \n\nThe performance data and client examples cited are presented for illustrative purposes only. Actual \nperformance results may vary depending on specific configurations and operating conditions. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nStatements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and \nrepresent goals and objectives only. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to actual people or business enterprises is entirely \ncoincidental. \n\nCOPYRIGHT LICENSE:", + "page_start": 8, + "page_end": 8, + "source_file": "sg248459.pdf" + }, + { + "text": "**Notices**\n\nThis information was developed for products and services offered in the US. This material might be available \nfrom IBM in other languages. However, you may be required to own a copy of the product or product version in \nthat language in order to access it. \n\nIBM may not offer the products, services, or features discussed in this document in other countries. Consult \nyour local IBM representative for information on the products and services currently available in your area. Any \nreference to an IBM product, program, or service is not intended to state or imply that only that IBM product, \nprogram, or service may be used. Any functionally equivalent product, program, or service that does not \ninfringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to \nevaluate and verify the operation of any non-IBM product, program, or service. \n\nIBM may have patents or pending patent applications covering subject matter described in this document. The \nfurnishing of this document does not grant you any license to these patents. You can send license inquiries, in \nwriting, to: \nIBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US \n\nINTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” \nWITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED \nTO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A \nPARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in \ncertain transactions, therefore, this statement may not apply to you. \n\nThis information could include technical inaccuracies or typographical errors. Changes are periodically made \nto the information herein; these changes will be incorporated in new editions of the publication. IBM may make \nimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any time \nwithout notice. \n\nAny references in this information to non-IBM websites are provided for convenience only and do not in any \nmanner serve as an endorsement of those websites. The materials at those websites are not part of the \nmaterials for this IBM product and use of those websites is at your own risk. \n\nIBM may use or distribute any of the information you provide in any way it believes appropriate without \nincurring any obligation to you. \n\nThe performance data and client examples cited are presented for illustrative purposes only. Actual \nperformance results may vary depending on specific configurations and operating conditions. \n\nInformation concerning non-IBM products was obtained from the suppliers of those products, their published \nannouncements or other publicly available sources. IBM has not tested those products and cannot confirm the \naccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the \ncapabilities of non-IBM products should be addressed to the suppliers of those products. \n\nStatements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and \nrepresent goals and objectives only. \n\nThis information contains examples of data and reports used in daily business operations. To illustrate them \nas completely as possible, the examples include the names of individuals, companies, brands, and products. \nAll of these names are fictitious and any similarity to actual people or business enterprises is entirely \ncoincidental. \n\nCOPYRIGHT LICENSE:", + "page_start": 14, + "page_end": 14, + "source_file": "sg247938.pdf" + }, + { + "text": "**5.3 Red Hat OpenShift Container Platform 3.11 on IBM**\n**PowerVC**\n\nIn this section, we provide guidelines and considerations for deploying and managing Red \nHat OpenShift Container Platform on IBM Power Virtualization Center (PowerVC). \n\nRed Hat OpenShift Container Platform is a Platform-as-a-Service (PaaS) that provides \ndevelopers and IT organizations with a cloud application platform for deploying new \napplications on secure, scalable resources with minimal configuration and management \noverhead. It allows developers to create and deploy applications by delivering a consistent \nenvironment for both development and during the runtime lifecycle that requires no server \nmanagement. \n\nIBM PowerVC uses OpenStack technology to provide enterprise virtualization and cloud \nmanagement for IBM Power Systems, which provides all of the necessary capabilities for a \nfully featured Infrastructure-as-a-Service (IaaS) private cloud solution. \n\n**Note:**The minimum version for PowerVC is 1.4.3 Fix Pack 1. This version adds IBM \nPowerVC FlexVolume Driver support for OpenShift Container Platform 3.11. \n\n**5.3.1 Reference architecture summary**\n\nThe deployment of Red Hat OpenShift Container Platform on PowerVC varies among several \nfactors that affect the installation process. Consider the following questions: \n\n(cid:2) How many instances do you minimally require in the cluster? \n(cid:2) How to configure the PowerVC Host Groups and colocation rules? \n(cid:2) Is High Availability required? \n(cid:2) What installation tools will you use? \n(cid:2) Which storage and network backends will you use? \n\nFor this reference architecture, eight instances (VMs) were defined: six for the OpenShift \ncluster, one for the Load Balancer, and one for the Deployment Host. We tested on Single or \nDual Host Groups (Availability Zones) and soft-anti-affinity rules for OpenShift cluster \ninstances (VMs). \n\nThis reference architecture requires High Availability configuration (as described in “High \nAvailability” on page 84) and uses Ansible and IBM Terraform for installation and prerequisite \nchecks. \n\n**Note:**Terraform is not required to install OpenShift. Multiple approaches are available for \ndeploying infrastructure. In this book, we demonstrate how to use an infrastructure as code \nwith Terraform to simplify the deployment. The Terraform examples in this book are open \nsource and “use-at-your-own-risk” templates.", + "page_start": 94, + "page_end": 94, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "What does an ITMS service provide ?", + "target_page": 30, + "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**IT Service Management and orchestration**\nAn IT Service Management (ITSM) perspective can provide automation and a global \nmanagement view, and incorporate the necessary software disciplines that are required to \nbuild a solid infrastructure for an enterprise, commercial or not. \n\nThe missing point was the orchestration and the orchestration of all containers and resources \naround them. Many people think that orchestration and automation are the same thing, but \nthe orchestration is more complex. Automation often is discussed in the context of specific \ntasks, whereas orchestration refers to the automation of processes and workflows. \n\nOrchestration deals with the end-to-end process simplify the automation and the \nadministration across specific machines and diverse dependencies (see Figure 2-3). \nAutomation attempts to move people out of the equation whereas orchestration is not about \nrigid planning, but arranging and coordination of automated tasks, which ultimately results in \na consolidated process or workflow. Parts can be automated, but the decision is still \nhuman-centric; for example, the definition of which tasks must run, the order of the tasks, role \nassignments, permission, post-deployment, failure recovery, and scaling.", + "page_start": 29, + "page_end": 29, + "source_file": "sg248459.pdf" + }, + { + "text": "Use the management GUI to manage and service your system. Select**Monitoring**→**Events**\nto list events that should be addressed and maintenance procedures that walk you through \nthe process of correcting problems. Information in the Events window can be filtered in three \nways: \n\n(cid:2) Recommended Actions \n\nShows only the alerts that require attention. Alerts are listed in priority order and should be \nresolved sequentially by using the available fix procedures. For each problem that is \nselected, you can perform the following tasks: \n\n– Run a fix procedure \n– View the properties \n\n(cid:2) Unfixed Messages and Alerts \n\nDisplays only the alerts and messages that are not fixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties \n\n(cid:2) Show All \n\nDisplays all event types whether they are fixed or unfixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties \n\nSome events require a certain number of occurrences in 25 hours before they are displayed \nas unfixed. If they do not reach this threshold in 25 hours, they are flagged as*expired*. \nMonitoring events are below the coalesce threshold, and are usually transient. \n\n**Important:**The management GUI is the primary tool that is used to*operate*and*service*\nyour system. Real-time*monitoring*should be established by using SNMP traps, email \nnotifications, or syslog messaging on an automatic manner. \n\n**13.6.1 Managing event log**\n\nRegularly check the status of the system using the management GUI. If you suspect a \nproblem, first use the management GUI to diagnose and resolve the problem. \n\nUse the views that are available in the management GUI to verify the status of the system, the \nhardware devices, the physical storage, and the available volumes by completing the \nfollowing steps: \n1. Click**Monitoring**→**Events**to see all problems that exist on the system (see Figure 13-34 \non page 704).", + "page_start": 724, + "page_end": 724, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.1.3 Core Services**\n\nIBM Cloud Paks use a common set of operational services by default. These services are \ncalled Core Services (see Figure 3-3) and are a layer on top of Red Hat OpenShift, which is \nresponsible for security and identity services, logging, monitoring, and auditing. Core \nServices can easily monitor workload performance and general logs by using a consistent \ndashboard view, regardless of the IBM Cloud Pak. \n\n\n\nFigure 3-3 Core Services \n\nCore Services contain a collection of services that provides essential capabilities that are \nneeded by most enterprise applications. Red Hat tests and certifies each Core Service \ncomponent to provide the necessary updates and security fixes as needed. For more \ninformation, see the following web pages: \n\n(cid:2) Red Hat Middleware Core Services Collection datasheet \n(cid:2) IBM Cloud computing news: What are IBM Cloud Paks? \n\n**3.1.4 Production-ready Containers Images**\n\nContainers are the key for modular cloud solutions, which allows integrating multiple vendors \nby isolating pieces of software so they can run independently. All IBM container images that \nare provided in IBM Cloud Paks follow a set of well-defined best practices and guidelines, \nwhich ensures support for production use cases and consistency across the IBM software \nportfolio. \n\nIBM Cloud Paks employs Kubernetes resources to deploy, manage, and monitor the \nworkloads. Configurations are pre-built but easily customized by using the Kubernetes \noperators during deployment. Upgrades can be easily rolled out or rolled back. \n\n\n \n \n \n \n [html]\n
container c
Statistical
\n\n**41** Chapter 3. IBM Cloud Paks: Middleware anywhere", + "page_start": 56, + "page_end": 56, + "source_file": "sg248459.pdf" + }, + { + "text": "**Cloud engineering**\nIn the same line of ITSM, the application of an engineering approach on cloud infrastructures \nhelped the clients and system administrators to integrate better and manage their day-to-day \nbusiness. \n\nCloud engineering focuses on cloud services, such as SaaS, PaaS, and IaaS. It is a \nmultidisciplinary method that includes the foundation of cloud, implementation, cloud \ndevelopment-delivery lifecycle, and management. \n\nAn orchestrator normally includes a range of technologies, products, and components, as \nshown in Figure 2-4. \n\n\n\nFigure 2-4 Example of Orchestration Components \n\nThe following cloud engineering disciplines are addressed by an orchestrator: \n\n(cid:2) Platform management \n(cid:2) Virtualization services \n(cid:2) Authentication and authorization services \n(cid:2) Resources management \n(cid:2) Disaster recovery \n(cid:2) Workload resilience \n(cid:2) Monitoring, usage, and accounting \n(cid:2) Configuration services \n(cid:2) Application lifecycle \n(cid:2) Service automation \n(cid:2) Service catalog", + "page_start": 30, + "page_end": 30, + "source_file": "sg248459.pdf" + }, + { + "text": "**Chapter 17. Content Federation Services for**\n**Content Manager OnDemand and**\n**IBM Enterprise Records**\n\nIn this chapter, we describe how to enable records management for an IBM Content Manager \nOnDemand (Content Manager OnDemand) solution. By default, report and document \nexpiration are controlled by the storage managers that are integrated with Content Manager \nOnDemand. By using the storage managers, you can assign a retention period at data \ncapture time. IBM Enterprise Records enhances retention capabilities with the flexibility to \nassign event-based retention and make a report or document an official compliant record to \nmeet numerous government regulations. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Content Federation Services for Content Manager OnDemand and IBM Enterprise \nRecords overview \n\n(cid:2) Administration of Content Federation Services for Content Manager OnDemand for \nEnterprise Records \n\n(cid:2) Content Federation Services for Content Manager OnDemand architecture \n\n(cid:2) Deployment considerations", + "page_start": 388, + "page_end": 388, + "source_file": "sg246915.pdf" + }, + { + "text": "**17.2 Administration of Content Federation Services for Content**\n\n**Manager OnDemand for Enterprise Records**\n\nConfigure Content Manager OnDemand for Content Federation Services to declare records \nby using Enterprise Records. You must disable expiration processes by the storage manager \nso that it cannot expire data. You must also convert application groups with an expiration type \nof DOCUMENT, SEGMENT, or STORAGE MANAGER to an expiration type of LOAD. \n\nTo configure Content Federation Services for Content Manager OnDemand, you must \nperform the following tasks: \n\n(cid:2) Enable Content Federation Services for Content Manager OnDemand. \n\n(cid:2) Identify the application groups where Content Federation will be enabled. \n\n(cid:2) Specify the application group field. \n\n(cid:2) Enable Content Federation permissions for the application group. \n\n(cid:2) Federate document metadata to Content Federation Services for Content Manager \nOnDemand. \n\nThese items are discussed in more detail in the following sections. \n\n**17.2.1 Enabling Content Federation Services for Content Manager OnDemand**\n\nAll of the steps in this section assume that IBM FileNet P8 and FileNet Content Federation \nServices are installed correctly. \n\nIn this section, we describe the components in Content Manager OnDemand to enable the \nfederation capabilities to allow record declaration in Enterprise Records. We assume that you \nare familiar with Content Manager OnDemand administration, so detailed steps are not \nprovided in this chapter. \n\nFor more information about the installation and configuration of FileNet P8 and FileNet \nContent Federation Services, see*Federated Content Management: Accessing Content from*\n*Disparate Repositories with IBM Content Federation Services and IBM Content Integrator*, \nSG24-7742. \n\nTo use IBM FileNet P8 Content Federation Services for Content Manager OnDemand, you \nmust enable the feature in Content Manager OnDemand by modifying the ars.cfg file and \nadding the following line: \n\nARS_SUPPORT_CFSOD=1 \n\nIn Content Manager OnDemand for Windows, you can enable IBM FileNet P8 Content \nFederation Services for Content Manager OnDemand by using the Content Manager \nOnDemand Administrator Client Configurator. Figure 17-1 on page 368 shows the Content \nManager OnDemand configuration setup for Content Federation Services for Content \nManager OnDemand.", + "page_start": 390, + "page_end": 390, + "source_file": "sg246915.pdf" + }, + { + "text": "**Service IP information**\nTo view the Service IP information of your IBM Spectrum Virtualize, select**Settings**→ \n**Network**, as shown in Figure 5-56 on page 166. Click the**Service IP Address**option to view \nthe properties, as shown in Figure 5-58. \n\nFigure 5-58 Viewing service IP address \n\nThe service IP address is commonly used to provide access to the network interfaces on \neach individual node of the control enclosure. \n\nInstead of reaching the Management IP address, the service IP address directly connects to \neach individual node canister for service operations. You can select a node canister of the \ncontrol enclosure from the drop-down list and then click any of the ports that are shown in the \nGUI. The service IP address can be configure to support IPv4 or IPv6. \n\n**iSCSI information**\nFrom the iSCSI pane in the Settings menu, you can display and configure parameters for the \nsystem to connect to iSCSI-attached hosts, as shown in Figure 5-59 on page 168.", + "page_start": 188, + "page_end": 188, + "source_file": "sg247938.pdf" + }, + { + "text": "You can read high level explanations of the core services here, and an example of how they interact \n\nwithin the context of an example microservice, or you can choose to skip ahead to the hands on \n\nworkshop that uses three common services to build a working microservice.", + "page_start": 33, + "page_end": 33, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Copy services topology**\nOne or more clusters can participate in a copy services relationship. One typical and simple \nuse case is disaster recovery, where one site is active and another performs only a disaster \nrecovery function. In such a case, the solution topology is simple, with one cluster per site and \nuniform replication direction for all volumes. However, multiple other topologies are possible \nthat allow you to design a solution that optimally fits your set of requirements. For more \ninformation about examples of valid relationships between systems, search for “Metro Mirror \nand Global Mirror partnerships” at this IBM Knowledge Center web page. \n\n**Global Mirror versus Metro Mirror**\nDecide which type of copy service you are going use. This decision should be requirements \ndriven. Metro Mirror allows you to prevent any data loss during a system failure, but has more \nstringent requirements, especially regarding intercluster link bandwidth and latency, and \nremote site storage performance. Also, it incurs performance penalty because writes are not \nconfirmed to host until data reception confirmation is received from the remote site. \n\nBecause of finite data transfer speeds, this remote write penalty grows with the distance \nbetween the sites. A point-to-point dark fiber-based link typically incurs a round-trip latency of \n1 ms per 100 km (62.13 miles). Other technologies provide longer round-trip latencies. \nInter-site link latency defines the maximum distance for any performance level. \n\nGlobal Mirror allows you to relax constraints on system requirements at the cost of using \nasynchronous replication, which allows the remote site to lag behind the local site. Choice of \nthe replication type has major effects on all other aspects of the copy services planning. \n\nThe use of Global Mirror and Metro Mirror between the same two clustered systems is \nsupported. \n\nIf you plan to use copy services to realize some application function (for example, disaster \nrecovery orchestration software), review the requirements of the application you plan to use. \nVerify that the complete solution is going to fulfill supportability criteria of both IBM and the \napplication vendor. \n\n**Intercluster link**\nThe local and remote clusters can be connected by FC, FCoE, or IP network. The IP network \ncan be used as a carrier for FCoIP solution or as a native data carrier. \n\nEach of the technologies has its own requirements concerning supported distance, link \nspeeds, bandwidth, and vulnerability to frame or packet loss. For the most current information \nregarding requirements and limitations of each of supported technologies, see this website. \n\nThe two major parameters of a link are its bandwidth and latency. Latency might limit \nmaximum bandwidth available over IP links, depending on the details of the technology that is \nused. \n\nWhen planning the Intercluster link, consider the peak performance that is required. This \nconsideration is especially important for Metro Mirror configurations. \n\nWhen Metro Mirror or Global Mirror is used, a certain amount of bandwidth is required for the \nIBM Storwize V7000 intercluster heartbeat traffic. The amount of traffic depends on how \nmany nodes are in each of the two clustered systems.", + "page_start": 97, + "page_end": 97, + "source_file": "sg247938.pdf" + }, + { + "text": "**Kubernetes (also known as k8s or kube)**\nA container orchestration platform for scheduling and \nautomating the deployment, management, and scaling of \ncontainerized applications. \n\n**Load Balancer as a Service (LBaaS)**\nA service that provides the ability to distribute traffic \namong instances in a virtual private cloud. \n\n**Public cloud**\nA cloud computing environment on which access to \nstandardized resources, such as infrastructure, \nmulti-tenant hardware, and services, is available to \nsubscribers on a pay-per-use basis. \n\n**Registry**\nA public or private repository that contains images that are \nused to create containers. \n\n**Software as a Service (SaaS)**\nA model of software deployment whereby software, \nincluding business processes, enterprise applications, \nand collaboration tools, are provided as a service to \ncustomers through the cloud. \n\n\n \n \n \n \n [html]\n
improved latency and security.
Mobile Backend as a Service ( MBaaS )
A computing model that connects mobile applications to cloud computing services and provides features, such as user management, push notifications, and integration with social networks.
Mobile cloud
An infrastructure in which the storage and processing of data for applications is offoaded from a mobile device into the cloud.
Multicloud
A cloud adoption strategy that embraces a mix of cloud models ( qublic, dedicated, private, and managed ) to best meet unique business, application, and workload requirements.
Microservices
An application architectural style in which an application is composed of many discrete, network - connected components that are called microservices.
OCI container image
A container image that is compliant with the OCI Image Format Specification.
On - premises ( on - prem )
Software that is installed and run on the local computers of a user or organization.
Platform as a Service ( PaaS )
The delivery of a computing platform, including applications, optimized middleware, development tools, and runtime environments, in a cloud - based environment.
Pod
A group of containers that are running on a Kubemetes cluster. A pod is a unit of work that can be run, which can be a a stand - alone application or a set of microservices.
Private cloud
A cloud computing environment on which access is limited to members of an enterprise and partner networks.
", + "page_start": 263, + "page_end": 263, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What are the two distinct public domain tools support by Creative Commons ?", + "target_page": 1, + "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 \n\n*5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform \ncomputational analysis across millions of books. While it is not suited specifically for AI \ntraining, it is an existence proof for what such a resource might look like. \n\n For instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable \n30 \nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example, \ncopyright protection usually lasts over seventy years from the death of the author—so this type of \ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using \ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those \nmodels will have more limited utility on some dimensions than current frontier models trained on a \nbroader array of data. See Knibbs, Kate,*Here’s Proof You Can Train an AI Model Without Slurping*\n*Copyrighted Content | WIRED*. (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai- \nwithout-slurping-copyrighted-content/. \n\n Our workshop discussion did note that some widely available datasets for AI training have also \n31 \npursued more direct licensing agreements. For instance, the SILO LLM was created by working with \nscientific journal publishers to make works available for both download and AI training. While this might \nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing \nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO \nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.”*ArXiv (Cornell University)*, 8 Aug. \n2023, https://doi.org/10.48550/arxiv.2308.04430. Accessed 14 Dec. 2023.", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 \n\n**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate \n\n For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024.", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. \n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. \n\n This is an illustrative example, and there are also other projects of this ilk. For instance, see the \n\n27 \nCommon Corpus project, which includes an array of public domain books from a number of countries, \nat https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ \nstorytracer/internet_archive_books_en (“This dataset contains more than 650,000 English public domain \nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the \nOpen Library project.”) \n\n See Gao et al, supra note 8. \n28 \n\n Goldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and \n29 \n“Substantially Better.”*VentureBeat*, 11 Jan. 2024, venturebeat.com/ai/one-of-the-worlds-largest-ai- \ntraining-datasets-is-about-to-get-bigger-and-substantially-better/. Accessed 20 Mar. 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What is Creative Commons ?", + "target_page": 1, + "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**\n\nCreative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh \n\n**Board of Directors**\n\nMarta Belcher \nGlenn Otis Brown \nDelia Browne \nJames Grimmelmann \nLawrence Lessig**Emeritus* Angela Oduor Lungati \nBilal Randeree \nAlek Tarkowski \nJeni Tennison \nLuis Villa", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. \n\n**FOUR ELEMENTS**\n\n\n\n\n\n\n\n\n\nBY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. \n\n**SIX LICENSES**\n\n\n\ne \nz \ni \nl \n\n, \n\ne \nr \na \nh \ns \nn \na \nc \nu \no \ny \n\n& \n\na \nc \nr \ne \nm \nm \no \nc \n\ni \n, \n\nx \nm \ne \nr \n\ni \n\n\n\n\n\n\n\n\n\n\n\nCC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. \n\n**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. \n\nTexts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr.", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**A Note from Leadership**\n\n\n\n2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. \n\nWe also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. \n\n\n\n**Anna Tumadóttir, CEO**", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. \n\n**In 2023, we**\n**launched the Open**\n**Infrastructure Circle**\n**(OIC) to ensure**\n**consistent funding**\n**for this work.**\n\n\n\nWe’re grateful to the early \nsupporters of the OIC, \nincluding the William + Flora \nHewlett Foundation, Bill & \nMelinda Gates Foundation, \nFilecoin Foundation for the \nDecentralized Web, Robert \nWood Johnson Foundation, \nChan Zuckerberg Initiative, \nEndless, Siegel Family \nEndowment, Flickr, Microsoft, \nand Paul and Iris Brest.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs \nto be both responsibly managed, and useful for developers of AI models. \n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible, \nand thus obviates the need for each individual actor to acquire, digitize, and format their own \ncorpus of books for AI training. This resource could be collectively and intentionally \nmanaged, though we do not mean to select a particular form of governance in this paper. 4 \n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a \nbooks data commons as defined above and key questions relevant to developers, \nrepositories, and other stakeholders, building on our workshop discussions. We first explain \nwhy books matter for AI training and how broader access could be beneficial. We then \nsummarize two tracks that might be considered for developing such a resource, highlighting \nexisting projects that help foreground both the potential and challenges. Finally, we present \nseveral key design choices, and next steps that could advance further development of this \napproach. 5 \n\n In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. \n\n\n\n“The Pillars of Creation” by \nJames Webb Space Telescope \nis licensed under CC BY 2.0.", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. \n\nWorkshop participants discussed different types of opt-outs that could be built. For example, \nopt-outs could be thought of not in blanket terms, but only as applied to certain uses, for \nexample to commercial uses of the corpus, but not research uses. This could build on or \nmirror the approach that the EU has taken in its text and data mining exceptions to \ncopyright. \n Opt-outs might be more granular, by focusing on allowing or forbidding particular \nuses or other categories of users, given that rights holders have many different sets of \npreferences. \n\n38 \n\nAnother question is about*who*can opt-out particular works from the dataset. This could \nsolely be an option for copyright holders, although authors might be allowed to exercise an \nopt-out for their books even if they don’t hold the copyrights. This might create challenges if \nthe author and rightsholder disagree about whether to opt a particular book out of the \ncorpus. Another related issue is that individual books, such as anthologies, may comprise \nworks created (and rights held) by many different entities. The images in a book may have \ncome from third-party sources, for instance, or a compendium of poetry might involve many \n\n In fact, as noted above, to the extent an AI model developer intends for their model to abide by the \n38 \nEU’s legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data \nmining for commercial uses and/or are users outside of the covered set of research and heritage \ninstitutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI \ndevelopers.", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "different rightsholders and authors. Managing opt-outs for so many different interests within \none book may get overly complicated very fast. \n\nIn any event, creating an opt-out system will need some ways of authenticating whether \nsomeone has the relevant authority to make choices about inclusion of a work. \n\n*Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The \nPile. Another possible design choice is to restrict access only to authorized users and to \nenforce particular responsibilities or obligations in return for authorization. Three particular \ndimensions of permitted uses and users came up in our discussions: \n\n•**Defining and ensuring acceptable and ethical use:**Participants discussed to what \nextent restrictions should be put on use of the resource. In the case of HathiTrust, \nacceptable use is implicitly ensured by limiting access to researchers from member \ninstitutions; other forms of “gated access” are possible, allowing access only to \ncertain types of users and for certain uses. \n One can imagine more fine-grained \nmechanisms, based on a review of the purpose for which datasets are used. This \nimagined resource could become a useful lever to demand responsible development \nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that \ncould incentivize good behavior. At the same time, drawing the lines around, let alone \nenforcing, “good behavior” would constitute a significant challenge. \n\n39 \n\n•**Charging for use to support sustainability of the training corpus itself:**While wanting \nto ensure broad access to this resource, it is important to consider economic \nsustainability, including support for continuing to update the resource with new works \nand appropriate tooling for AI training. Requiring some form of payment to use the \nresource could support sustainability, perhaps with different requirements for \ndifferent types of users (e.g., differentiating between non-commercial and \ncommercial users, or high-volume, well-resourced users and others). 40 \n\n•**Ensuring benefits of AI are broadly shared, including with book authors or**\n**publishers:**The creation of a training resource might \nlower barriers to the \ndevelopment of AI tools, and in that way support broadly shared benefits by \nfacilitating greater competition and mitigating concentration of power. On the other \nhand, just as concentration of technology industries is already a significant challenge, \nAI might not look much different, and the benefits of this resource may still simply go \nto a few large firms in “winner takes all-or-most” markets. The workshops discussed \nhow, for instance, large commercial users might be expected to contribute to a fund \nthat supported contributors of training data, or more generally to fund writers, to \nensure everyone contributing to the development of AI benefits. \n\n For examples of gated access to AI models, see https://huggingface.co/docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise.", + "page_start": 18, + "page_end": 18, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551.", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "How to apply the PDM to my work ?", + "target_page": 1, + "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after \nbeing approved by the NFP (See section 10.5). \n\n**10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a). \n***Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b). \n5. Click on “Work on Inventories” under Submission Management (figure 68, c). \nThis opens the Submit Inventory initial screen (figure 69). \n\n6. Click the inventory year to be submitted (figure 69, a). \n7. Press the “Generate Official Submission” button (figure 69, c). \n\n***Figure 68. View Inventories Progress screen – select inventory for the preparation for the general submission***", + "page_start": 41, + "page_end": 41, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. \n\nPublic domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright \n\nThe CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
\n\nWorks marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "**Tasks:** **Completed:**\n\n*Before starting this exercise you MUST have completed all of the topics in*\n*the chapter Creating Charts…*\n\n \n \n \n \n Open the workbook called***PE_Creating Charts.xlsx***(it can be found in the \n Create a***Clustered Column***chart showing the sales of products for the \n Drag the chart down below the data and resize it so that it is the same \n Change the chart type to***3-D Stacked Column***and change the chart title \n\nsame folder as the student files) \n\nmonths of***January***through to***June***\n\nwidth as the data, keeping the proportions as far as possible \n\nto***Sales***\n\n*The chart should appear as shown in sample A on the following page...*\n\n Create a***Pie in 3-D***chart of the products and their totals then place it on its \n Change the***Chart Title***to***Product Sales***\n Change the layout to***Layout 6***\n Print the pie chart \n Use the***Save As***command to save the workbook as***PE_Creating Charts***\n***(Completed).xlsx***\n\n\n\nown chart sheet called***Product Sales***\n\n\n \n \n \n \n [html]\n
Files required for exercise :PE_Creating Charts. xlsx
Files / work created by student :PE_Creating Charts ( Complete chart
Exercise Completed :
", + "page_start": 58, + "page_end": 58, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**9.1.3 How to convert the data**\n\nContent Manager OnDemand uses the Generic Transform Interface to integrate Content \nManager OnDemand with third-party transform solutions. \n\nConsider the following information about target flows: \n\n(cid:2) HTML might be used with the same intent, but an HTML document is not always displayed \nidentically, depending on the web browser that is used. Additional testing that includes \nyour needs and the encountered environments might be necessary for validation before \nthe implementation. \n\n(cid:2) PDF might be used as a way to make documents available through standard and \n\nno-charge tools, such as Adobe Acrobat Reader. The transformed documents must be \ndisplayable, saveable, and printable the same way regardless of the environment on which \nthe user works. \n\n(cid:2) XML is an intermediate text-based data format for the manipulation of documents, \n\nregardless of the source data stream, and displays the documents totally or partially in a \npersonalized way. The use of XML usually involves additional development, including \nscripts and stylesheets. \n\n**9.2 Generic Transform Interface**\n\nContent Manager OnDemand uses the Generic Transform Interface to manage third-party \ndata transforms for the Content Manager OnDemand Web Enablement Kit (ODWEK) \napplication programming interface (API) set. This interface is used with the document retrieval \nAPIs. \n\nThe ODWEK Java API provides industry-standard Java classes that can be used by a \ncustomer to write a custom web application that can access data that is stored on the Content \nManager OnDemand server. This custom application can, for example, permit the user to log \non to a Content Manager OnDemand server, get a list of folders, search a specific folder, \ngenerate a hit list of matching documents, and retrieve those documents for viewing. Many \nAPIs provide advanced functionalities. \n\nFor more information, see the following resources: \n\n(cid:2) IBM TechDoc*Best practices for building Web Applications using IBM Content Manager*\n*OnDemand Java APIs*: \n\nhttps://www.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/WP101203 \n\nThis document, which is prepared by the Content Manager OnDemand development \nteam, provides recommendations about how to use the ODWEK Java APIs. Use this \ndocument to understand how the ODWEK Java APIs interface with the Java virtual \nmachine (JVM) and Content Manager OnDemand systems to avoid common coding \nmistakes. \n\n(cid:2)*IBM Content Manager OnDemand Web Enablement Kit Java APIs: The Basics and*\n*Beyond*, SG24-7646: \n\nThis publication provides basic and advanced information about how to use the ODWEK \nJava APIs to develop custom applications.", + "page_start": 232, + "page_end": 232, + "source_file": "sg246915.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_7.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it and display \nthe chart commands on \nthe ribbon \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Change***\n***Chart Type***in the***Type***\ngroup to display the \n***Change Chart Type***\ndialog box \n\n Click on***3-D Column***, \n Click on**[OK]**to apply \n Click on the***Chart Data***\n\nas shown \n\nthe change to the chart \n\nworksheet tab to return \nto the worksheet \n\n\n\n\n\n\n\n\n\n **4**\n\n**Handy to Know…**\n You can use***Change Chart Type***in the \n***Type***group on the***CHART TOOLS:***\n***DESIGN***tab for either embedded charts or \ncharts that have their own worksheet tabs. \n\n**For Your Reference…**\nTo***change***the***chart type***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Change Chart Type***in the \n***Type***group \n\n3. Click on the desired chart and click on**[OK]**", + "page_start": 52, + "page_end": 52, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Select one of the following types of relationships that you want to create or add, as shown \nin Figure 11-126, and click**Next**: \n\n– Metro Mirror \n– Global Mirror (with or without Consistency Protection) \n– Global Mirror with Change Volumes", + "page_start": 603, + "page_end": 603, + "source_file": "sg247938.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet \n\n\n\n\n\n\n\n**Handy to Know…**\n***Chart layouts***are predefined themes \n\ncreated by Microsoft. Even if you choose one \nof these layouts you can still make your own \nmodifications to the way the elements and \nobjects are positioned and how they appear. \n\n**For Your Reference…**\nTo***change***the***chart layout***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***CHART TOOLS: DESIGN***tab, \nthen click on***Quick Layout***in the***Chart***\n***Layouts***group \n\n3. Select the desired layout", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Chapter 2. Setting up a Content Manager**\n\n**OnDemand instance**\n\nThis chapter provides guidelines for implementing Content Manager OnDemand as a single \ninstance. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Introduction \n\n(cid:2) Architecture and platform \n\n(cid:2) Implementing a Content Manager OnDemand instance on a multiplatform UNIX \nenvironment \n\n(cid:2) Implementing a Content Manager OnDemand instance on IBM i \n\n(cid:2) Implementing a Content Manager OnDemand instance on z/OS", + "page_start": 38, + "page_end": 38, + "source_file": "sg246915.pdf" + }, + { + "text": "**General**\nConsider the following general recommendations when you work with OAM for Content \nManager OnDemand: \n\n(cid:2) Define a user catalog exclusively for collection names. \n\n(cid:2) Cache the user catalog in the virtual lookaside facility (VLF). \n\n(cid:2) Migrate objects to optical or tape (OSMC) during non-peak hours. \n\n(cid:2) Spread OAM collections over multiple DB2/disk/channels. \n\n(cid:2) Spread out the application groups to different collection names: \n\nOAM collections → storage groups → DB2 database \n\n(cid:2) Group your applications based on retrieval expectations: \n\n– Collect small, frequently used applications together. \n– Isolate your important applications so that the other applications do not get in the way. \n\n**DB2**\nConsider the following list of recommendations that relate to DB2: \n\n(cid:2) Ensure that enough DB2 connections are available to support the OAM requests. \n(cid:2) Run the**REORG**,**RUNSTATS**, and**REBIND**commands, as appropriate. \n(cid:2) Partition OAM table spaces larger than 2 GB. \n\n**Devices**\nConsider the following recommendations that relate to devices: \n\n(cid:2) Determine and set the Initial Access Response Seconds (IARS) option. \n\n(cid:2) Assign objects to storage classes that have an adequate IARS that is defined and to \nmanagement classes that do not cause a transition to a slower storage class until the \nfrequency of retrieving the objects is reasonably low. \n\n(cid:2) Determine whether to place the object on disk or removable (optical or tape) media. \n\n(cid:2) If the IARS opts for REMOVABLE media, determine whether to place the object on optical \nor tape. \n\n(cid:2) Verify that the required Sustained Data Rate is achieved based on the selected object \nplacement. \n\n**Tapes**\nConsider the following recommendations that relate to tapes: \n\n(cid:2) Modify (CBROAMxx)**MAXTAPERETRIEVETASKS**and**MAXTAPESTORETASKS**(if you are using tape \nretrieves because the default=1). Both of these parameters are configured at the global \nlevel and at the storage group level. \n\n(cid:2) The global level**MAXTAPERETRIEVETASKS**(tasks) is defined by**SETOAM**.**SETOAM**specifies the \ntotal number of concurrent tape retrievals that are possible at a time. (It controls the \nmaximum number of tape drives that can be concurrently allocated to the OAM address \nspace for reading object data from tape.) This number must be less than or equal to the \nnumber of tape drives on the system. Do not specify a number that is greater than the \nnumber of tape drives that are available to OAM for the**MAXTAPESTORETASKS**or the \n**MAXTAPERETRIEVETASKS**subparameters because a system can go into allocation recovery \nand attempt to allocate tape drives after all of the tape drives are in use, causing system \nproblems. \n\n(cid:2) The storage group level**MAXTAPERETRIEVETASKS**(tasks) specifies the maximum concurrent \ntape retrievals that are possible for a specific storage group. If**MAXTAPERETRIEVETASKS**is \n\n**111** Chapter 5. Storage management", + "page_start": 134, + "page_end": 134, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
If you install the client after you install Adobe Acrobat, the installation program copies the application programming interface ( API ) file to the Acrobat plug - in directory.
If you install the client before you install Adobe Acrobat, you must copy the API file to the Acrobat plug - in directory manually.
If you upgrade to a new version of Acrobat, you must copy the API lile to the new Acrobat plug - in directory.
The default location of the ARSPDF32. AP1 file is :
C : \\ Program F11es { x86 }},[ BM ],[ In ]] emand C11ents } V9.51, PDF
The delault Acrobat plug - in directory is C : 1 / Program F11es ( sBI )) Mobe - Ucrobat x, e ) Acrobact ' s, p ' lag, 1ns. The variables x, y represent the version of Acrobat, for example, C : 1 / Program F11es [ 686 ]) Adobe ' skcrobat 10.0 ' s / crobat ' s
Graphical indexer example
By using the graphical indexer, you can define triggens, fields, and indexes for PDP reports within the application component of Content Manager Onclemand in a similar way to defining them for line data. This section serves as an introduc
The example describes how to use the graphical indexer from the report wicted to create indexing information for an input file. The indexing information consists of a trigger that uniqually dentillies the begring of a document in the inpo
The process consists of these steps :
1. Start the Administrator Client and log on to a server.
2. Start the report wizard. Click the report wizard icon on the toolbar.
3. In the Sample Data window, select PDF from the drop - down list of data types, and then click Select Sample Data.
\n\n4. \nIn the Open window, enter the name or full path name of your file in the space that is \nprovided or use the**Browse**option to locate your PDF file. \n\n5. Click**Open**. The graphical indexer opens the input file in the report window. \n\nIf the PDF data fails to display, or an error message, such as the message that is shown in \nFigure 7-2, is displayed, you must follow the steps in “Installation” on page 169 to verify \nthat the API file is in the correct Acrobat plug-in directory.", + "page_start": 192, + "page_end": 192, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "Which rivers flow through Lyon?", + "target_page": 1, + "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Administration**\n\n**Commune**\n\nLike Paris and Marseille, the commune (municipality) of Lyon is divided into a number of municipal arrondissements, each \nof which is identified by a number and has its own council and town hall. Five arrondissements were originally created in \n1852, when three neighbouring communes (La Croix-Rousse, La Guillotière, and Vaise) were annexed by Lyon. Between \n1867 and 1959, the third arrondissement (which originally covered the whole of the Left Bank of the Rhône) was split three \ntimes, creating a new arrondissement in each case. Then, in 1963, the commune of Saint-Rambert-l'Île-Barbe was annexed to \nLyon's fifth arrondissement. A year later, in 1964, the fifth was split to create Lyon's 9th – and, to date, final – \narrondissement. Within each arrondissement, the recognisable*quartiers*or neighbourhoods are: \n\n1st arrondissement: Slopes of La Croix-Rousse, Terreaux, Martinière/St-Vincent", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39]", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Further down, in the current Saint-Vincent district, was the Gallic \nvillage of Condate, probably a simple hamlet of sailors or fishermen \nliving on the banks of the Saône.*Condate*is a Gallic word meaning \n\"confluence\", from which the Confluence district gets its name. \n\nIn Roman times the city was called*Caput Galliæ*, meaning \"capital of \nthe Gauls\". As an homage to this title, the Archbishop of Lyon is still \ncalled the Primate of Gaul. \n\nDuring the revolutionary period, Lyon was renamed*Commune-*\n*Affranchie*(\"Emancipated Commune\") on 12 October 1793 by a decree \nof the Convention Nationale. It resumed its name in 1794, after the end \nof the Terror. \n\nLyon is called*Liyon*in Franco-Provençal.[24] \n\n\n \n \n \n \n [html]Coordinates : 45 ° 46 ′ N 4 ° 50 ′ E\n
Countryh the Regionwere | MetropolisTh0EranceAuvergne - Rh0ne - AlpesLyon MetropolisLyon
Subdivisions — f the Government • Mayor ( 2020 – ulish9 arrondissements
Gregory Doucet [ g ] ( EELV )Area1have | • Urban ( 2020 [ 3 ])( hill - 1
47.87 km2 ( 18.48 sq mi ) 1.141.4 km2 ( 440.7 sq mi )4.605.8 km2 ( 1.778.3 sq mi )
• the • Radium ( 202.)• Rank • Density • the • Urban ( Jan. hose ≥ 02 : 1 %)• the520.7743rd in France11.000 / km2
( 28.000 / sq mi ) 1.702.9211.500 / km2 ( 3.900 / sq mi ) 2.308.818
\n\n**Ancient Lyon**", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "31. Braudel 1984 p. 327 \n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde \nLyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 \n150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 \n50.htm) on 19 January 2011. Retrieved 3 April 2011. \n\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli \nsh_1).*Chrd.lyon.fr*. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) \non 24 January 2011. Retrieved 21 December 2017. \n\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. \n\ncom/article/273644).*Digitaljournal.com*. \n\n35. (in French) Georges Duby (ed),*Histoire de la France : Dynasties et révolutions, de 1348 à 1852*(vol. 2), \nLarousse, 1999 p. 53 ISBN 2-03-505047-2 \n\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g \netting-around/local-transport). Lonely Planet. Retrieved 2 February 2017. \n\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/).*unesco.org*. UNESCO World Heritage Centre. \nRetrieved 31 July 2015. \n\n38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http \ns://www.jstor.org/stable/25636095).”*Erdkunde*, vol. 8, no. 4, 1954, pp. 246–252.*JSTOR.*\n\n39. \"Données climatiques de la station de Lyon: Relevés de 2016 – Lyon\" (https://web.archive.org/web/20161004", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**17th and 18th centuries**\n\nCity Hall on the Place des Terreaux, built by architects Jules Hardouin-Mansart and Robert de Cotte \nMusée des beaux-arts de Lyon, fine arts museum housed in a former convent of the 17th century, including \nthe Baroque*chapelle Saint-Pierre*\nHôtel-Dieu de Lyon (17th and 18th century), historical hospital with a baroque chapel \nTemple du Change (17th and 18th century), former stock exchange of Lyon, Protestant temple since the 18th \ncentury \nPlace Bellecour, one of the largest town squares in Europe \nChapelle de la Trinité (1622), the first Baroque chapel built in Lyon, and part of the former École de la Trinité, \nnow Collège-lycée Ampère \nÉglise Saint-Polycarpe (1665–1670), Classical church \nÉglise Saint-Just (16th to 18th century), Classical church \nSaint-Bruno des Chartreux (17th and 18th century), church, masterpiece of Baroque architecture \nÉglise Notre Dame Saint-Vincent (18th century), Neo-classical church", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia4.pdf" + }, + { + "text": "1,600,000 m2 (17,222,256.67 sq ft) of office space and services and more than 55,000 jobs.[48]*Cité Internationale*, created \nby the architect Renzo Piano is located in the border of the Parc de la Tête d'Or in the 6th arrondissement. The worldwide \nheadquarters of Interpol is located there. The district of*Confluence*, in the south of the historic centre, is a new pole of \neconomical and cultural development. \n\nTourism is an important part of the Lyon economy, with one billion euros in 2007 and 3.5 million hotel-nights in 2006 \nprovided by non-residents. Approximately 60% of tourists visit for business, with the rest for leisure. In January 2009, Lyon \nranked first in France for hostels business. The festivals most important for attracting tourists are the*Fête des lumières*, the \n*Nuits de Fourvière*every summer, the*Biennale d'art contemporain*and the*Nuits Sonores*. \n\n**Culture**\n\nSince the Middle Ages, the region residents have spoken several dialects of Franco- \nProvençal. The Lyonnais dialect was replaced by the French language as the \nimportance of the city grew. However some \"frenchified\" Franco-Provençal words \ncan also be heard in the French of the Lyonnais, who call their little boys and girls \n\"gones\" and \"fenottes\" for example.[49] \n\n\n\nThe Lumière brothers pioneered cinema in the town in 1895. The Institut \nLumière, built as Auguste Lumiere's house, and a fascinating piece of \narchitecture in its own right, holds many of their first inventions and other \nearly cinematic and photographic artifacts. \n8 December each year is marked by the Festival of Lights (la Fête des \nlumières), a celebration of thanks to the Virgin Mary, who purportedly \nsaved the city from a deadly plague in the Middle Ages. During the event, \nthe local population places candles (*luminions*) at their windows and the city of Lyon organizes large-scale \nlight shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean. \nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting \naudiences from around the world. \nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house \nwas re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named \nafter him. \nLyon is also the French capital of \"*trompe l'œil*\" walls, a very ancient tradition. Many are to be seen around the \ncity. This old tradition is now finding a contemporary expression, for example in the art of Guillaume \nBottazzi.[50][51] \nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North \nAmerica, was founded in Lyon in 1821. \nThe African Museum of Lyon is one of the oldest museums situated in Lyon.[52] \nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance \nmovement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the \nFrench resistance and many members were shot in Place Bellecour in the town centre. The exhibition is \nlargely a series of , mini-biographies of those involved. \nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program. \n\nGuignol, created in the early 19th \nC., associated with the silk-workers \n\n**UNESCO World Heritage Site**\n\nThe historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the \n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and \nstrategic significance.\"[37] The specific regions comprising the historic site include the Roman district and Fourvière, the \nRenaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture \nfrom the 12th century to modern times.[53]", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Louis, Jaucout de chevalier ( DTS5 ), “ Lyon ”, Encyclopedia of Diderot & d ’ Alembert – Collaborative Translation Project. hdf. 2027 / spo. did2222.0000.1259 ( https :// hdl. handle. netO327N. EFspo. did222.0000.259 ).DT. Todichers GlossarEndlesther ’ s Glossary \" ( hitp :// www. manypnesu. os / clonds / endlicher_dissuary / tref ) uwwershanginesu. s. i. d. Relieved.\" Newther \" dSC \". Legislandomonter.\" Legisland - servent monter.\" Lugdune.\" YoourtaPatick Boucheron, et al., eds. France in the World : A New Global History ( 2013 ) pp 63 - 68.Z9. “ Saint Irenaeus ” ( http :// sanctoral. com / en / saints / saint_irenaeus. html ). Sanctoral. com. Magnificat.30.72847 - Primat den Gaules * ( https :// web. archive. org / web / 2033333333337htps :// www. htarce - cathologies?/ 3547 - Primat - dee - Gaules. https :// www. https :// www. https :// www. https :// www. https :// www. https :// www. https :/", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
nd• Metro density
500 / km2 ( 1.300 / sq mi )Time zone • Summer ( DS )
UTC + 01 : 00 ( CET ) UTC + 02 : 00 ( CESTINSEE / Postal code
69123 ( https :// www. insee. fr / fr / statistiques / 14055997geo = COM - 69123 )/ 69001 - 69009
2012Elevation
\n\n**1**French Land Register data, which excludes \nlakes, ponds, glaciers > 1 km2 (0.386 sq mi or \n247 acres) and river estuaries. \n\n\n\n**Modern Lyon**\n\n**Timeline of Lyon**\n**Historical affiliations**\n\n Roman Empire (Gallia Lugdunensis), 43 \n\nBC-286 \n\nFernand Braudel \nremarked, \n\"Historians of Lyon are not \nthe bi- \nsufficiently aware of \npolarity between Paris and Lyon, \nwhich is a constant structure in \nFrench development...from \nthe \nlate Middle Ages to the Industrial \nRevolution\".[31] In the late 15th century, the fairs introduced by Italian \nmerchants made Lyon the economic counting house of France. Even the \n*Bourse*(treasury), built in 1749, resembled a public bazaar where \naccounts were settled in the open air. When international banking moved \nto Genoa, then Amsterdam, Lyon remained the banking centre of \nFrance. \n\n Western Roman Empire (Gallia \n\nLugdunensis), 286-411 \n\n Kingdom of the Burgundians, 411–534 \n Francia, 534–843 \n Middle Francia, 843–855 \n Lotharingia, 855–879 \n Lower Burgundy, 879-933 \n Kingdom of Arles, 933–1312 \n Kingdom of France (Lyonnais), 1312– \n\nThe Roman-era Theatre on the \nFourvière Hill \n\n1792 \n\nDuring the Renaissance, the city's development was driven by the silk \ntrade, which strengthened its ties to Italy. Italian influence on Lyon's \narchitecture is still visible among historic buildings.[32] In the late 1400s \nand 1500s Lyon was also a key centre of literary activity and book \npublishing, both of French writers (such as Maurice Scève, Antoine \nHeroet, and Louise Labé) and of Italians in exile (such as Luigi \nAlamanni and Gian Giorgio Trissino). \n\n\n\n French First Republic, 1792–1793 \n Counter-revolutionary, 1793 \n French First Republic, 1793–1804 \n First French Empire, 1804–1814 \n Kingdom of France, 1814–1815 \n First French Empire, 1815 \n Kingdom of France, 1815–1830 \n Kingdom of France, 1830–1848 \n French Second Republic, 1848–1852 \n Second French Empire, 1852–1870 \n French Third Republic, 1870–1940 \n Vichy France, 1940–1944 \n French Fourth Republic, 1944–1958 \n France, 1958–present \n\nIn 1572, Lyon was a scene of mass violence by Catholics against \nProtestant Huguenots in the St. Bartholomew's Day Massacre. Two \ncenturies later, Lyon was again convulsed by violence during the French \nRevolution, when the citizenry rose up against the National Convention \nand supported the Girondins. The city was besieged by Revolutionary armies for over \ntwo months before it surrendered in October 1793. Many buildings were destroyed, \nespecially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph \nFouché administered the execution of more than 2,000 people. The Convention \nordered that its name be changed to \"Liberated City\", and a plaque was erected that \nproclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, \nNapoleon ordered the reconstruction of all the buildings demolished during that \nperiod. \nLyon under siege in 1793", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "How big was Lyon's population in 2022? ", + "target_page": 2, + "target_passage": "Population (2022) 520,774", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "All figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the \ncommune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at \nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and \nremain the 2nd largest city of France ahead of Marseille).[68] The 1906 figure is computed using the figure for the commune of \nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate \nwas smaller than 10,000. \nSource: EHESS[70] and INSEE[71] \n\n**Foreign-born**\n\n\n\n\n\n\n \n \n \n \n [html]\n
EducationCountry of birthPopulation ( 2020 )
Universities and tertiary educationMinimum Algeria14.779
| Morocco5.245p - value
4.879|| |||| taly3.351
< underline > Intervention 3.068Spain
2.064JHTDR Congo1.520
China1.429Cameroon
1.364< underline > I < underline >< underline >< underline >< underline >< underline >< underline >< underline >< underline >< underline > I < underline > I < und1.198
TableCasesENS Lyon : Rene Descartes campus
andTableSpecimens
", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia4.pdf" + }, + { + "text": "71. \"Statistiques locales - Métropole de Lyon : Intercommunalité-Métropole - Population municipale (historique \n\ndepuis 1876)\" (https://statistiques-locales.insee.fr/#c=indicator&i=pop_depuis_1876.pop&s=2021&selcodgeo= \n200046977&t=A01&view=map4). INSEE. Retrieved 12 July 2024. \n\n72. \"IMG1B - Population immigrée par sexe, âge et pays de naissance en 2020 − Recensement de la population \n\n– Résultats pour toutes les communes, départements, régions, intercommunalités... −Étrangers - Immigrés en \n2020 | Insee\" (https://www.insee.fr/fr/statistiques/7633127?sommaire=7633727&geo=COM-69123).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon is also home to the Lyon Hockey Club, an ice hockey team that competes in \nFrance's national ice hockey league. The Patinoire Charlemagne is the seat of Club \ndes Sports de Glace de Lyon, the club of Olympic ice dancing champions Marina \nAnissina and Gwendal Peizerat, and world champions Isabelle Delobel and Olivier \nShoenfelder.[65] Lyon-Villeurbanne also has a basketball team, ASVEL, that plays at \nthe Astroballe arena. \n\n\n\n**Street art**\n\nSince 2000, Birdy Kids, a group of graffiti artists from the city, has decorated several \nrandom buildings and walls along the Lyon ring road. In 2012, the artist collective \nwas chosen to represent the city as its cultural ambassadors.[66] \n\n**Demographics**\n\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census.[15] As of 2011, 14% of its \npopulation was born outside Metropolitan France.[67] \n\n\n \n \n \n \n [html]Population of Lyon ( commune ) ( within 2020 borders )\n
YearPgp :±% p. a.YearPgp.±%. p. a.YearPgp :±% b. a.
1801101.7601876344.513+ 1.33 %1946464.104+ 0.02 %
1806114.643+ 2.41 %1881378.581+ 1.84 %1954475.343+ 0.29 %
1821149.611+ 1.79 %1886404.172+ 1.45 %1962535.746+ 1.54 %
1831182.668+ 2.02 %1891440.315+ 1.78 %1968527.800− 0.25 %
1836198.683+ 1.60 %1896468.311+ 1.25 %1975456.716− 2.06 %
1841206.670+ 0.79 %1901461.687− 0.29 %1982413.095− 1.42 %
1846238.466+ 2.86 %1906474.652+ 0.56 %1990415.487+ 0.07 %
1851259.220+ 1.68 %1911462.248− 0.53 %1999445.452+ 0.78 %
1856293.743+ 2.66 %1921462.446+ 0.00 %2010484.344+ 0.78 %
1861320.326+ 1.72 %1926463.125+ 0.03 %2015513.275+ 1.17 %
1866325.219+ 0.30 %1931463.647+ 0.02 %2021522.250+ 0.29 %
1872324.590− 0.03 %1936463.061− 0.03 %
\n\nThe city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected \nmetropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021.[16]", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "1,600,000 m2 (17,222,256.67 sq ft) of office space and services and more than 55,000 jobs.[48]*Cité Internationale*, created \nby the architect Renzo Piano is located in the border of the Parc de la Tête d'Or in the 6th arrondissement. The worldwide \nheadquarters of Interpol is located there. The district of*Confluence*, in the south of the historic centre, is a new pole of \neconomical and cultural development. \n\nTourism is an important part of the Lyon economy, with one billion euros in 2007 and 3.5 million hotel-nights in 2006 \nprovided by non-residents. Approximately 60% of tourists visit for business, with the rest for leisure. In January 2009, Lyon \nranked first in France for hostels business. The festivals most important for attracting tourists are the*Fête des lumières*, the \n*Nuits de Fourvière*every summer, the*Biennale d'art contemporain*and the*Nuits Sonores*. \n\n**Culture**\n\nSince the Middle Ages, the region residents have spoken several dialects of Franco- \nProvençal. The Lyonnais dialect was replaced by the French language as the \nimportance of the city grew. However some \"frenchified\" Franco-Provençal words \ncan also be heard in the French of the Lyonnais, who call their little boys and girls \n\"gones\" and \"fenottes\" for example.[49] \n\n\n\nThe Lumière brothers pioneered cinema in the town in 1895. The Institut \nLumière, built as Auguste Lumiere's house, and a fascinating piece of \narchitecture in its own right, holds many of their first inventions and other \nearly cinematic and photographic artifacts. \n8 December each year is marked by the Festival of Lights (la Fête des \nlumières), a celebration of thanks to the Virgin Mary, who purportedly \nsaved the city from a deadly plague in the Middle Ages. During the event, \nthe local population places candles (*luminions*) at their windows and the city of Lyon organizes large-scale \nlight shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean. \nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting \naudiences from around the world. \nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house \nwas re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named \nafter him. \nLyon is also the French capital of \"*trompe l'œil*\" walls, a very ancient tradition. Many are to be seen around the \ncity. This old tradition is now finding a contemporary expression, for example in the art of Guillaume \nBottazzi.[50][51] \nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North \nAmerica, was founded in Lyon in 1821. \nThe African Museum of Lyon is one of the oldest museums situated in Lyon.[52] \nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance \nmovement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the \nFrench resistance and many members were shot in Place Bellecour in the town centre. The exhibition is \nlargely a series of , mini-biographies of those involved. \nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program. \n\nGuignol, created in the early 19th \nC., associated with the silk-workers \n\n**UNESCO World Heritage Site**\n\nThe historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the \n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and \nstrategic significance.\"[37] The specific regions comprising the historic site include the Roman district and Fourvière, the \nRenaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture \nfrom the 12th century to modern times.[53]", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia4.pdf" + }, + { + "text": "The division of the Metropolis of Lyon in large electoral wards often grouping various \ncommunes and dividing the commune of Lyon into six wards was criticized by the suburban \nmayors, as it ended the rule of 'one commune, one metropolitan councilor'. The goal of this \nelectoral division of the metropolis was to focus metropolitan elections more on metropolitan \nissues than parochial communal issues, and ensure the 'one person, one vote' rule be respected, \nby creating electoral wards of more homogeneous population sizes. Opponents said it diluted the \nvoice of the small suburban communes, which are now part of large electoral wards and do not \neach possess a representative in the metropolitan council anymore. \n\n**Presidents of the Metropolitan Council**\n\nThe two first presidents of the Metropolis of Lyon's metropolitan council were chosen by \nindirectly elected metropolitan councilors. The current president since July 2020 was elected by \nnew metropolitan councilors following their election by universal suffrage in March (1st round) \nand June (2nd round) 2020, the first direct election of a metropolitan council in France. \n\n\n \n \n \n \n [html]\n
President of the Metropolitan CouncilTerm startTerm endParty
Gerard Collomb1 January 201510 July 2017PS
David Kimelfeld10 July 20172 July 2020LREM
Bruno Bernard2 July 2020IncumbentEELV
\n\n**Antiquity**\n\nThe Roman ruins on the hillside near the Fourvière Basilica, with the Ancient Theatre of Fourvière, the Odeon \nof Lyon and the accompanying Gallo-Roman museum \nAmphitheatre of the Three Gauls – ruins of a Roman amphitheatre. \n\n\n\n\n\n\n\n**Middle Ages and Renaissance**\n\nCathedral of St. John, a medieval church with architectural elements of the 13th, 14th and 15th centuries, also \nthe principal religious structure in the city and the seat of the Archbishop of Lyon \nBasilica of St-Martin-d'Ainay, one of the rare surviving Romanesque basilica-style churches in Lyon \nÉglise Saint-Paul, Romanesque (12th and 13th century) and Gothic (15th–16th century) church \nÉglise Saint-Bonaventure, 14th- and 15th-century Gothic church \nÉglise Saint-Nizier, Gothic church from the 15th century, having a doorway carved in the 16th century by \nPhilibert Delorme \nVieux Lyon (English: Old Lyon) area, Medieval and Renaissance quarter of the town, with shops, dining and \ncobbled streets \nThe many Renaissance*hôtels particuliers*of the Old Lyon quarter, such as the*Hôtel de Bullioud*, were also \nbuilt by Philibert Delorme", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Further down, in the current Saint-Vincent district, was the Gallic \nvillage of Condate, probably a simple hamlet of sailors or fishermen \nliving on the banks of the Saône.*Condate*is a Gallic word meaning \n\"confluence\", from which the Confluence district gets its name. \n\nIn Roman times the city was called*Caput Galliæ*, meaning \"capital of \nthe Gauls\". As an homage to this title, the Archbishop of Lyon is still \ncalled the Primate of Gaul. \n\nDuring the revolutionary period, Lyon was renamed*Commune-*\n*Affranchie*(\"Emancipated Commune\") on 12 October 1793 by a decree \nof the Convention Nationale. It resumed its name in 1794, after the end \nof the Terror. \n\nLyon is called*Liyon*in Franco-Provençal.[24] \n\n\n \n \n \n \n [html]Coordinates : 45 ° 46 ′ N 4 ° 50 ′ E\n
Countryh the Regionwere | MetropolisTh0EranceAuvergne - Rh0ne - AlpesLyon MetropolisLyon
Subdivisions — f the Government • Mayor ( 2020 – ulish9 arrondissements
Gregory Doucet [ g ] ( EELV )Area1have | • Urban ( 2020 [ 3 ])( hill - 1
47.87 km2 ( 18.48 sq mi ) 1.141.4 km2 ( 440.7 sq mi )4.605.8 km2 ( 1.778.3 sq mi )
• the • Radium ( 202.)• Rank • Density • the • Urban ( Jan. hose ≥ 02 : 1 %)• the520.7743rd in France11.000 / km2
( 28.000 / sq mi ) 1.702.9211.500 / km2 ( 3.900 / sq mi ) 2.308.818
\n\n**Ancient Lyon**", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )− 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Primary and secondary schools**\n\nThere are some international private schools in the Lyon area, including: \n\nCité Scolaire Internationale de Lyon or the Lycée de Gerland; \n\nIncludes the*Section Japonaises*(リヨン‧ジェルラン補習授業校 \n*Riyon Jeruran Hoshū Jugyō Kō*\"Lyon Gerland Japanese \nSupplementary School\"), which the Japanese Ministry of Education \n(MEXT) counts as a part-time Japanese supplementary school[73] \n\nOmbrosa; \nInternational School of Lyon in nearby Sainte-Foy-lès-Lyon; \nMontessori School of Lyon. \n\n\n\n**Supplementary education**\n\nOther Japanese supplementary schools: \n\nThe*Association Pour le Développement de la Langue et de la Culture*\n*Japonaises*(ADLCJ; リヨン補習授業校*Riyon Hoshū Jugyō Kō*) is held in \nthe*Maison Berty Albrecht*in Villeurbanne, near Lyon.[73] It was formed in \n1987.[74] It serves Japanese expatriate children who wish to continue their \nJapanese education whilst abroad. \n\n\n\n**Transport**\n\n\n\n\n \n \n \n \n [html]\n
LyonExupery_AirpThere interventioninternationflights. It is akey transport facilityPatientsinks to otherThe studyControlPrimary communityDistribution of controlling the non - stimulationsStateComparisonBillipointsStrainConstructionThere with the hisinessStatementGenetics ( means )Complementary32.33 ( 6.33 )Samples and numberertinns with I InderetesStateComplementaryDemonstrate ( means )and bS. Lyon publictransport Sytral offerstheControlsParametersStatementStatementStatementsParametersin transport is tG1 000 as nnnnnsprl tn €PatientsStatementsStatements ( means )theBron, theAller Lyon - Bron AStatestratesPatientsTable
\n\n\n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to \naccommodate the TGV, and Lyon Perrache, an older station that now provides mostly \nregional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul \nand Jean Macé. Lyon was the first city to be connected to Paris by the TGV in \n1981.[76] Since that time the TGV train network has expanded and links Lyon directly \nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International \ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, \nLuxembourg, Brussels and London. \n\nThe city is at the heart of a dense road network and is located at the meeting point of \nseveral highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble. \nThe city is now bypassed by the A46. A double motorway tunnel passes under \nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du \nSoleil\". \n\nT1 tramway on the Raymond Barre \nbridge", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "What is the climate in Lyon ?", + "target_page": 5, + "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39]", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia4.pdf" + }, + { + "text": "[html]Climate data for Lyon (≥ 3 %), elevation : 201 m, 1961 – 1990 normals and extremesMonthJanFebMarAprMayJunJulAugSepOctNovDecYearRecord high ° C (° F )16.3 ( 61.3 )21.4 ( 70.5 )25.7 ( 78.3 )28.0 ( 82.4 )29.4 ( 84.9 )34.4 ( 93.9 )39.8 ( 103.6 )37.1 ( 98.8 )33.8 ( 92.8 )28.4 ( 83.1 )22.6 ( 72.7 )20.2 ( 68.4 )39.8 ( 103.6 )Mean maximum ° C (° F )10.2 ( 50.4 )14.4 ( 57.9 )15.9 ( 60.6 )18.6 ( 65.5 )23.1 ( 73.6 )28.8 ( 83.8 )32.8 ( 91.0 )28.1 ( 82.6 )27.3 ( 81.1 )19.7 ( 67.5 )14.1 ( 57.4 )9.5 ( 49.1 )32.8 ( 91.0 )Mean daily maximum ° C (° F )6.1 ( 43.0 )8.2 ( 46.8 )11.6 ( 52.9 )15.2 ( 59.4 )19.1 ( 66.4 )22.9 ( 73.2 )26.1 ( 79.0 )26.0 ( 78.8 )22.4 ( 72.3 )17.1 ( 62.8 )10.0 ( 50.0 )6.4 ( 43.5 )15.9 ( 60.7 )Daily mean ° C (° F )3.0 ( 37.4 )4.9 ( 40.8 )7.4 ( 45.3 )10.2 ( 50.4 )14.0 ( 57.2 )17.6 ( 63.7 )20.6 ( 69.1 )20.0 ( 68.0 )17.1 ( 62.8 )12.7 ( 54.9 )6.7 ( 44.1 )3.9 ( 39.0 )11.5 ( 52.7 )Mean daily minimum ° C (° F )0.2 ( 32.4 )1.4 ( 34.5 )2.9 ( 37.2 )5.2 ( 41.4 )9.1 ( 48.4 )12.5 ( 54.5 )14.8 ( 58.6 )14.4 ( 57.9 )11.7 ( 53.1 )8.3 ( 46.9 )3.5 ( 38.3 )0.7 ( 33.3 )7.1 ( 44.7 )Mean minimum ° C (° F )− 7.0 ( 19.4 )− 4.7 ( 23.5 )− 1.4 ( 29.5 )3.2 ( 37.8 )7.6 ( 45.7 )10.9 ( 51.6 )13.1 ( 55.6 )12.9 ( 55.2 )8.1 ( 46.6 )4.5 ( 40.1 )1.0 ( 33.8 )− 4.7 ( 23.5 )− 7.0 ( 19.4 )Record low ° C (° F )− 23.0 (− 9.4 )− 19.3 (− 2.7 )− 10.5 ( 13.1 )− 3.2 ( 26.2 )− 0.3 ( 31.5 )3.6 ( 38.5 )6.1 ( 43.0 )5.2 ( 41.4 )1.9 ( 35.4 )− 3.2 ( 26.2 )− 7.1 ( 19.2 )− 16.0 ( 3.2 )− 23.0 (− 9.4 )Average precipitation mm ( inches )54.0 ( 2.13 )53.8 ( 2.12 )72.2 ( 2.84 )56.1 ( 2.21 )72.6 ( 2.86 )73.2 ( 2.88 )54.5 ( 2.15 )71.6 ( 2.82 )53.2 ( 2.09 )56.2 ( 2.21 )68.0 ( 2.68 )55.8 ( 2.20 )741.2 ( 29.19 )Average precipitation days (≥ 1.0 mm )10.49.39.79.610.98.26.88.27.38.58.99.8107.6Average snowy days5.53.92.51.10.00.00.00.00.00.02.04.619.6Average relative humidity (%)84807471727065707682848676Mean monthly sunshine hours62.689.8147.5184.2215.9250.9292.6259.0208.1134.375.355.41.975.6Percent possible", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )− 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu \n\n\n\n\n\n\n\n\n\n\n\n\n\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] \n\nFlag \nCoat of arms \n\nMotto(s):*Avant, avant, Lion le melhor*\n(old Franco-Provençal for \"Forward, forward, \nLyon the best\")[a] \n*Virtute duce, comite fortuna*\n(\"With virtue as guide and fortune as \ncompanion\")[b] \n\n**Location of Lyon**", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "31. Braudel 1984 p. 327 \n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde \nLyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 \n150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 \n50.htm) on 19 January 2011. Retrieved 3 April 2011. \n\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli \nsh_1).*Chrd.lyon.fr*. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) \non 24 January 2011. Retrieved 21 December 2017. \n\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. \n\ncom/article/273644).*Digitaljournal.com*. \n\n35. (in French) Georges Duby (ed),*Histoire de la France : Dynasties et révolutions, de 1348 à 1852*(vol. 2), \nLarousse, 1999 p. 53 ISBN 2-03-505047-2 \n\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g \netting-around/local-transport). Lonely Planet. Retrieved 2 February 2017. \n\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/).*unesco.org*. UNESCO World Heritage Centre. \nRetrieved 31 July 2015. \n\n38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http \ns://www.jstor.org/stable/25636095).”*Erdkunde*, vol. 8, no. 4, 1954, pp. 246–252.*JSTOR.*\n\n39. \"Données climatiques de la station de Lyon: Relevés de 2016 – Lyon\" (https://web.archive.org/web/20161004", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia4.pdf" + }, + { + "text": "1,600,000 m2 (17,222,256.67 sq ft) of office space and services and more than 55,000 jobs.[48]*Cité Internationale*, created \nby the architect Renzo Piano is located in the border of the Parc de la Tête d'Or in the 6th arrondissement. The worldwide \nheadquarters of Interpol is located there. The district of*Confluence*, in the south of the historic centre, is a new pole of \neconomical and cultural development. \n\nTourism is an important part of the Lyon economy, with one billion euros in 2007 and 3.5 million hotel-nights in 2006 \nprovided by non-residents. Approximately 60% of tourists visit for business, with the rest for leisure. In January 2009, Lyon \nranked first in France for hostels business. The festivals most important for attracting tourists are the*Fête des lumières*, the \n*Nuits de Fourvière*every summer, the*Biennale d'art contemporain*and the*Nuits Sonores*. \n\n**Culture**\n\nSince the Middle Ages, the region residents have spoken several dialects of Franco- \nProvençal. The Lyonnais dialect was replaced by the French language as the \nimportance of the city grew. However some \"frenchified\" Franco-Provençal words \ncan also be heard in the French of the Lyonnais, who call their little boys and girls \n\"gones\" and \"fenottes\" for example.[49] \n\n\n\nThe Lumière brothers pioneered cinema in the town in 1895. The Institut \nLumière, built as Auguste Lumiere's house, and a fascinating piece of \narchitecture in its own right, holds many of their first inventions and other \nearly cinematic and photographic artifacts. \n8 December each year is marked by the Festival of Lights (la Fête des \nlumières), a celebration of thanks to the Virgin Mary, who purportedly \nsaved the city from a deadly plague in the Middle Ages. During the event, \nthe local population places candles (*luminions*) at their windows and the city of Lyon organizes large-scale \nlight shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean. \nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting \naudiences from around the world. \nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house \nwas re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named \nafter him. \nLyon is also the French capital of \"*trompe l'œil*\" walls, a very ancient tradition. Many are to be seen around the \ncity. This old tradition is now finding a contemporary expression, for example in the art of Guillaume \nBottazzi.[50][51] \nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North \nAmerica, was founded in Lyon in 1821. \nThe African Museum of Lyon is one of the oldest museums situated in Lyon.[52] \nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance \nmovement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the \nFrench resistance and many members were shot in Place Bellecour in the town centre. The exhibition is \nlargely a series of , mini-biographies of those involved. \nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program. \n\nGuignol, created in the early 19th \nC., associated with the silk-workers \n\n**UNESCO World Heritage Site**\n\nThe historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the \n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and \nstrategic significance.\"[37] The specific regions comprising the historic site include the Roman district and Fourvière, the \nRenaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture \nfrom the 12th century to modern times.[53]", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**21**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n–20 –10 \n0 \ndays \n10 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 16.**Difference in consecutive dry days between 2°C and 1.5°C global warming, for individual ensemble members and \nensemble mean. \n\n\n\n10 20 \n\nHadGEM2-ES", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**16**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 10.**Distributions of changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under the \nensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show the 25th and 75th percentile \nchanges, whiskers show the range, circles show the four projections that do not define the ends of the range, and crosses \nshow the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, in millimetres of rain \nequivalent. \n\nall members (figure 12). This is not the case for the precipitation and run-off results; for those \nquantities, there is substantial overlap in the ranges of changes at 2°C and 1.5°C, so there is not a \nconsistent picture of how much wetter or drier the world is projected to be in this ensemble, even \nthough it involves a single atmosphere model. \n\nFor TXx, the difference between 2°C and 1.5°C global warming is larger than the 0.5°C \ndifference in global mean temperature across most of the land surface in all ensemble members \n(figure 14). Although some ensemble members simulate local temperatures to be higher at 1.5°C \nglobal warming than 2°C in some small regions, these are relatively localized and most regions \nare cooler at 1.5°C global warming than 2°C. In many regions, the difference is between 0.5°C and \n1.0°C, but many other regions see larger differences. In several ensemble members, the difference \nis 1.5°C, 2°C or larger in large parts of North America, South America, Europe and China. \nFor example, over parts of Europe, where annual maximum daily temperature was projected \nto increase by over 5°C for a 2°C global warming, the local increase is limited to 3–4°C for \n1.5°C global warming. Limiting global warming by half a degree Celsius would, therefore, limit \nmaximum temperatures by three or four times as much in those areas (figure 14). \n\nAt 1.5°C global warming, although the increases in TXx are smaller than at 2°C, these increases \nshow similar geographical patterns as for 2°C in all ensemble members, with larger changes in \ncontinental interiors especially in the mid-latitudes (not shown). \n\nThe percentage of days exceeding the 90th percentile of daily temperature (Tx90p) also \nincreases less at 1.5°C global warming than at 2°C (figure 15). The largest reductions are in the \ntropics, where the largest increase was seen at 2°C; whereas at 2°C global warming, 50% or more", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 2.**(continued) \n\nis 16.9% in which the temperature would go up more than 3.0 °C, most located in the high latitude regions of \nNorthern Hemisphere; the area is rarely in which the temperature would go up between 0 and 1.0 °C. \n\nThere are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. \n\n\n \n \n \n \n [html]\n
State global warming by 1.5 ° C. The dutributions of maize yield loss under the two scenarios are similar to each otherTableStatementStatesticsPatientsSpecificationStatestratesTableStatementTableTable
\n\nhttps://doi.org/10.1038/s41598-022-22228-7 5", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", + "target_page": 2, + "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— \n\n(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. \n\n**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. \n\n**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. \n\n\n \n \n \n \n [html]\n
Given under my hand on 29th April 2021Abi Tierney Registrar GeneralAbi Tremey Registrat GeneralTable
", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. \n\n\n \n \n \n \n [html]\n
Regulators ∗∗ migrets ’ equivalents than 10 min ks / μg / ml ; total vial status ; wivece provided under regulation 2A full impact assessment has not been produced for this instrument because no, or no significant,
Employees virus granus, patients vs. voluntary Accord in roluncoccines.
\n\n© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of \nD’s household or a close family member or friend of D; \n\n(e) to attend the funeral of a member of P’s household or a close family member; \n(f) \n\nin other exceptional circumstances such as— \n(i) to seek medical assistance where this is required urgently or on the advice of a \nregistered medical practitioner including to access services from dentists, opticians, \naudiologists, chiropodists, chiropractors, osteopaths and other medical and health \npractitioners, including services relating to mental health, \n\n(ii) to access critical public services including social services or services provided to \nvictims (such as victims of crime), \n\n(iii) to avoid injury or illness or to escape risk of harm, \n(iv) to access veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon. \n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the \n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)— \n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for \n\nthis purpose; \n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in \n\nrelation to the exercise, the visit to the person or attendance at the funeral. \n\n**Meaning of “place”**\n\n**14.**For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room \nin the designated accommodation where P is staying and, if connected to the room where P is \nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including \nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, \nouthouse or appurtenance of the accommodation in which the place is situated. \n\n**Designations**\n\n**15.**The Secretary of State must designate for the purposes of this Schedule— \n\n(a) accommodation; \n(b) transportation to the designated accommodation, \n\nand must publish details of the designations in such manner as appears to the Secretary of State to \nbe appropriate. \n\n**Duties where P is a child**\n\n**16.**If P is a child— \n\n(a) any person who has custody or charge of P when P is travelling to England must ensure, \nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5 \nand 6; \n\n(b) any person who has custody or charge of P during P’s period of self-isolation must \nensure, so far as is reasonably practicable, that P self-isolates in accordance with this \nSchedule. \n\n**Person caring for P**\n\n\n \n \n \n \n [html]\n
1 /. A person may reside in the place withere P 18 assistance P reasonably requires by reason of —Fesight purposed pressure to mis scientification
( a ) P beirPercentage
( b ) any disability of P ’ s,
TableTable
", + "page_start": 77, + "page_end": 77, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(b) \nin the case of a by-election, as soon as practicable after a vacancy has occurred among \nthe Specially Elected Members. \n(2) A meeting of the Elected Members of the National Assembly that is held for the purpose of \na general election shall be summoned by the Speaker. \n(3) No other business than the holding of a general election may be transacted at any meeting \n\n\n \n \n \n \n [html]\n
paragraph and such a meeting shall not be regarded as a meeting of the Assembly for the purposes of any other provision of this Constitution.
B. When the virties have been cad, whether at a general election or at a by - elections as lot shall be prepared showing the persons for whom votee have been cast in order according to the number or otient received by search of their, the person,
T. In the case of a general election, and subject to the provisions of paragraph 9 of this Stihedule, those persons shall be deemed to have been electriced as Specially Elections Mimbers with stand in the first and each successeding place on
B. In the case of a by - election, and subject to the provisions of paragraph 10 of this Schedule, the pocessors aware, attrade, a the fast alone, polyce, polyct to the provisions
person who stands in the first place on the list shall be deemed to have been elected. B. Where, by reason of an equality of votes between them, the number of candidates in any on the list who would otherwise be deemed to have been elected under p
Schedule economics the number of persons remaining to be wielected as Specially Elicited Members after the persons in the preseding places have been elected, more of the cardioblates in that place or in any succeeding place what be devema
18. When, in a by - election, text or more cardiates equally receive the highest number of voles, no cardiates shall be devened to have been elected and surface by election shaft. In help their accordinate with the provisions of this Schedum
THE ( 1 )
CENTR Bobirw
AL a
DISTRI Region
CT
( 2 )
Boteti
region
( 3 )
Mahala
pye
Region
( 4 )
Serowe
Region
( 5 )
Tonota
Region
( 6 )
", + "page_start": 56, + "page_end": 56, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**1.**—(1) A person (“P”), other than a person described in sub-paragraph (2), who is— \n\n(a) a member of a diplomatic mission in the United Kingdom; \n(b) a member of a consular post in the United Kingdom; \n(c) an officer or servant of an international organisation; \n(d) employed by an international organisation as an expert or on a mission; \n(e) a representative to an international organisation; \n(f) a representative at an international or United Kingdom conference who is granted \nprivileges and immunities in the United Kingdom; \n\n(g) a member of the official staff of a representative to an international organisation, or of a \n\nperson falling within paragraph (f); \n\n(h) described in paragraph (a) or (b) who is passing through the United Kingdom to \ncommence or continue their functions at a diplomatic mission or consular post in another \ncountry or territory, or to return to the country of their nationality; \n\n(i) a representative of a foreign country or territory travelling to the United Kingdom to \n\nconduct official business with the United Kingdom; \n\n(j) a representative of the government of a British overseas territory; \n(k) a diplomatic courier or a consular courier; \n(l) a member of the family forming part of the household of a person falling within any of \n\nparagraphs (a) to (k). \n(2) A person (“P”) where— \n\n(a) P either— \n\n(i) travelled to the United Kingdom for the purpose of attending or facilitating a G7 \nevent, and P is in England for the purpose of attending or facilitating a G7 event or \nof travelling in order to leave England, or \n\n(ii) travelled to the United Kingdom for another purpose, and after their arrival in \n\nEngland is attending, facilitating, or travelling to or from a G7 event; \n(b) P has been invited by Her Majesty’s Government to attend or facilitate the event; \n(c) the relevant person has provided written confirmation to the relevant Department that P \nwill comply with the health protocols for the event; and \n\n(d) the relevant Department has provided written confirmation to the relevant person that P is \n\na person described in this sub-paragraph. \n\n(3) The conditions referred to in regulation 9(15)(a)(i) (persons who are not required to comply \n\nwith regulation 9) are that— \n\n(a) the relevant head of the mission, consular post, international organisation, or conference, \noffice representing a foreign territory in the United Kingdom or a Governor of a British \noverseas territory (as the case may be), or a person acting on their authority, confirms in \nwriting to the Foreign, Commonwealth and Development Office that— \n(i) P is required to undertake work which is essential to the functioning of the mission, \nconsular post, international organisation, conference, or office, or to undertake work \nwhich is essential to the foreign country represented by the mission or consular post, \nthe foreign territory represented by the office or the British overseas territory, and \n\n(ii) that work cannot be undertaken whilst P is complying with regulation 9; and", + "page_start": 33, + "page_end": 33, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Assistant Minister. \n\n**43. Tenure of office of Ministers and Assistant Ministers**\n\nThe office of any Minister or Assistant Minister shall become vacant- \n\n(a) \n\nin the case of a Minister or Assistant Minister appointed from among the \nMembers of the National Assembly, or in the case of a Minister or Assistant \nMinister appointed from among persons who are not Members of the Assembly \nwho becomes a Member of the Assembly before the expiration of four months \nfrom the date of his or her appointment- \n\n(i) \n\nif he or she ceases to be a Member of the National Assembly otherwise \nthan by reason of a dissolution of the National Assembly; or \nif, at the first sitting of the Assembly after a general election, he or she is \nnot a Member of the Assembly; \n\n(b) \n\nin the case of a Minister or Assistant Minister appointed from among persons \nwho are not Members of the Assembly, if before the expiration of four months \nfrom the date of his or her appointment- \n\n(i) \n\ncircumstances arise (other than a dissolution of the Assembly) that, if he or \nshe were such a Member, would cause him or her to vacate his or her seat \nin the Assembly; or \nhe or she does not become a Member of the Assembly; \nif the holder of the office is removed from office by the President; \nupon the assumption by any person of the office of President. \n\n(ii) \n\n(c) \n(d) \n\n**44. Cabinet**\n\n(1) There shall be a Cabinet which shall consist of the President, Vice-President \n\nand the Ministers. \n\n(2) There shall preside at meetings of the Cabinet- \n\n(a) \n(b) \n(c) \n\nthe President; \nin the absence of the President, the Vice-President; or \nin the absence of the President and the Vice-President, such Minister as the \nPresident may designate. \n\n(3) The Cabinet may act notwithstanding any vacancy in its membership. \n\n**45. Oaths to be taken by Ministers and Assistant Ministers**\n\nThe Vice-President, a Minister or an Assistant Minister shall not enter upon the \n\nduties of his or her office unless he or she has taken and subscribed the oath of \nallegiance and such oath for the due execution of his or her office as may be prescribed \nby Parliament. \n**46. Secretary to the Cabinet**\n\n(1) There shall be a Secretary to the Cabinet whose office shall be a public office. \n(2) The Secretary to the Cabinet shall have charge of the Cabinet Office and \n\nshall be responsible, in accordance with such instructions as may be given to him or her \nby the President, for arranging the business for, and keeping the minutes of, the \nCabinet, for conveying decisions of the Cabinet to the appropriate person or authority, \nand shall have such other functions as the President may from time to time direct. \n\n**PART III**\n**Executive Functions (ss 47-56)**\n\n**47. Functions of President**\n\n(1) The executive power of Botswana shall vest in the President and, subject to \n\nthe provisions of this Constitution, shall be exercised by him or her either directly or \nthrough officers subordinate to him or her. \n\n(2) In the exercise of any function conferred upon him or her by this Constitution \nor any other law the President shall, unless it is otherwise provided, act in his or her own \ndeliberate judgment and shall not be obliged to follow the advice tendered by any other", + "page_start": 22, + "page_end": 22, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The High Court shall have jurisdiction to hear and determine any question \n\nwhether- \n(a) \n\nany person has been validly elected as an Elected Member of the National \nAssembly or the seat of any such Member has become vacant; \nany person has been validly elected as Speaker of the Assembly or, having \nbeen so elected, has vacated the office of Speaker. \n\n(2) Any question whether any person has been validly elected as a Specially \n\nElected Member of the National Assembly or whether the seat of any such Member has \nbecome vacant shall be determined by the Speaker. \n\n(3) Parliament may make provision with respect to- \n\nthe persons who may apply to the High Court for the determination of any \nquestion under this section; \nthe circumstances and manner in which the conditions upon which any such \napplication may be made; and \nthe powers, practice and procedure of the High Court in relation to any such \napplication. \n**70. Clerk of the Assembly**\n\n(a) \n\n(b) \n\n(c) \n\n(1) There shall be a Clerk of the National Assembly and an Assistant Clerk of the \n\nNational Assembly and their offices shall be offices in the public service. \n\n(2) There shall be such other offices in the department of the Clerk of the \nAssembly as may be prescribed by resolution of the National Assembly and such offices \nshall be offices in the public service. \n\n**PART II**\n**General Provisions Relating to Procedure in National Assembly (ss 71-76)**\n\n**71. Oaths to be taken by Speaker and Members**\n\nThe Speaker, before assuming the duties of his or her office, and every Member \nof the National Assembly before taking his or her seat therein, shall take and subscribe \nbefore the Assembly the oath of allegiance. \n**72. Presiding in Assembly**\n\nThere shall preside at any sitting of the National Assembly- \n\n(a) \n(b) \n(c) \n\nthe Speaker; \nin the absence of the Speaker, the Deputy Speaker; or \nin the absence of the Speaker and the Deputy Speaker, such Member of the \nAssembly (not being the President or Vice-President or a Minister or Assistant \nMinister) as the Assembly may elect for that sitting. \n\n**73. Quorum in Assembly**\n\nIf objection is taken by any Member of the National Assembly present that there \n\nare present in the Assembly (besides the person presiding) less than one third of the \nMembers of the Assembly and, after such interval as may be prescribed in the rules of \nprocedure of the Assembly, the person presiding ascertains that the number of Members \npresent is less than one third, he or she shall thereupon adjourn the Assembly. \n**74. Voting in Assembly**\n\n(1) Save as otherwise provided in this Constitution, any question proposed for \ndecision in the National Assembly shall be determined by a majority of the votes of the \nMembers present and voting. \n\n(2) ... \n(3) The person presiding in the National Assembly shall have neither an original \n\nvote nor a casting vote and if upon any question before the Assembly the votes are \nequally divided the motion shall be lost. \n**75. Unqualified persons sitting or voting**\n\nAny person who sits or votes in the National Assembly knowing or having", + "page_start": 33, + "page_end": 33, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: \n\nProvided that the Speaker may, at the request of the Member, from time to time \n\nextend that period for further periods of 30 days to enable the Member to pursue an \nappeal against the decision, so, however, that extensions of time exceeding in the \naggregate 150 days shall not be given without the approval of the Assembly signified by \nresolution. \n\n(3) If, on the determination of any appeal, such circumstances continue to exist \n\nand no further appeal is open to the Member of the Assembly, or if, by reason of the \nexpiration of any period for entering an appeal or notice thereof or the refusal of leave to \nappeal or for any other reason, it ceases to be open to the Member to appeal, he or she \nshall forthwith vacate his or her seat. \n\n(4) If at any time before the Member of the Assembly vacates his or her seat \n\nsuch circumstances as aforesaid cease to exist, his or her seat shall not become vacant \nby reason of those circumstances, and he or she may resume the performance of his or \nher functions as a Member of the Assembly. \n**69. Determination of questions as to membership of National Assembly**", + "page_start": 32, + "page_end": 32, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Judicial Service Commission (ss 103-104)**\n\n**103. Composition and procedure**\n\n(1) There shall be a Judicial Service Commission for Botswana which shall \n\nconsist of- \n(a) \n(b) \n\nthe Chief Justice who shall be Chairman; \nthe President of the Court of Appeal (not being the Chief Justice or the most \nSenior Justice of the Court of Appeal); \nthe Attorney-General; \nthe Chairman of the Public Service Commission; \na member of the Law Society nominated by the Law Society; and \na person of intergrity and experience not being a legal practitioner appointed by \nthe President. \n\n(c) \n(d) \n(e) \n(f) \n\n(2) A member nominated under paragraph (e) or appointed under paragraph (f) \n\nof subsection (1) shall hold office for a period of two years, but shall be eligible for re- \nnomination or re-appointment, as the case may be, for another term of office for two \nyears: \n\nProvided that- \n\n(i) a member nominated under paragraph (e) may be removed from office by the \nrest of the members of the Commission acting together only for inability of the \nmember to discharge the functions of his or her office whether arising from \ninfirmity of mind or body or any other cause or for gross misbehaviour; or \n(ii) a member appointed under paragraph (f) may be removed from office by the \n\nPresident only for inability of the member to discharge the functions of his or her \noffice whether arising from infirmity of mind or body or any other cause or for \ngross misbehaviour. \n\n(3) A member of the Commission shall not enter upon the duties of his or her \n\noffice until he or she has taken and subscribed such oath for the due execution of his or \nher office as may be prescribed by Parliament. \n\n(4) The Judicial Service Commission shall not be subject to the direction or \n\ncontrol of any other person or authority in the exercise of its functions under this \nConstitution. \n\n(5) The Commission may regulate its own procedure and, subject to that \nprocedure, may act notwithstanding any vacancy in its membership or the absence of", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What are Tesla's total liabilities and equity in 2024?", + "target_page": 5, + "target_passage": "119,852", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "TESLA, INC. \n\nFORM 10-Q FOR THE QUARTER ENDED SEPTEMBER 30, 2024 \n\nINDEX \n\nPART I. FINANCIAL INFORMATION \n\nItem 1. Financial Statements \n\nConsolidated Balance Sheets \n\nConsolidated Statements of Operations \n\nConsolidated Statements of Comprehensive Income \n\nConsolidated Statements of Redeemable Noncontrolling Interests and Equity \n\nConsolidated Statements of Cash Flows \n\nNotes to Consolidated Financial Statements \n\nItem 2. Management's Discussion and Analysis of Financial Condition and Results of Operations \n\nItem 3. Quantitative and Qualitative Disclosures about Market Risk \n\nItem 4. Controls and Procedures \n\nPART II. OTHER INFORMATION \n\nItem 1. Legal Proceedings \n\nItem 1A. Risk Factors \n\nItem 2. Unregistered Sales of Equity Securities and Use of Proceeds \n\nItem 3. Defaults Upon Senior Securities \n\nItem 4. Mine Safety Disclosures \n\nItem 5. Other Information \n\nItem 6. Exhibits", + "page_start": 2, + "page_end": 2, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of \nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust \nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan \nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30, \n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed \na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June \n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested \nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance \nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. \nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion, \nand a hearing was held on August 2, 2024. \n\nLitigation Related to Directors’ Compensation \n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted \nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and \nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their \nanswer on September 17, 2020. \n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve \n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and \ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to \nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which \nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint \nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a \nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial \nposition. \n\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and \n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On \nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of \nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for \nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of \na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, \n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a \nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, \n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals \nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$", + "page_start": 7, + "page_end": 7, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. \n\nUnaudited Interim Financial Statements \n\nThe consolidated financial statements, including the consolidated balance sheet as of September 30, 2024, the \nconsolidated statements of operations, the consolidated statements of comprehensive income, the consolidated statements of \nredeemable noncontrolling interests and equity for the three and nine months ended September 30, 2024 and 2023, and the \nconsolidated statements of cash flows for the nine months ended September 30, 2024 and 2023, as well as other information \ndisclosed in the accompanying notes, are unaudited. The consolidated balance sheet as of December 31, 2023 was derived from \nthe audited consolidated financial statements as of that date. The interim consolidated financial statements and the \naccompanying notes should be read in conjunction with the annual consolidated financial statements and the accompanying \nnotes contained in our Annual Report on Form 10-K for the year ended December 31, 2023. \n\nThe interim consolidated financial statements and the accompanying notes have been prepared on the same basis as the \n\nannual consolidated financial statements and, in the opinion of management, reflect all adjustments, which include only normal \nrecurring adjustments, necessary for a fair statement of the results of operations for the periods presented. The consolidated \nresults of operations for any interim period are not necessarily indicative of the results to be expected for the full year or for any \nother future years or interim periods. \n\n\n \n \n \n \n [html]20242023\n
2024202318.831$
18.582$53.821$57.879739554
2.0711.3572.2281.416
6.6164.1882.7902.166
7.6866.15324.58822.718
70.19469.577446489
1.3801.620148143
40940925.182$
23.350$71.983$71.606
\n\nAutomotive Segment \n\nAutomotive Sales \n\nDeferred revenue related to the access to our Full Self Driving (Supervised) (“FSD”) Capability features and their \nongoing maintenance, internet connectivity, free Supercharging programs and over-the-air software updates primarily on \nautomotive sales amounted to $3.61 billion and $3.54 billion as of September 30, 2024 and December 31, 2023, respectively. \n\n10", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla \n\nalleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the \nCompany’s 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company’s \ncorporate governance and internal procedures, unspecified damages, and attorneys’ fees. The lawsuit has been stayed pending \nresolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below. \n\nOn November 15, 2021, JPMorgan Chase Bank (“JP Morgan”) filed a lawsuit against Tesla in the Southern District of \n\nNew York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In \n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he \nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021, \nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed \napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the \nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the \nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 \nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. \nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the \nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September \n12, 2024, the Court denied JP Morgan’s motion. \n\nCertain Derivative Lawsuits in Delaware \n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by \npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly \non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly \nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek \nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters \ninto a single case, and a hearing on that motion is scheduled for November 18, 2024. \n\nLitigation and Investigations Relating to Alleged Discrimination and Harassment \n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against \n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay \nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in \ndiscovery. Trial is scheduled for September 15, 2025. \n\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against \nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the \nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and \nseeking, among other things, monetary and injunctive relief.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "As discussed in and subject to the considerations referenced in Part I, Item 2, Management's Discussion and Analysis of \nFinancial Condition and Results of Operations—Management Opportunities, Challenges and Uncertainties and 2024 Outlook \n—Cash Flow and Capital Expenditure Trends in this Quarterly Report on Form 10-Q, we currently expect our capital \nexpenditures to support our projects globally to exceed $11.00 billion in 2024 and be between $8.00 to $10.00 billion in each of \nthe following two fiscal years. We also have certain obligations in connection with our operations at Gigafactory New York and \nGigafactory Shanghai, as outlined in Part II, Item 7, Management's Discussion and Analysis of Financial Condition and Results \nof Operations—Liquidity and Capital Resources—Material Cash Requirements in our Annual Report on Form 10-K for the \nyear ended December 31, 2023. \n\nAs of September 30, 2024, we and our subsidiaries had outstanding $7.42 billion in aggregate principal amount of \n\nindebtedness, of which $2.12 billion is current. For details regarding our indebtedness, refer to Note 7, Debt, to the \nconsolidated financial statements included elsewhere in this Quarterly Report on Form 10-Q. \n\nSources and Conditions of Liquidity \n\nOur sources to fund our material cash requirements are predominantly from our deliveries and servicing of new and used \n\nvehicles, sales and installations of our energy storage products, interest income, and proceeds from debt facilities and equity \nofferings, when applicable.", + "page_start": 42, + "page_end": 42, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "The following is a summary of our debt and finance leases as of December 31, 2023 (in millions): \n\nUnpaid \nPrincipal \nBalance Unused \nCommitted \nAmount (1) \n\nNet Carrying Value \n\nContractual \nInterest Rates Contractual \nMaturity Date Current Long-Term \n\n$ 37 $ — $ 37 $ — 2.00 % May 2024 \n— — — 5,000 Not applicable January 2028 \n— 7 7 28 4.70-5.75% March 2025-January 2031 \n37 7 44 5,028 \n\n1,906 2,337 4,259 — 0.60-6.57% July 2024-May 2031 \n28 330 367 — 5.25-5.81% July 2033-January 2035 \n4 8 13 — 4.80 % December 2026 \n1,938 2,675 4,639 — \n\n$ 4,683 $ 5,028 \n1,975 2,682 \n\n398 175 \n\n$ 2,373 $ 2,857 \n\nRecourse debt: \n2024 Notes \nRCF Credit Agreement \nOther \nTotal recourse debt \nNon-recourse debt: \nAutomotive Asset-backed Notes \nCash Equity Debt \nSolar Asset-backed Notes \n\nTotal non-recourse debt \n\nTotal debt \n\nFinance leases \n\nTotal debt and finance leases \n\n(1) \n\nThere are no restrictions on draw-down or use for general corporate purposes with respect to any available committed \nfunds under our RCF Credit Agreement, except certain specified conditions prior to draw-down. Refer to the notes to the \nconsolidated financial statements included in our reporting on Form 10-K for the year ended December 31, 2023 for the \nterms of the facility. \n\n(2) \n\nThe contractual maturity date of the China Working Capital Facility is April 2025, renewable until March 2026 at our \ndiscretion. As we have the intent and ability to refinance the loan on a long-term basis, we recorded it in Debt and \nfinance leases, net of current portion in the consolidated balance sheet. \n\nRecourse debt refers to debt that is recourse to our general assets. Non-recourse debt refers to debt that is recourse to \nonly assets of our subsidiaries. The differences between the unpaid principal balances and the net carrying values are due to \ndebt discounts or deferred issuance costs. As of September 30, 2024, we were in material compliance with all financial debt \ncovenants. \n\n2024 Notes \n\nDuring the second quarter of 2024, the 2024 Notes reached maturity and were fully settled. Additionally, during the third \nquarter of 2024, we settled the warrants entered into in connection with the issuance of the 2024 Notes, resulting in the issuance \nof 8.5 million shares of our common stock. The remaining warrants were settled in October 2024. \n\nAutomotive Asset-backed Notes \n\nDuring the nine months ended September 30, 2024, we transferred beneficial interests related to certain leased vehicles \n\nand financing receivables into special purpose entities and issued $1.57 billion in aggregate principal amount of Automotive \nAsset-backed Notes, with terms similar to our other previously issued Automotive Asset-backed Notes. The proceeds from the \nissuance, net of debt issuance costs, were $1.56 billion. \n\nIn October 2024, we transferred beneficial interests related to certain leased vehicles into a special purpose entity and \n\nissued $783 million in aggregate principal amount of Automotive Asset-backed Notes, with terms similar to our other \npreviously issued Automotive-backed Notes. \n\nChina Working Capital Facility \n\nIn April 2024, one of our subsidiaries entered into a loan agreement (the “China Working Capital Facility”) with lenders \nin China for an unsecured revolving facility of up to RMB 20.00 billion to be used for certain production expenditures as well \nas repayment of certain finance facilities. Borrowed funds bear interest at a rate equal to the Loan Prime Rate published by the \nPeople’s Bank of China minus 1.18%. The China Working Capital Facility is non-recourse to our assets.", + "page_start": 24, + "page_end": 24, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "Where was Tesla incorporated? ", + "target_page": 13, + "target_passage": "State of Delaware", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. \n\nUnaudited Interim Financial Statements \n\nThe consolidated financial statements, including the consolidated balance sheet as of September 30, 2024, the \nconsolidated statements of operations, the consolidated statements of comprehensive income, the consolidated statements of \nredeemable noncontrolling interests and equity for the three and nine months ended September 30, 2024 and 2023, and the \nconsolidated statements of cash flows for the nine months ended September 30, 2024 and 2023, as well as other information \ndisclosed in the accompanying notes, are unaudited. The consolidated balance sheet as of December 31, 2023 was derived from \nthe audited consolidated financial statements as of that date. The interim consolidated financial statements and the \naccompanying notes should be read in conjunction with the annual consolidated financial statements and the accompanying \nnotes contained in our Annual Report on Form 10-K for the year ended December 31, 2023. \n\nThe interim consolidated financial statements and the accompanying notes have been prepared on the same basis as the \n\nannual consolidated financial statements and, in the opinion of management, reflect all adjustments, which include only normal \nrecurring adjustments, necessary for a fair statement of the results of operations for the periods presented. The consolidated \nresults of operations for any interim period are not necessarily indicative of the results to be expected for the full year or for any \nother future years or interim periods. \n\n\n \n \n \n \n [html]20242023\n
2024202318.831$
18.582$53.821$57.879739554
2.0711.3572.2281.416
6.6164.1882.7902.166
7.6866.15324.58822.718
70.19469.577446489
1.3801.620148143
40940925.182$
23.350$71.983$71.606
\n\nAutomotive Segment \n\nAutomotive Sales \n\nDeferred revenue related to the access to our Full Self Driving (Supervised) (“FSD”) Capability features and their \nongoing maintenance, internet connectivity, free Supercharging programs and over-the-air software updates primarily on \nautomotive sales amounted to $3.61 billion and $3.54 billion as of September 30, 2024 and December 31, 2023, respectively. \n\n10", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "SIGNATURES \n\nPursuant to the requirements of Section 13 or 15(d) the Securities Exchange Act of 1934, the registrant has duly \ncaused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nTesla, Inc.", + "page_start": 48, + "page_end": 48, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint.", + "page_start": 28, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "UNITED STATES \nSECURITIES AND EXCHANGE COMMISSION \nWashington, D.C. 20549 \nFORM 10-Q \n\n(Mark One) \nx QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the quarterly period ended September 30, 2024 \nOR \no TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the transition period from__ ____ ___to__ ____ ___\n\nCommission File Number: 001-34756 \n\nTesla, Inc. \n\n(Exact name of registrant as specified in its charter) \n\nTexas 91-2197729 \n\n(State or other jurisdiction of \nincorporation or organization) (I.R.S. Employer \nIdentification No.) \n\n1 Tesla Road \nAustin, Texas \n(Address of principal executive offices) 78725 \n(Zip Code) \n\n(512) 516-8177 \n(Registrant’s telephone number, including area code) \nSecurities registered pursuant to Section 12(b) of the Act: \n\n\n \n \n \n \n [html]\n
Intle of each classTrading Symbol ( s )Name of each exchange on which registered
Common stockTSLAThe Nasdaq Global Select Market
\n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of \n\n1934 (“Exchange Act”) during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been \nsubject to such filing requirements for the past 90 days. Yes x No o \n\nIndicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 \n\nof Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). \nYes x No o \n\nIndicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, a smaller reporting company, or \n\nan emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company” and “emerging growth \ncompany” in Rule 12b-2 of the Exchange Act: \n\nx Accelerated filer \n\no Smaller reporting company \n\no \n\nIf an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised \nfinancial accounting standards provided pursuant to Section 13(a) of the Exchange Act. o \nIndicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes o No x \nAs of October 18, 2024, there were 3,210,059,659 shares of the registrant’s common stock outstanding.", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla \n\nalleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the \nCompany’s 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company’s \ncorporate governance and internal procedures, unspecified damages, and attorneys’ fees. The lawsuit has been stayed pending \nresolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below. \n\nOn November 15, 2021, JPMorgan Chase Bank (“JP Morgan”) filed a lawsuit against Tesla in the Southern District of \n\nNew York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In \n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he \nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021, \nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed \napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the \nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the \nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 \nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. \nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the \nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September \n12, 2024, the Court denied JP Morgan’s motion. \n\nCertain Derivative Lawsuits in Delaware \n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by \npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly \non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly \nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek \nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters \ninto a single case, and a hearing on that motion is scheduled for November 18, 2024. \n\nLitigation and Investigations Relating to Alleged Discrimination and Harassment \n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against \n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay \nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in \ndiscovery. Trial is scheduled for September 15, 2025. \n\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against \nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the \nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and \nseeking, among other things, monetary and injunctive relief.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of \nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust \nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan \nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30, \n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed \na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June \n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested \nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance \nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. \nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion, \nand a hearing was held on August 2, 2024. \n\nLitigation Related to Directors’ Compensation \n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted \nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and \nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their \nanswer on September 17, 2020. \n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve \n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and \ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to \nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which \nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint \nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a \nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial \nposition. \n\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and \n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On \nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of \nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for \nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of \na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, \n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a \nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, \n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals \nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our \nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related \nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver \nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class \nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on \nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a \nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state \nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to \namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, \n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On \nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, \n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order \nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD \nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court- \nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, \n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed \nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern \nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court \ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego \nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, \n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of \nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the \ncase pending arbitration. \n\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern", + "page_start": 28, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", + "target_page": 26, + "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Our provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased \nby $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, \n2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and \nincreased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended \nSeptember 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our \nU.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings. \n\nSee Note 9, Income Taxes, to the consolidated financial statements included elsewhere in this Quarterly Report on Form \n10-Q for further details. \n\nLiquidity and Capital Resources \n\nWe expect to continue to generate net positive operating cash flow as we have done in the last five fiscal years. The cash \n\nwe generate from our core operations enables us to fund ongoing operations and production, our research and development \nprojects for new products and technologies including our proprietary battery cells, additional manufacturing ramps at existing \nmanufacturing facilities, the construction of future factories, and the continued expansion of our retail and service locations, \nbody shops, Mobile Service fleet, Supercharger, including to support NACS, energy product installation capabilities and \nautonomy and other artificial intelligence enabled products. \n\nIn addition, because a large portion of our future expenditures will be to fund our growth, we expect that if needed we \n\nwill be able to adjust our capital and operating expenditures by operating segment. For example, if our near-term manufacturing \noperations decrease in scale or ramp more slowly than expected, including due to global economic or business conditions, we \nmay choose to correspondingly slow the pace of our capital expenditures. Finally, we continually evaluate our cash needs and \nmay decide it is best to raise additional capital or seek alternative financing sources to fund the rapid growth of our business, \nincluding through drawdowns on existing or new debt facilities or financing funds. Conversely, we may also from time to time \ndetermine that it is in our best interests to voluntarily repay certain indebtedness early. \n\nAccordingly, we believe that our current sources of funds will provide us with adequate liquidity during the 12-month \nperiod following September 30, 2024, as well as in the long-term. \n\nSee the sections below for more details regarding the material requirements for cash in our business and our sources of \nliquidity to meet such needs. \n\nMaterial Cash Requirements \n\nFrom time to time in the ordinary course of business, we enter into agreements with vendors for the purchase of \ncomponents and raw materials to be used in the manufacture of our products. However, due to contractual terms, variability in \nthe precise growth curves of our development and production ramps, and opportunities to renegotiate pricing, we generally do \nnot have binding and enforceable purchase orders under such contracts beyond the short-term, and the timing and magnitude of \npurchase orders beyond such period is difficult to accurately project.", + "page_start": 42, + "page_end": 42, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "$12 million in 2004. The increase is due to the full year of Borgata’s results, offset by a \nreduction to state income taxes in the fourth quarter of 2004. Borgata received a notice \nof refund of certain state tax credits and recorded a benefit for amounts earned in 2003 \nand 2004, which had previously been fully reserved. Our share of the adjustment was \n$12 million. We expect our share of the benefit of these tax credits to positively impact \nthis line item by approximately $8 million per year for the next three years. \n\nThe following table summarizes information related to our income taxes: \n\n\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Income from continuing operations
before income tax...................................................$ 55.815$343.660$
457.927Income tax provision..................................................205.959113.387168.451
Effective income tax rate............................................37.1 %33.0 %36.8 %Cash paid for income taxes..................................
$ 128.393$94.932$44.579
\n\ntax depreciation and the utilization of tax credit carryforwards. We utilized the last of \nthese credits in 2003, which resulted in the increase in our cash paid for taxes in 2004. \n\nWe are evaluating the impact of provisions of the American Jobs Creation Act of \n2004 (the “Act”) that provide for a special one-time tax deduction of 85 percent \non certain repatriated earnings of foreign subsidiaries. Additional guidance from \nCongress and/or the United States Treasury Department will be necessary for us to \ncomplete our evaluation, as it is not clear at this time whether the Act will provide \na benefit to us. We will complete our evaluation as soon as practicable following the \nissuance of guidance and adjust our taxes accordingly, if necessary. \n\nWe have not yet repatriated the net proceeds from the sale of MGM Grand \nAustralia pending our evaluation. Nonetheless, we provided in 2004 deferred U.S. \nincome taxes of $11 million on the basis that such proceeds would be repatriated \nwithout the benefit of the 85 percent one-time deduction. Such amount was \nincluded in the provision for income taxes on discontinued operations for 2004. \nWe considered the earnings of our Australia operations permanently reinvested \nprior to the sale of such operations. \n\nIf guidance is issued that indicates our planned repatriation qualifies for the one- \ntime deduction, we will recognize a tax benefit of approximately $7 million as part \nof continuing operations in the quarter in which such guidance is issued. If no such \nguidance is issued within the applicable timeframe, then we will attempt to \npermanently reinvest the proceeds in another foreign jurisdiction, such as Macau. \nIn such case, we would recognize a tax benefit of $11 million as part of continuing \noperations in the quarter in which the reinvestment is made. We currently do not \nhave a plan to reinvest the proceeds in such manner.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Energy Generation and Storage Segment \n\nEnergy Generation and Storage Sales \n\nWe record as deferred revenue any non-refundable amounts that are collected from customers related to prepayments, \n\nwhich is recognized as revenue ratably over the respective customer contract term. As of September 30, 2024 and \nDecember 31, 2023, deferred revenue related to such customer payments amounted to $1.73 billion and $1.60 billion, \nrespectively, mainly due to contractual payment terms. Revenue recognized from the deferred revenue balances as of \nDecember 31, 2023 and 2022 was $1.09 billion and $511 million for the nine months ended September 30, 2024 and 2023, \nrespectively. As of September 30, 2024, total transaction price allocated to performance obligations that were unsatisfied or \npartially unsatisfied for contracts with an original expected length of more than one year was $6.61 billion. Of this amount, we \nexpect to recognize $4.23 billion in the next 12 months and the rest over the remaining performance obligation period. \n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our energy \nproducts. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $32 million and $31 \nmillion, respectively, in Accounts receivable, net, and $641 million and $578 million, respectively, in Other non-current assets \nfor the long-term portion. \n\nIncome Taxes \n\nWe are subject to income taxes in the U.S. and in many foreign jurisdictions. Significant judgment is required in \ndetermining our provision for income taxes, our deferred tax assets and liabilities and any valuation allowance recorded against \nour net deferred tax assets that are not more likely than not to be realized. We monitor the realizability of our deferred tax assets \ntaking into account all relevant factors at each reporting period. In completing our assessment of realizability of our deferred \ntax assets, we consider our history of income (loss) measured at pre-tax income (loss) adjusted for permanent book-tax \ndifferences on a jurisdictional basis, volatility in actual earnings, excess tax benefits related to stock-based compensation in \nrecent prior years and impacts of the timing of reversal of existing temporary differences. We also rely on our assessment of the \nCompany’s projected future results of business operations, including uncertainty in future operating results relative to historical \nresults, volatility in the market price of our common stock and its performance over time, variable macroeconomic conditions \nimpacting our ability to forecast future taxable income, and changes in business that may affect the existence and magnitude of \nfuture taxable income. Our valuation allowance assessment is based on our best estimate of future results considering all \navailable information. \n\nOur provision for or benefit from income taxes for interim periods is determined using an estimate of our annual \neffective tax rate, adjusted for discrete items, if any, that are taken into account in the relevant period. Each quarter, we update \nour estimate of the annual effective tax rate, and if our estimated tax rate changes, we make a cumulative adjustment. \n\nNet Income per Share of Common Stock Attributable to Common Stockholders \n\nThe following table presents the reconciliation of net income attributable to common stockholders to net income used in \n\ncomputing basic and diluted net income per share of common stock (in millions): \n\nThree Months Ended September 30, Nine Months Ended September 30, \n\nNet income attributable to common stockholders \n\nLess: Buy-outs of noncontrolling interest \n\nNet income used in computing basic and diluted net \nincome per share of common stock", + "page_start": 15, + "page_end": 15, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "The effective income tax rate in 2004 was higher than in 2003 primarily due to the \naccrual of additional state deferred taxes related to capital investments in New Jersey, \nnon-deductible costs related to a Michigan ballot initiative, overseas development costs \nfor which no tax benefit was provided, and the reversal of a greater amount of tax \nreserves in 2003 compared to 2004 ($13 million in 2003 versus $6 million in 2004) \nas a result of completion of audits and the expiration of statutes of limitations. The \neffective income tax rate in 2003 was lower than in 2002 primarily due to the reversal \nof tax reserves in 2003. Excluding the reversal, our effective income tax rate was \napproximately the same in both periods. \n\nIn 2004, taxes paid increased from prior years, primarily due to increased book income \nand the full utilization of tax credit carryforwards in 2003. Except for 2003, when we \nmade payments to settle IRS audits of prior years, taxes paid have generally been \nsignificantly lower than our income tax provision. This is primarily due to accelerated", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Energy Generation and Storage Segment \n\nEnergy generation and storage revenue increased $817 million, or 52%, in the three months ended September 30, 2024 \nas compared to the three months ended September 30, 2023. Energy generation and storage revenue increased $2.43 billion, or \n53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases \nwere primarily due to increases in Megapack and Powerwall deployments compared to the prior periods. \n\n29", + "page_start": 35, + "page_end": 35, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "_78.442S91.092S175.777Supplemental Cash Flow InformationCash paid during the year for :Income taxes$ 53.463S47.251S31.179Interest6722.2485.195", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "We are focused on growing our manufacturing capacity, which includes capacity for manufacturing newer vehicle \nmodels such as our Cybertruck, Tesla Semi and future vehicles utilizing aspects of our next generation platform, and ramping \nthe production at our Gigafactories to their installed production capacities as well as increasing production rate and efficiency \nat our current factories. The next phase of production growth will depend on the continued ramp at our factories and be initiated \nby advances in autonomy and the introduction of new products, including those built on our next generation vehicle platform, \nas well as our ability to add to our available sources of battery cell supply by manufacturing our own cells that we are \ndeveloping to have high-volume output, lower capital and production costs and longer range. Our goals are to improve vehicle \nperformance, decrease production costs and increase affordability and customer awareness. \n\nThese plans are subject to uncertainties inherent in establishing and ramping manufacturing operations, which may be \n\nexacerbated by new product and manufacturing technologies we introduce, the number of concurrent international projects, any \nindustry-wide component constraints, labor shortages and any future impact from events outside of our control. For example, \nduring the first quarter of 2024, we experienced a sequential decline in production volumes partially caused by the early phase \nof the production ramp of the updated Model 3 at our Fremont factory, and factory shutdowns at Gigafactory Berlin- \nBrandenburg resulting from shipping diversions caused by the Red Sea conflict and an arson attack. Moreover, we have set \nambitious technological targets with our plans for battery cells as well as for iterative manufacturing and design improvements \nfor our vehicles with each new factory. \n\nAutomotive—Demand, Sales, Deliveries and Infrastructure \n\nOur cost reduction efforts, cost innovation strategies, and additional localized procurement and manufacturing are key to \n\nour vehicles’ affordability and have allowed us to competitively price our vehicles. We will also continue to generate demand \nby improving our vehicles’ performance and functionality, including through product offerings and features based on artificial \nintelligence such as Autopilot, FSD (Supervised), and other software, and delivering new vehicles and vehicle options. In \naddition, we have been increasing awareness, and expanding our vehicle financing programs, including attractive leasing terms \nfor our customers. Moreover, we expect to continue to benefit from ongoing electrification of the automotive sector and \nincreasing environmental regulations and initiatives.", + "page_start": 33, + "page_end": 33, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. \n\nIn light of these factors, our forecast for fiscal 2005 is as follows. This is based on a foreign \n\nexchange rate assumption for the year of ¥105 per dollar and ¥130 per euro: \n\n• Net revenue is predicted to be ¥9 trillion, up 4.9 percent. \n\n• Operating profit is expected to be ¥870 billion, up 1 percent. \n\n• Ordinary profit is expected to reach ¥860 billion, up 0.5 percent. \n\n• Net income is predicted to be ¥517 billion, up 0.9 percent. \n\n• Capital expenditures are expected to reach ¥540 billion, up 13.1 percent. \n\n• R&D expenses are forecast to reach ¥450 billion, or 5 percent of net sales, up 13.0 percent. \n\n• ROIC is expected to remain at or above 20 percent.", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "The increase in aggregate dollars in all periods presented is primarily a result of the expansion of our \noperations through internal growth and acquisitions. \n\nThe increase in cost of operations as a percentage of revenue from 2002 to 2003 and the decrease in cost \nof operations as a percentage of revenue from 2003 to 2004 is primarily attributable to higher self-insurance \nexpense in 2003. Self-insurance expense was $165.3 million, $189.5 million and $138.1 million for the years \nended December 31, 2004, 2003 and 2002, respectively. The increase in self-insurance expense in 2003 related \nto existing claims and was attributable to the expansion of our operations and various changes in estimates as a \nresult of continued negative trends through the 2003 policy year. \n\nExcluding self-insurance expense, cost of operations as a percentage of revenue increased during the year \nended December 31, 2004 versus the comparable 2003 period. This increase is primarily attributable to \nincreased fuel prices, labor costs and subcontracting costs associated with the long-haul transport of waste by \nthird-party vendors. Excluding self-insurance expense, cost of operations as a percentage of revenue decreased \nin 2003 versus the comparable 2002 period due to the elimination of closure and post-closure expense as a \ncomponent of cost of operations in accordance with SFAS 143 in 2003 and the termination of our operating \nlease facility in July 2002. This decrease was partially oÅset by increased fuel prices, an increase in waste taxes \nlevied on landÑll volumes in certain states, an increase in revenue generated by lines of business that produce \nlower operating margins and an increase in the long-haul transport of waste by third-party vendors. \n\nTo date in 2005, we have experienced a signiÑcant increase in fuel prices. We believe that cost of \noperations as a percentage of revenue may continue to remain high depending upon the cost of fuel, health \ninsurance, risk insurance and other key components of our cost structure and general economic conditions. \n\n*Depreciation, Amortization and Depletion of Property and Equipment.*Depreciation, amortization and \ndepletion expenses for property and equipment were $252.4 million, $233.8 million and $193.5 million, or, as a \npercentage of revenue, 9.3%, 9.3% and 8.2%, for the years ended December 31, 2004, 2003 and 2002, \nrespectively. The increase in aggregate dollars from 2003 to 2004 is primarily due to the expansion of our \noperations through internal growth and acquisitions. The increase in aggregate dollars and as a percentage of \nrevenue from 2002 to 2003 is primarily due to an increase in landÑll amortization associated with the adoption \nof SFAS 143. The remaining increase from 2002 to 2003 is due to increased depreciation expense resulting \nfrom capital expenditures, acquisitions and the purchase of equipment originally placed into service pursuant \nto an operating lease. \n\nIntangible assets consist primarily of cost in excess of fair value of \nnet assets acquired, but also includes values assigned to long-term contracts, covenants not to compete and \ncustomer relationships. Expenses for amortization of intangible assets were $7.0 million, $5.3 million and \n$6.1 million, or, as a percentage of revenue, .3%, .2% and .2%, for the years ended December 31, 2004, 2003 \nand 2002, respectively. The increase in such expenses in aggregate dollars and as a percentage of revenue from \n2003 to 2004 is primarily due to amortization expense on amounts that were recorded in other intangible assets \nduring the three months ended September 30, 2004 resulting from an extensive internal review of all recent \nacquisitions. The increase in amortization of intangible assets in aggregate dollars is also due to the \namortization of intangible assets associated with businesses acquired during 2004. \n\n*Amortization of Intangible Assets.*", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$", + "page_start": 7, + "page_end": 7, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", + "target_page": 6, + "target_passage": "The primary candidate for such mode is an optical phonon", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "R \n\nTo address this issue, we took a larger λ for the same \nωsf and re-did the calculation of the conductivities and \noptical integrals. The results for σ(ω) and ∆W (ωc) are \npresented in Fig. 22. We found the same behavior as be- \nfore, i.e., ∆WK is negative. But we also found that the \nlarger is the overall scale for the self-energy, the larger is a \nfrequency of zero-crossing of ∆W (ωc). In particular, for \nthe same λ and ωsf that were used in Ref. 33 to fit the NS \nconductivity data, the zero crossing is at ∼ 0.8 eV which \nis quite close to the bandwidth. This implies that at a \ntruly strong coupling the frequency at which ∆W (ωc) \nchanges sign can well be larger than the bandwidth of \n1eV in which case ∆W integrated up to the bandwidth \ndoes indeed remain positive. Such behavior would be \nconsistent with Refs.8,9. we also see from Fig. 22 that \n∆WK becomes small at a truly strong coupling, and over \na wide range of frequencies the behavior of ∆W (ωc) is \npredominantly governed by ∆f (ωc), i.e. by the cut-off \nterm.50 The implication is that, to first approximation, \n∆WK can be neglected and positive ∆W (wc) integrated \nto a frequency where it is still positive is almost compen- \nsated by the integral over larger frequencies. This again \nwould be consistent with the experimental data in Refs. \n8,9. \n\nWe considered four models: a BCS model with impu- \nrities, a model of fermions interacting with an Einstein \nboson, a phenomenological MFL model with impurities, \nand a model of fermions interacting with collective spin \nfluctuations. \nIn all cases, we found that ∆WK is neg- \native, but how it evolves with ωc and how much of the \nsum rule is recovered by integrating up to the bandwidth \ndepends on the model. \n\nIt is also instructive to understand the interplay be- \ntween the behavior of ∆W (ωc) and the behavior of the \ndifference of the kinetic energy between the SCS and the \nNS, δKE. We computed the kinetic energy as a function \nof λωsf and present the results in Fig. 23 for λ = 1 and \n10. For a relatively weak λ = 1 the behavior is clearly \nBCS like- δKE > 0 and increases with increasing λωsf . \nHowever, at large λ = 10, we see that the kinetic energy \nbegin decreasing at large λωsf and eventually changes \nsign. The behavior of δKE at a truly strong coupling is \n\nThe result most relevant to the experiments on the \ncuprates is obtained for the spin fluctuation model. \nWe found that at strong coupling, the zero-crossing of \nδW (ωc) occurs at a frequency which increases with the \ncoupling strength and may become larger than the band- \nwidth at a truly strong coupling. Still, at even larger \nfrequencies, ∆W (ωc) is negative.", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17) \n\nIn this Section we will use directly the results of the \nprevious Section to write down a Hamiltonian whose low \nenergy sector is described by the Kitaev model. The \nHamiltonian will be constructed on the physical spin lat- \ntice illustrated in FIG. 2. \nIn this Section we will use \nj, k to label four-spin clusters (pseudo-spin-1/2 sites), the \nphysical spins in cluster j are labeled as Sj1, . . . , Sj4. \nApply the mappings developed in Section II, we have \n\n1 \n√6 (cid:16)| ↓↓↑↑i \nτ z = P34 1 = \n| − i \n\n+ + ω \n| ↑↑↓↓i | ↑↓↓↑i \nτ z = +1 = \n\n| \nτ z = \n\ni \n\nτ z = +1 \n\nand similarly P34 \n. Therefore P34 \n= \ni \ni \nis just τ x in the physical singlet sector. A complete list \nof all permutation operators is given in TABLE I. We \ncan choose the following representation of τ x and τ y, \n\n1 \n| − | \n\nthe desired Hamiltonian in short notation, \n\nτ x = P12 = 2S1 \nτ y = (P13 \n\nS2 + 1/2 \n· \n(4) \nJxτ x \nj τ x \nk \nH = Hcluster \nP14)/√3 = (2/√3)S1 (S3 S4) \nX \ncluster \n− X \n− · − \n\nx−links \nJyτ y \nj τ y \nJzτ z \nj τ z \nk \nk − X − X \ny−links z−links \n\n(7) \n\nMany other representations are possible as well, because \nseveral physical spin interactions may correspond to the \nsame pseudo-spin interaction in the physical singlet sec- \ntor, and we will take advantage of this later. \n\nwhere j, k label the honeycomb lattice sites thus the four- \nspin clusters, Hcluster is given by (2), τ x,y,z should be \nreplaced by the corresponding physical spin operators in \n(4) and (5) or (6), or some other equivalent representa- \ntions of personal preference. \n\nFor τ z we can use τ z = iτ xτ y, where i is the imagi- \n− \nnary unit, \n\ni(2/√3)(2S1 S2 + 1/2)S1 (S3 S4) \n− · · −", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "modes of neighboring tetrahedra. And these coupling \nconstants λx,y,z need to be tuned to produce Jx,y,z of \nthe Kitaev model. This is still not easy to implement in \nsolid state systems. At lowest non-trivial order of pertur- \nbative expansion, we do get our model (9). Higher order \nterms in expansion destroy the exact solvability, but may \nbe controlled by the small parameters λx,y,z/k. \n\nthe desired Jx,y,z terms in (8) from the first and second \norder of perturbations. \n\nThe calculation can be dramatically simplified by the \nfollowing fact that any physical spin-1/2 operator Sx,y,z \nℓ \nconverts the cluster spin singlet states \ninto \nspin-1 states of the cluster. This can be checked by \nexplicit calculations and will not be proved here. For \nall the perturbations to be considered later, the above \nmentioned fact can be exploited to replace the factor \nHcluster k]−1 in the second order pertur- \n[0 \nHcluster j − \nbation to a c-number ( \n\nτ z = 1 \n| ± i \n\n2Jcluster)−1. \nThe detailed calculations are given in Appendix B. We \n− \n\nλx Hperturbation, x = λx[Sj1 \n\nSk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2). \n\nSk2)] \n· · \nJx(Sj1 \n\n− \nJx| · \n\n· · \n\nwhere λx = \nof Jx. \n\n12 Jcluster, sgn(Jx) = 1 is the sign \np | ± \n\nThe perturbation on y-links is \n\nIn this Subsection we consider more conventional per- \nturbations, magnetic interactions between the clusters, \nSk with j and k belong \ne.g. the Heisenberg coupling Sj · \nto different tetrahedra. This has the advantage over the \nprevious phonon approach for not introducing additional \ndegrees of freedom. But it also has a significant disad- \nvantage: the perturbation does not commute with the \ncluster Heisenberg Hamiltonian (2), so the cluster sin- \nglet subspace will be mixed with other total spin states. \nIn this Subsection we will use the spin-chirality represen- \ntation (6) for τ z. \n\nwill only list the results here. \nThe perturbation on x-links is given by \n\nλy Hperturbation, y \n\nSk1 + sgn(Jy) \nSj4 + Sk3 (Sj3 \nSk4) \n\nSj4) (Sk3 Sk4)] \n\nPjk = \nτ z \nj,k = s \n\n· \n(Sj3 \n· \n· \n\n− · − \n\n· \nJy| · \nThe perturbation on z-links is \n\n− | \n\nPs=±1 | ih \nJcluster. \n\nAgain consider two clusters j and k. For simplicity \nof notations define a projection operator \nPjPk, \nwhere \nPj,k is projection into the singlet subspace of clus- \nτ z \nj,k = \nter j and k, respectively, \nPj,k = \ns \n. For a given perturbation λ Hperturbation with small \n| \nparameter λ (in factor λ/Jcluster is the expansion param- \neter), lowest two orders of the perturbation series are \n\n=λy[Sj1 \nJy| \nwith λy = \n4 \np | \n\nλz Hperturbation, z \n\nPjk + λ2 \nHcluster k]−1(1 \n\n= λz[Sj2 \nJz| \nwith λz = 4 \n\n(Sk3 \n\nSk4) + sgn(Jz) \nSk4). \n\nSk2 (Sj3 Sj4)] λ \n\nPjkHperturbation \nHcluster j − \n[0 \n× \n\nPjkHperturbation(1 \n\n− Pjk) \n− Pjk)Hperturbation \n· \n(Sj3 × \nSj4 + Sk3 \n· · × \n\nPjk \n(15) \n− | \n\n· \nJz| · \n\n· \n− \n\nJcluster. \np| \nThe entire Hamiltonian Hmagnetic reads explicitly as, \n\n(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 Hmagnetic = \nX \ncluster j \n\n+ 12 \nJx| · \nJcluster Sj1 Sk1 + sgn(Jx) (Sj2 Sk2) Jx(Sj1 Sj2 + Sk1 Sk2) \nX \nx−links \n(cid:8)p (cid:2) (cid:3) − (cid:9) | · · · · · \n\n+ \n(cid:8)q4 Jy| · \nJcluster Sj1 (Sk3 Sk4) + sgn(Jy)Sk1 (Sj3 Sj4) \nJy| \n(Sj3 Sj4 + Sk3 \nX \ny−links \n(cid:2) (cid:3) − | | · − · − · \n\n+ \n4 \n(cid:8) Jz| · \nJcluster \nSj2 \n(cid:2) \n(Sk3 Sk4) + sgn(Jz)Sk2 (Sj3 Sj4) \nJz| \n(Sj3 Sj4 + Sk3 \nX \nz−links \np| (cid:3) − | · × · × ·", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. \n\nWe now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ \n\n) \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. \n\nThe most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. \n\n− \n\nmodel, where WK is larger in the NS for all Γ (see Fig. \nIn other words, the original MFLI model does not \n4). \nhave the BCSI theory as its limiting case. \n\nWe modified the MFLI model is a minimal way by \nΓ \nchanging the damping term in a SCS to \nω2+∆2 to be \nconsistent with BCSI model. We still use Eq. (18) for \nthe MFL term simply because this term was introduced \nin the NS on phenomenological grounds and there is no \nway to guess how it gets modified in the SCS state with- \n\n√ \n−", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "FIG. 3: The BCSI case with a dispersion linearized around the \nFermi surface. Evolution of the difference of optical integrals \nin the SCS and the NS with the upper cut-off ωc Observe \nthat the zero crossing point increases with impurity scattering \nrate Γ and also the ‘dip’ spreads out with increasing Γ. ∆ = \n30 meV \n\nFIG. 2: Distribution functions in four cases (a) BCSI model, \nwhere one can see that for ε > 0, SC>NS implying KE in- \ncreases in the SCS. (b) The original MFLI model of Ref. 30, \nwhere for ε > 0, SCNS, implying KE increases in the \nSCS. Observe that in the impurity-free CB model there is no \njump in n(ǫ) indicating lack of fermionic coherence. This is \nconsistent with ARPES39 \n\nFor a constant DOS, ∆W (ωc) = WSC (ωc) − WN S(ωc) \nis zero at ωc = ∞ and Kubo sum rule reduces to FGT \nsum rule. In Fig. 3 we plot for this case ∆W (ωc) as a \nfunction of the cutoff ωc for different Γ′s. The plot shows \nthe two well known features: zero-crossing point is below \n2∆ in the clean limit Γ << ∆ and is roughly 2Γ in the \ndirty limit21,40 The magnitude of the ‘dip’ decreases quite \nrapidly with increasing Γ. Still, there is always a point \nof zero crossing and ∆W (ωc) at large ωc approaches zero \nfrom below. \n(11) \n\nA. The BCS case \n\nIn BCS theory the quantity Z(ω) is given by \n\nΓ \n∆2 − (ω + iδ)2 \nZBCSI (ω) = 1 + \n\np and \n\nΣBCSI(ω) = ω (Z(ω) − 1) = iΓ \n\nWe now perform the same calculations in the presence \nof lattice dispersion. The results are summarized in Figs \n4,5, and 6. \nω \n(ω + iδ)2 − ∆2 \n(12) \n\nFig 4 shows conductivities σ(ω) in the NS and the SCS \nand Kubo sums WK plotted against impurity scattering \nΓ. We see that the optical integral in the NS is always \ngreater than in the SCS. The negative sign of ∆WK is \nsimply the consequence of the fact that nk is larger in the \nNS for ǫk < 0 and smaller for ǫk < 0, and ∇2ε~k closely \nfollows −ε~k for our choice of dispersion38), Hence nk is \nlarger in the NS for ∇2ε~k > 0 and smaller for ∇2ε~k < \n0 and the Kubo sum rule, which is the integral of the \nproduct of nk and ∇2ε~k (Eq. 3), is larger in the normal \nstate. \n\nWe also see from Fig. 4 that ∆WK decreases with Γ \nreflecting the fact that with too much impurity scattering \nthere is little difference in nk between NS and SCS. \n\np \n\nThis is consistent with having in the NS, Σ = iΓ in accor- \ndance with Eq 6. In the SCS, Σ(ω) is purely imaginary \nfor ω > ∆ and purely real for ω < ∆. The self-energy \nhas a square-root singularity at ω = ∆. \n\nIt is worth noting that Eq.12 is derived from the in- \ntegration over infinite band. If one uses Eq.6 for finite \nband, Eq.12 acquires an additional frequency dependence \nat large frequencies of the order of bandwidth (the low \nfrequency structure still remains the same as in Eq.12). \nIn principle, in a fully self-consistent analysis, one should \nindeed evaluate the self-energy using a finite bandwidth. \nIn practice, however, the self-energy at frequencies of or- \nder bandwidth is generally much smaller than ω and con- \ntribute very little to optical conductivity which predom- \ninantly comes from frequencies where the self-energy is \ncomparable or even larger than ω. Keeping this in mind, \nbelow we will continue with the form of self-energy de- \nrived form infinite band. We use the same argument for \nall four models for the self-energy.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "The study of low dimensional \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n4 \n\n] \nh \nc \ne \nm \n\n- \nt \na \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n1 \nv \n0 \n1 \n5 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nz \n\n~Si × ~Sj \nh \n. \n\nThe complex phase diagram unveiled by such MC sim- \nulations awaken however a further intriguing question: \nto what extent the observed behavior may be considered \na simple consequence of the competition between helical \norder and surface effects? I.e., is it just a matter of hav- \ning such a competition or does the range of interactions \nalso play a relevant role? Indeed, when the range of the \ninteractions is large enough we have a greater number of \nplanes which can be thought of as ”surface planes”, i.e. \nfor which the number of interacting neighbors are sig- \nnificantly reduced with respect to the bulk layers; there- \nfore, we expect that the larger the interaction range, the \nstronger should be the surface effects. But, at the same \ntime, the same modulation of the magnetic order can \n\ni \n\nFor these rare-earth elements, the development of new \nand sophisticated experimental methods11 has allowed to \nobtain ultra-thin films where the non-collinear modula- \ntion is comparable with the film thickness. Under such \nconditions the lack of translational invariance due to the \npresence of surfaces results decisive in order to observe \na drastic change of the magnetic structures12. Recent \nexperimental data on ultra-thin Holmium films13 have \nbeen lately interpreted and discussed14,15 on the basis \nof detailed classical Monte Carlo (MC) simulations of a \nspin Hamiltonian, which is believed to give a realistic \nmodeling of bulk Holmium. Such Hamiltonian, proposed \nby Bohr et al.16, allows for competitive middle-range in-", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "11 \n\nhigh-energy fermions and is an input for the low-energy \ntheory. Below we follow Refs. 31,33 and assume that \nthe momentum dependence of a collective boson is flat \nnear (π, π). The self energy within such model has been \nworked out consistently in Ref. 31,33. \nIn the normal \nstate \n\na SCS a gapless continuum described by Eq. (20) trans- \nforms into a gaped continuum, with a gap about 2∆ and \na resonance at ω = ω0 < 2∆, where for a d−wave gap we \ndefine ∆ as a maximum of a d−wave gap. \nThe spin susceptibility near (π, π) in a superconductor \ncan generally be written up as \n\nχQ \n1 − i Π(Ω) \nωsf \nω2 \nω2 1 \n2 \nχ(q ∼ Q, Ω) = (21) \nΣ′′(ω) = − λnωsf log 1 + \nsf ! \n\nω \nωsf \nΣ′(ω) = −λnωsf arctan \n\nwhere Π is evaluated by adding up the bubbles made \nout of two normal and two anomalous Green’s functions. \nBelow 2∆, Π(Ω) is real (∼ Ω2/∆ for small Ω), and the \nresonance emerges at Ω = ω0 at which Π(ω0) = ωsf . At \nfrequencies larger than 2∆, Π(Ω) has an imaginary part, \nand this gives rise to a gaped continuum in χ(Ω). \n\n(19) \n\nwhere λn is the spin-fermion coupling constant, and ωsf \nis a typical spin relaxation frequency of overdamped spin \ncollective excitations with a propagator \nThe imaginary part of the spin susceptibility around \n\nthe resonance frequency ω0 is31 \n\nχQ \n1 − i Ω \nωsf \nχ(q ∼ Q, Ω) = (20) \n\nπZoω0 \n2 \n\n′′ \nχ (q, Ω) = δ(Ω − ω0) (22) \n\nwhere χQ is the uniform static susceptibility. If we use \nOrnstein-Zernike form of χ(q) and use either Eliashberg \n45 or FLEX computational schemes48, we get rather sim- \nilar behavior of Σ as a function of frequency and rather \nsimilar behavior of optical integrals. \n\nwhere Zo ∼ 2 ωsf χ0/ ∂Π \n∂ω \n\n. The imaginary part \n| \nof the spin susceptibility describing a gaped continuum \nexists for for Ω ≥ 2∆ and is \n\nΩ=ω0 \n\nThe collective nature of spin fluctuations is reflected in \nthe fact that the coupling λ and the bosonic frequency \nωsf are related: λ scales as ξ2, where ξ is the bosonic \nmass (the distance to a bosonic instability), and ωsf ∝ \n2 (see Ref. 49). For a flat χ(q ∼ Q) the product λωsf \nξ− \ndoes not depend on ξ and is the overall dimensional scale \nfor boson-mediated interactions. \n\n′′ \nχ (q, Ω) = Im \n1 − 1 \nωsf \n\" \n\n(cid:0) \n\nχ0 \nπ∆2 \nΩ + i π \n≈ Im \n1 − 1 \nωsf 2 Ω \" # \n\n(cid:1) \nIn Eq. (23) D(x) = K1(x) \nK2(x) \n, and K1(x) and K2(x) \nare Elliptic integrals of first and second kind. The real \npart of χ is obtained by Kramers-Kr¨onig transform of the \nimaginary part. \n\n(cid:0) \n− \nx \n\nχ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In \n\nπZo \n2 \n\nω + ωo \nΣ′′A(ω) = \nλnωo Re \n(ω + ωo)2 − ∆2 ! \n\ncomes from the interaction with the resonance and \np \n\n2 \n1 − 4∆ \nx2 x \nωsf \n\nK2 \n2 \n(cid:16) \n+ \n\nE \n\nω + x \n(ω + x)2 − ∆2 \n\n| | \nΣ′′B(ω) = −λn \ndx Re \n\n(cid:17) \nK2 \n\n1 − 4∆2 \nxωsf \nh \n\n4∆2 \nx2 1 − 4∆2 \nx2 x \nωsf \n2∆ \nD \nZ \n\np \n(cid:1)i \nh \n(cid:1)i (cid:0) (cid:0) \n\ncomes from the interaction with the gaped continuum. The real part of Σ is obtained by Kramers-Kr¨onig trans-", + "page_start": 10, + "page_end": 10, + "source_file": "1001.0764.pdf" + }, + { + "text": "One major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. \n\nHcluster = (Jcluster/2) (S1 + S2 + S3 + S4)2 (2) \n\nThe energy levels should be apparent from this form: \none group of spin-2 quintets with energy 3Jcluster, three \ngroups of spin-1 triplets with energy Jcluster, and two spin \nsinglets with energy zero. We will consider large positive The outline of this paper is as follows. In Section II \nwe will lay out the pseudo-spin-1/2 construction. In Sec-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja- \ncobsen, “Benchmark density functional theory calculations for \nnanoscale conductance”, J. Chem. Phys. 128(11), 114714 (Mar. \n2008), doi:10.1063/1.2839275. \n\ning theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge \n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via \n\ncase, as we said, WK does not depend on temperature) \nand analyzed the T dependence of W (ωc) due to the T \ndependence of the cut-off term. They found a good agree- \nment with the experiments. This still does not solve the \nproblem fully as amount of the T dependence of WK in \nthe same model but with a lattice dispersion has not been \nanalyzed. For a superconductor, which of the two terms \ncontributes more, remains an open issue. At small fre- \nquencies, ∆W (ωc) between a SCS and a NS is positive \nsimply because σ(Ω) in a SCS has a δ−functional term. \nIn the models with a constant DOS, for which ∆WK = 0, \nprevious calculations21 show that ∆W (ωc) changes sign \nat some ωc, becomes negative at larger ωc and approaches \nzero from a negative side. The frequency when ∆W (ωc) \nchanges sign is of order ∆ at weak coupling, but increases \nas the coupling increases, and at large coupling becomes \ncomparable to a bandwidth (∼ 1eV ). At such frequencies \nthe approximation of a DOS by a constant is question- \nable at best, and the behavior of ∆W (ωc) should gen- \nerally be influenced by a nonzero ∆WK . In particular, \nthe optical integral can either remain positive for all fre- \nquencies below interband transitions (for large enough \npositive ∆WK), or change sign and remain negative (for \nnegative ∆WK ). The first behavior would be consistent \nwith Refs. 8,9, while the second would be consistent with \nRef. 10. ∆W can even show more exotic behavior with \nmore than one sign change (for a small positive ∆WK ). \nWe show various cases schematically in Fig.1. \n\nd2q \n(2π)2 χ(q, ω)G(k + q, ω + Ω) dω \n2π \nΣ(k, Ω) = 3g2 (6) \n\nZ \n\nwhere g is the spin-fermion coupling, and χ(q, ω) is the \nspin susceptibility whose dynamics changes between NS \nand SCS. \n\nFrom our analysis we found that the introduction of \na finite fermionic bandwidth by means of a lattice has \ngenerally a notable effect on both W and ∆W . We \nfound that for all models except for BCSI model, only \n70% − 80% of the optical spectral weight is obtained by \nintegrating up to the bandwidth. In these three models, \nthere also exists a wide range of ωc in which the behavior \nof ∆W (ωc) is due to variation of ∆f (ωc) which is domi- \nnant comparable to the ∆WK term. This dominance of \nthe cut off term is consistent with the analysis in Refs. \n21,22,33. \n\nω \nc ω \nc \n\n(4). The \nFIG. 1: Schematic behavior of ∆W vs ωc, Eq. \nis ∆WK given by Eq. (3) \nlimiting value of ∆W at ωc = \nDepending on the value of ∆WK, there can be either one sign \nchange of ∆W (panels a and c), or no sign changes (panel b), \nor two sign changes (panel d). \n\n∞", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What was the optical integral analysis proposed by Norman and Pépin?", + "target_page": 8, + "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "addressing the issue of the optical sum rule in the c−axis7 \nand in-plane conductivities 8–16 in overdoped, optimally \ndoped, and underdoped cuprates. The experimental re- \nsults demonstrated, above all, outstanding achievements \nof experimental abilities as these groups managed to de- \ntect the value of the optical integral with the accuracy \nof a fraction of a percent. The analysis of the change \nof the optical integral between normal and SCS is even \nmore complex because one has to (i) extend NS data to \nT < Tc and (ii) measure superfluid density with the same \naccuracy as the optical integral itself. \n\nThe analysis of the optical integral showed that in over- \ndoped cuprates it definitely decreases below Tc, in con- \nsistency with the expectations at weak coupling11. For \nunderdoped cuprates, all experimental groups agree that \na relative change of the optical integral below Tc gets \nmuch smaller. There is no agreement yet about the sign \nof the change of the optical integral : Molegraaf et al.8 \nand Santander-Syro et al.9 argued that the optical inte- \ngral increases below Tc, while Boris et al.10 argued that \nit decreases. \n\nin a given band is compensated by an appropriate change \nof the spectral weight in other bands such that the total \nspectral weight, integrated over all bands, is conserved, \nas in Eq. \n(1). Still, non-conservation of the spectral \nweight within a given band is an interesting phenomenon \nas the degree of non-conservation is an indicator of rele- \nvant energy scales in the problem. Indeed, when relevant \nenergy scales are much smaller than the Fermi energy, \ni.e., changes in the conductivity are confined to a near \nvicinity of a Fermi surface (FS), one can expand εk near \nkF as εk = vF (k − kF ) + (k − kF )2/(2mB) + O(k − kF )3 \nand obtain ∇2 \nε~k ≈ 1/mB [this approximation is equiv- \n~kx \nalent to approximating the density of states (DOS) by a \nconstant]. Then WK becomes πne2/(2mB) which does \nnot depend on temperature. The scale of the tempera- \nture dependence of WK is then an indicator how far in \nenergy the changes in conductivity extend when, e.g., a \nsystem evolves from a normal metal to a superconductor. \nBecause relevant energy scales increase with the interac- \ntion strength, the temperature dependence of WK is also \nan indirect indicator of whether a system is in a weak, \nintermediate, or strong coupling regime. \n\nTheoretical analysis of these results21,22,25,28,30 added \none more degree of complexity to the issue. It is tempt- \ning to analyze the temperature dependence of WK and \nrelate it to the observed behavior of the optical integral, \nand some earlier works25,28,30 followed this route. In the \nexperiments, however, optical conductivity is integrated \nonly up to a certain frequency ωc, and the quantity which \nis actually measured is \n\nIn a conventional BCS superconductor the only rele- \nvant scales are the superconducting gap ∆ and the impu- \nrity scattering rate Γ. Both are generally much smaller \nthan the Fermi energy, so the optical integral should be \nalmost T -independent, i.e., the spectral weight lost in a \nsuperconducting state at low frequencies because of gap \nopening is completely recovered by the zero-frequency δ- \nfunction. \nIn a clean limit, the weight which goes into \na δ−function is recovered within frequencies up to 4∆. \nThis is the essence of FGT sum rule 2,3. In a dirty limit, \nthis scale is larger, O(Γ), but still WK is T -independent \nand there was no “violation of sum rule”.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + }, + { + "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ε~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "2.5 \n2.6 \n\n*cv,*max \n2.5 \n2 \n2.4 \n\n2.3 \n1.5 \n*B*\n*k*\n2.2 \n*L*\n*/*\n*v*\n2.1 *c*\n1 20 30 40 70 50 60 \n\n*L*= 24 \n*L*= 32 \n*L*= 48 \n*L*= 64 \n0.5 \n\n0 \n0 20 40 60 \n\n80 \n*T*(K) \n\n100 120 140 \n\nFIG. 2: (color online) Specific heat cv per spin vs. temper- \nature for thickness n = 16 (for lateral dimension, see the \nlegend inside the figure). Inset: Maximum of cv vs. L ob- \ntained through MH technique. The continuum red line is a \npower law fit. \n\ndependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. \n\nl )2 + (my \n(mx \nl )2 , \nml = (2) \nq \n\nwhich is related to the SO(2) symmetry breaking. At the \nsame time, it turns out to be significant also the average \norder parameter of the film, defined as \n\nn \n\nThe thermodynamic observables we have investigated \n\nentering the definition of κ in Eq. (4)), we remind that \nsuch quantity has generally to be managed with particu- \nlar care, as discussed in details in Refs.14,15, where it was \nshown that the presence of block structures prevents us \nto unambiguously relate the evolution of S(~q) with the \nonset of helical order. However, for the specific case of \nthe model under investigation such integrated quantity \ncan still be considered a fairly significant order parame- \nter, as no block structures emerge from the simulations \n(see below). \n\ninclude the FM order parameter for each plane l: \n\n1 \nn \nM = ml . (3) \nXl=1 \n\nIn order to get a clear picture of the critical region and \nto give an accurate estimate of the critical temperature, \nwe look also at the following quantities \n\nTurning to the helical order, which is the relevant \nquantity for the Z2 × SO(2) symmetry, we can explore \nit along two different directions. The first one is by the \nintroduction of the chirality order parameter1,2 \n(6) \n\n(7) \n\n(8) \n\nu4(o) = 1 − (9) \n\ncv = nL2β2 \nhe2i − hei2 \n(cid:0) \n(cid:1) \nχo = nL2β \nho2i − hoi2 \n, \n(cid:0) \n∂βo = nL2 (hoei − hoihei) , \nho4i \n3ho2i2 , \n\n, \n\n(cid:1) \n\nwhere the sum refers to spins belonging to NN layers \ni and j, respectively, while Qz is the bulk helical pitch \nvector along the z direction. The second possibility is \nthat of looking at the integral of the structure factor: \n\nwhere β = 1/kBT , and o is one of the relevant observ- \nables, i.e. ml, M, κ, MHM . In this paper, we shall mainly \nlocate the critical temperature by looking at the intersec- \ntion of the graphs of the Binder cumulant25, Eq. (9), as a \nfunction of T obtained at different L. For clarity reasons, \nwe introduce also the following symbols: by TN (n) we \nwill denote the helical/fan phase transition temperature \nfor thickness n, TC(n) will instead indicate the order- \ning temperature of the sample as deduced by looking at \nthe behaviour of the average order parameter (3), while \nT l \nC(n) will be the l-th plane transition temperature re- \nlated to the order parameter defined in Eq. (2). \n\nπ \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "Optical Integral and Sum Rule Violation \n\nSaurabh Maiti, Andrey V. Chubukov \nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA \n(Dated: November 9, 2018) \n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in \nthe cuprates. We compute conductivities, optical integrals W , and ∆W between superconducting \nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different \nmodels – a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a \ncollective boson model with a feedback from superconductivity on a collective boson. The goal of \nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off (ωc) placed on \nthe optical integral because in experiments W is measured up to frequencies of order bandwidth. \nFor a BCS model, the Kubo sum rule is almost fully reproduced at ωc equal to the bandwidth. But \nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for \n∆W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign \nof ∆W . In all models we studied ∆W is positive at small ωc, then crosses zero and approaches a \nnegative value at large ωc, i.e. the optical integral in a superconductor is smaller than in a normal \nstate. The point of zero crossing, however, increases with the interaction strength and in a collective \nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model \nexhibits the behavior consistent with that in the cuprates. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n3 \n1 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nthe spectral weight under the δ-functional piece of the \nconductivity in the superconducting state. \n\nI. INTRODUCTION \n\nIn practice, the integration up to an infinite frequency \nis hardly possible, and more relevant issue for practical \napplications is whether a sum rule is satisfied, at least ap- \nproximately, for a situation when there is a single electron \nband which crosses the Fermi level and is well separated \nfrom other bands. Kubo considered this case in the same \npaper of 1957 and derived the expression for the “band”, \nor Kubo sum rule \n\nThe analysis of sum rules for optical conductivity has a \nlong history. Kubo, in an extensive paper1 in 1957, used \na general formalism of a statistical theory of irreversible \nprocesses to investigate the behavior of the conductivity \nin electronic systems. For a system of interacting elec- \ntrons, he derived the expression for the integral of the real \npart of a (complex) electric conductivity σ(Ω) and found \nthat it is independent on the nature of the interactions \nand reduces to \n′ \n∞ \n‘ \n\nπe2 \n2N \n∇2 \n~kx \nRe σ(Ω) dΩ = WK = \nε~k n~k \n(3) \n∞ \n(1) \n0 \nZ \nX~k \n\n2 \nv \n4 \n6 \n7 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nne2 \nm π \n2 \nRe σ(Ω) dΩ = \n\n0 \nZ \n\nHere n is the density of the electrons in the system and \nm is the bare mass of the electron. This expression is \nexact provided that the integration extends truly up to \ninfinity, and its derivation uses the obvious fact that at \nenergies higher than the total bandwidth of a solid, elec- \ntrons behave as free particles. \n\nThe independence of the r.h.s. of Eq. (1) on temper- \nature and the state of a solid (e.g., a normal or a super- \nconducting state – henceforth referred to as NS and SCS \nrespectively) implies that, while the functional form of \nσ(Ω) changes with, e.g., temperature, the total spectral \nweight is conserved and only gets redistributed between \ndifferent frequencies as temperature changes. This con- \nservation of the total weight of σ(Ω) is generally called a \nsum rule.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "Lett.**48**, 871 (1982). \n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and \nP. R. Rice, Phys. Rev. A**40**, 5516 (1989). \n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics**34**, \n297 (1995) \n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett,**93**, 250602 \n(2004). \n\n[12] A. D. Ludlow*et al.*, Opt. Lett.**32**, 641 (2007). \n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett.**101**, 260602 \n(2008). \n\n[14] J. Chen, and X.Chen, In*Proceedings of the 2005 IEEE Inter-*\n*national Frequency Control Symposium and Exposition*, (IEEE, \n2005), p.608. \n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- \n\nIn summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. \n\nletin**54**, 348 (2009). \n\n[16] D. Yu and J. Chen, Phys. Rev. A**78**, 013846 (2008). \n[17] J. Chen, In*Frequency Standards and Metrology: Proceedings*\n*of the 7th Symposium*, edited by Maleki Lute (World Scientific \nPublishing Company, 2009). \n\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful \ndiscussions. This work is supported by MOST of China \n(grant 2005CB724500, National Natural Science Foundation \nof China (grant 60837004, 10874009), National Hi-Tech Re- \nsearch and Development (863) Program. \n\nLett.**102**, 163601 (2009) \n\n[20] F. Strumia, Metrologia**8**, 85 (1972). \n[21] G. Kramer, J. Opt. Soc. Am.**68**, 1634 (1978). \n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR**32**, 455 \n(1972). \n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. \n\nPhys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. \n\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "SURFACE TUFT PHOTOGRAPHS \nFOR RECTANGULAR WING \nAR=2.31, k-l.0 \n\n\n\n\n\n\n\n\n\n8 \n\n\n\n\n\n\n\n\n18 \n\n\nFROM NACA TN 2674", + "page_start": 97, + "page_end": 97, + "source_file": "00-80T-80.pdf" + }, + { + "text": "∞ \n\nIn our work, we perform direct numerical calculations \nof optical integrals at T = 0 for a lattice dispersion ex- \ntracted from ARPES of the cuprates. The goal of our \nwork is two-fold. First, we perform calculations of the \noptical integral in the NS and analyze how rapidly W (ωc) \napproaches WK , in other words we check how much of \nthe Kubo sum is recovered up to the scale of the band- \nwidth. Second, we analyze the difference between optical \n\nWe also found that for all models except for the origi- \nnal version of the MFLI model the optical weight at the \nhighest frequencies is greater in the NS than in the SCS \n(i.e., ∆W < 0). This observation is consistent with the \nfindings of Abanov and Chubukov32, Benfatto et. al.28, \nand Karakozov and Maksimov34. \nIn the original ver- \nsion of the MFLI model30 the spectral weight in SCS \nwas found to be greater than in the NS (∆W > 0). We \nshow that the behavior of ∆W (ωc) in this model cru- \ncially depends on how the fermionic self-energy modeled \nto fit ARPES data in a NS is modified when a system \nbecomes a superconductor and can be of either sign. We \nalso found, however, that ωc at which ∆W becomes neg- \native rapidly increases with the coupling strength and at \nstrong coupling becomes comparable to the bandwidth. \nIn the CB model, which, we believe, is most appropriate \nfor the application to the cuprates, ∆WK = ∆W (∞) is \nquite small, and at strong coupling a negative ∆W (ωc) \nup to ωc ∼ 1eV is nearly compensated by the optical \nintegral between ωc and “infinity”, which, in practice, is", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "A + 2b \n2b(cid:12) \nA \n(cid:12) \n(cid:12) \n(cid:12) \niλhhh + \nh + iMhΓh \n\nI22 + J22 ln , \n\n(cid:12) \n(cid:12) \n(cid:12) \ni \n(cid:12) \n\n(cid:19) − \n− \n\ns \n− \n\n, \n\n4 \n\n∂Ψ \n∂h (cid:19) \n8 \n(cid:18)− \n2 \n\n(B8) \n\n∂Ψ \n∂h (cid:19) \n4m2 \n2b \n\n∂Ψ \n∂h \n(cid:18) \nN + A \n\n∂Ψ \n∂H \n\ni \n∗2 = 4mN λ3 \n2 M1M \n\nN (cid:18) \ns \n\nM 2 \nA + 2b \n2b(cid:12) \nA \n(cid:19) \n(cid:12) \n(cid:12) \n(cid:12) \n\nM 2 s \nH + iMHΓH \n− \n\n4 + ln (B9) − \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nwhere θ is the scattering angle in the center of mass frame. The auxiliary functions appear \n\n(cid:18)− \n− \n\nabove are defined as \n\ns(A + m2 3m2 4m2 \nN (s N ) N ) \nI22(s) , (B10) − − \n\n4a2 2m2 \nN )(m2 m2 \nh) \n2A(A + 2a) (s \nN − − − \n\n(B11) \n\n(B12) \n\nm2 b(s, mN , mh) (B13) \nhr ≡ r \n\n(A + 2a)2 2(s + 4m2 \n\nN )A \n− \nA2 \nA(s + 4m2 \n\n4 − \n\n4b2 \n− \nN ) + A2 \n\n≡ \n\n1 \nAb \n(cid:0) \n+3m2 \ns \n2 \ns \n4 − \n\nJ22(s, mh) \n≡ \n\n− \nN ) \n\n− \n\n4m2 \nN (s \n, \n\n− \n+ m2 \nh, \n(cid:1) \nA(s, mh) \n≡ − \n\ns \n4 − \nm2 \nN . \n\nIn partial wave expansion, the thermal averaged cross section is given by \n\ndw \nds (cid:19) \n\nT \nmN (cid:21)(cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n1 \nm2 \nN (cid:20) \ndw \nds (cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n3 \n2 (cid:18) \n4m2 \nN \nσv w(s) 2w(s) = \nh i − − \n\nT \nmN \n, = 6 \n\nwith \n\n4m2 \ns \n\ns d cos θ \n\n1 \n8π r \n2 = 2, \nfinal \n4w(s) dLIPS − \n\n2 X |M| \n≡ Z \nX |M| \nZ \n\nwhere mfinal is the mass of final state particle. \n\n[1] T. Yanagida, in Proceedings of Workshop on the Unified Theory and the Baryon Number in \n\nthe Universe, Tsukuba, Japan, edited by A. Sawada and A. Sugamoto (KEK, Tsukuba, 1979), \n\np 95; M. Gell-Mann, P. Ramond, and R. Slansky, in Supergravity, Proceedings of Workshop,", + "page_start": 11, + "page_end": 11, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What is the Ferrel-Glover-Tinkham sum rule?", + "target_page": 1, + "target_passage": "the redistribution of the spectral weight between normal and superconducting state", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Optical Integral and Sum Rule Violation \n\nSaurabh Maiti, Andrey V. Chubukov \nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA \n(Dated: November 9, 2018) \n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in \nthe cuprates. We compute conductivities, optical integrals W , and ∆W between superconducting \nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different \nmodels – a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a \ncollective boson model with a feedback from superconductivity on a collective boson. The goal of \nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off (ωc) placed on \nthe optical integral because in experiments W is measured up to frequencies of order bandwidth. \nFor a BCS model, the Kubo sum rule is almost fully reproduced at ωc equal to the bandwidth. But \nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for \n∆W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign \nof ∆W . In all models we studied ∆W is positive at small ωc, then crosses zero and approaches a \nnegative value at large ωc, i.e. the optical integral in a superconductor is smaller than in a normal \nstate. The point of zero crossing, however, increases with the interaction strength and in a collective \nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model \nexhibits the behavior consistent with that in the cuprates. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n3 \n1 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nthe spectral weight under the δ-functional piece of the \nconductivity in the superconducting state. \n\nI. INTRODUCTION \n\nIn practice, the integration up to an infinite frequency \nis hardly possible, and more relevant issue for practical \napplications is whether a sum rule is satisfied, at least ap- \nproximately, for a situation when there is a single electron \nband which crosses the Fermi level and is well separated \nfrom other bands. Kubo considered this case in the same \npaper of 1957 and derived the expression for the “band”, \nor Kubo sum rule \n\nThe analysis of sum rules for optical conductivity has a \nlong history. Kubo, in an extensive paper1 in 1957, used \na general formalism of a statistical theory of irreversible \nprocesses to investigate the behavior of the conductivity \nin electronic systems. For a system of interacting elec- \ntrons, he derived the expression for the integral of the real \npart of a (complex) electric conductivity σ(Ω) and found \nthat it is independent on the nature of the interactions \nand reduces to \n′ \n∞ \n‘ \n\nπe2 \n2N \n∇2 \n~kx \nRe σ(Ω) dΩ = WK = \nε~k n~k \n(3) \n∞ \n(1) \n0 \nZ \nX~k \n\n2 \nv \n4 \n6 \n7 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nne2 \nm π \n2 \nRe σ(Ω) dΩ = \n\n0 \nZ \n\nHere n is the density of the electrons in the system and \nm is the bare mass of the electron. This expression is \nexact provided that the integration extends truly up to \ninfinity, and its derivation uses the obvious fact that at \nenergies higher than the total bandwidth of a solid, elec- \ntrons behave as free particles. \n\nThe independence of the r.h.s. of Eq. (1) on temper- \nature and the state of a solid (e.g., a normal or a super- \nconducting state – henceforth referred to as NS and SCS \nrespectively) implies that, while the functional form of \nσ(Ω) changes with, e.g., temperature, the total spectral \nweight is conserved and only gets redistributed between \ndifferent frequencies as temperature changes. This con- \nservation of the total weight of σ(Ω) is generally called a \nsum rule.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "The issue of sum rule attracted substantial interest in \nthe studies of high Tc cuprates5–18,21–26 in which pairing \nis without doubts a strong coupling phenomenon. From a \ntheoretical perspective, the interest in this issue was orig- \ninally triggered by a similarity between WK and the ki- \nε~kn~k.18–20 For a model with a sim- \nnetic energy K = 2 \nple tight binding cosine dispersion εk ∝ (cos kx + cos ky), \nd2 ε~k \n∼ −ε~k and WK = −K. For a more complex dis- \nd k2 \nx \npersion there is no exact relation between WK and K, \nbut several groups argued 17,27,28 that WK can still be \nregarded as a good monitor for the changes in the kinetic \nenergy. Now, in a BCS superconductor, kinetic energy \nincreases below Tc because nk extends to higher frequen- \ncies (see Fig.2). At strong coupling, K not necessary \nincreases because of opposite trend associated with the \nfermions are more mobile in the \nfermionic self-energy: \nSCS due to less space for scattering at low energies than \nthey are in the NS. Model calculations show that above \nsome coupling strength, the kinetic energy decreases be- \n29. While, as we said, there is no one-to-one cor- \nlow Tc \nrespondence between K and WK, it is still likely that, \nwhen K decreases, WK increases. \n\nP \n\nωc \nW (ωc) = Re σ(Ω) dΩ = WK + f (ωc) \n\n0 \nZ ′ \n′ \n∞ \nf (ωc) = − Re σ(Ω) dΩ (4) \nωc \nZ \n\nThe Kubo formula, Eq. (3) is obtained assuming that \nthe second part is negligible. This is not guaranteed, \nhowever, as typical ωc ∼ 1 − 2eV are comparable to the \nbandwidth. \nThe differential sum rule ∆W is also a sum of two \nterms \n\n∆W (ωc) = ∆WK + ∆f (ωc) (5) \n\nwhere ∆WK is the variation of the r.h.s. of Eq. 3, \nand ∆f (ωc) is the variation of the cutoff term. Because \nconductivity changes with T at all frequencies, ∆f (ωc) \nalso varies with temperature. It then becomes the issue \nwhether the experimentally observed ∆W (ωc) is predom- \ninantly due to “intrinsic” ∆WK, or to ∆f (ωc). [A third \npossibility is non-applicability of the Kubo formula be- \ncause of the close proximity of other bands, but we will \nnot dwell on this.] \n\nFor the NS, previous works21,22 on particular models \nfor the cuprates indicated that the origin of the temper- \nature dependence of W (ωc) is likely the T dependence \nof the cutoff term f (ωc). Specifically, Norman et. al.22 \napproximated a fermionic DOS by a constant (in which", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + }, + { + "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ε~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "where n~k is the electronic distribution function and ε~k is \nthe band dispersion. Prime in the upper limit of the inte- \ngration has the practical implication that the upper limit \nis much larger than the bandwidth of a given band which \ncrosses the Fermi level, but smaller than the frequencies \nof interband transitions. Interactions with external ob- \njects, e.g., phonons or impurities, and interactions be- \ntween fermions are indirectly present in the distribution \nfunction which is expressed via the full fermionic Green’s \nm G(~k, ωm). For ǫk = k2/2m, \nfunction as n~k = T \nε~k = 1/m, WK = πne2/(2m), and Kubo sum rule \n∇2 \n~kx \nreduces to Eq. (1). In general, however, ε~k is a lattice \ndispersion, and Eqs. (1) and (3) are different. Most im- \nportant, WK in Eq. (3) generally depends on T and on \nthe state of the system because of n~k. In this situation, \nthe temperature evolution of the optical integral does not \nreduce to a simple redistribution of the spectral weight \n– the whole spectral weight inside the conduction band \nchanges with T . This issue was first studied in detail by \nHirsch 4 who introduced the now-frequently-used nota- \ntion “violation of the conductivity sum rule”. \n\nP \n\nOne particular case, studied in detail for conventional \nsuperconductors, \nis the redistribution of the spectral \nweight between normal and superconducting states. This \nis known as Ferrel-Glover-Tinkham (FGT) sum rule:2,3 \n\nπnse2 \n2m \n\n∞ \nRe σN S(Ω) = (2) \n0+ 0+ \nZ Z \n\nIn reality, as already pointed out by Hirsch, there is no \ntrue violation as the change of the total spectral weight where ns is the superfluid density, and πnse2/(2m) is", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "Sk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2) \n· \nJx(Sj1 \n− · · \n\n12 \np \n\nj τ x \n\n6Jcluster PjSj2 \nUse (S)2 = 3/4 and \n\n− \n\n(Sk3 \n\nSk4) \n× \nk3Sb \n(Sa (Sk3 \nk3Sb Sk4) \nk3Sb \nSa · \nk4Sa \n× \nk4 − \n\nwith λx = \nJcluster, and r = sgn(Jx) is the sign \nJx| · \n| \nof Jx. The non-trivial terms produced by up to second \norder perturbation will be the τ x \nk term. Note that the \nlast term in the above equation commutes with cluster \nHamiltonians so it does not produce second or higher \norder perturbations. \n\nk4Sb k3Sa \n= \nk4) \nX \na,b \n\nk3Sb \nSa k4Sb \nSa \n= (Sk3 Sk3)(Sk4 Sk4) \nk3[δab/2 k4] \n\n− X \na,b \nSk4) \n\n· · − \n\n= 9/16 + (Sk3 Sk4)(Sk3 (3/8)", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0266.pdf" + }, + { + "text": "[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "with frequency ω*j*\n)*j*is the “spin- \n| \nflip” operator for the jth atom, with its adjoint σ*j*\n)*j*. \n*a*\n| \n| \nThe coupling constant*g*is given by*g*= µ √ω/2~ǫ0*V*, where \nµ is the magnitude of the atomic dipole moment, and*V*is the \neffective volume of the cavity. \n\n*a*and ω*j*\n*b*, and σ*j*\n= ( *b*\n*a*\ni h | − \n+ = ( \n*b*\ni h \n\nIn order to denote the finite-time interaction between the \natoms and Ramsey separated field, we introduce the function \n\nΓ*j*(*t*) = Θ(*t* Θ(*t* τ)+Θ(*t* Θ(*t*\n\n*T*), \n(2) \nwhere Θ(*t*) is the Heaviside step function [Θ(*t*) = 1 for*t*> 0, \nΘ(*t*) = 1/2 for*t*= 0, and Θ(*t*) = 0 for*t*< 0].*T*is the free \ndrift time of the atoms, and τ is the interacting time between \nthe atom and one cavity. \n\nτ 2τ *t j*) \n*t j*− *t j*− \n*T*) \n*t j*− − − − − − − − − \n\n*Fk*(*t*)*Fl*(*t*′) \n(cid:11) \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*t*′) +*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) +*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) +*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) +*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n\nτ) *t*′ \n− \nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(7) \n− \n\nwhere*D*(*i*) \nfusion coefficients. \n\nBy the standard way [25], we can get the Heisenberg- \nLangevin equations of the motion for the single-atom and \nfiled operators. By introducing the macroscopic atomic oper- \nator,*M*(*t*) = \n*aa*(*t*),*Nb*(*t*) = \n*j*Γ*j*(*t*)σ*j*\n*bb*(*t*), the dynamic equations for the field and macro- \n\n*c-number correlation functions:*By choosing some partic- \nular ordering for products of atomic and field operators, one \ncould derive the c-number stochastic Langevin equations from \nthe quantum Langevin equations derived above, and all of the \ndynamic equations for c-number stochastic variables are the \nsame as in [26]. The differences are from the correlation func- \ntions. On the other hand, we convert the quantum noise oper- \nators into the c-number noise variables ˜*Fk*(*t*)(*k*=*a*,*b*,*M*,*M*†), \nwhose correlation functions are expressed as \n\n˙*a*(*t*) = *a*(*t*) +*gM*(*t*) +*F*κ(*t*), (3) \n\n*A*0 +*A*1 − \n(γ*a*+ γ′*a*)*Na*(*t*) \n\n*R*(1 \n*g*[*M*†(*t*)*a*(*t*) +*a*†(*t*)*M*(*t*)] +*Fa*(*t*), \n\n*A*2) \n− \n\n˜*Fk*(*t*) ˜*Fk*(*t*′) \nE \n\n(4) \n− \nτ) *t*′ \n− − \n˙*Nb*(*t*) = *B*1 +*B*2) \n*R*(*B*0 − \n\nγ*bNb*(*t*) + γ′*aNa*(*t*) \n\n− \n+*g*[*a*†(*t*)*M*(*t*) +*M*†(*t*)*a*(*t*)] +*Fb*(*t*), \n− \n(5) \n\n=*D*(0) \n(cid:10) \n+*D*(2) \n+*D*(4) \n+*D*(6) \n+*D*(8) \n\n− \n\n− \n\n− \n\n− \n\n*kl*(*k*,*l*=*a*,*b*,*M*,*M*†;*i*= 0, 1, 2) are the quantum dif- \n\n*j*Γ*j*(*t*)σ*j* *j*Γ*j*(*t*)σ*j* (*t*),*Na*(*t*) = *i*\n− − \nP P \n\nscopic atomic operators yield \nP \n\nκ \n2 − \n\n˙*Na*(*t*) = \n− \n\nD \n= ˜*D*(0) \n+ ˜*D*(2) \n+ ˜*D*(4) \n+ ˜*D*(6) \n+ ˜*D*(8) \n\n− \n\n− \n\n− \n˙*M*(*t*) = *C*1 +*C*2) γ*ab M*(*t*) \n\n*R*(*C*0 − \n− \n+*g*[*Na*(*t*) − \n*Nb*(*t*)]*a*(*t*) +*FM*(*t*), (6) \n− \n\nwhere the macroscopic noise operators are defined as \n\n*kl*are the c-number Langevin diffusion coefficients, \n*kl*as in \n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fa*(*t*) = \n*A*0 +*A*1 − \n*A*2) + *a*(*t*) \n*R*(1 \n− − \nX*j* X*j*\n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fb*(*t*) = \n*b*(*t*) +*R*(*B*0 − \n*B*1 +*B*2) + \n*b*(*t*), \nX*j* X*j*\n\n1 \n*T*− \n\n˙Γ*j*(*t*) ˜σ*j*\n− \nΓ*j*(*t*)*f j* *FM*(*t*) = \n(*t*) +*R*(*C*0 − \n*C*1 +*C*2) σ(*t*), \n*i* *i* 1 \n− − \n≪ X*j* X*j*\n\n*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*),", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "s \n4 \n+ m2 \nνs \ncos2 θ \n(cid:19) \n(cid:17) \n2 \n\n4m2 4m2 (s \nN )(s νs). \n− − \n\n(B3) \n\n2 = \n|M| \n2 \n\ng2 \nB \n− \nM 2 \nZ ′ + iMZ ′ΓZ ′ (cid:12) \n(cid:12) \n(cid:12) \n∂Ψ \ni \n(cid:12) \n∂h \n\nLqf qN \n\n3 \n8 \n1 \n2 (cid:16) \n\n1 \n2 (cid:16) \n∂Ψ \n∂H (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\n4m2 (s s 32 \nN ) \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n+4λ2 \n\ns (cid:18) − − \n\n− \nN λ2 \n∂Ψ \n∂h ∂Ψ \n∂H \n\ni \n+ \n\nνs (cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\nM 2 M 2 s \nh + iMhΓh \ns \nH + iMH ΓH \n− − \n\n2 \n\n∂Ψ \n∂h 1 \n2 \n\n1 \n2 = 8λ2 g2v \nN (cid:18) \n\nM 2 \nh + iMhΓh \ns \n2 \n2 − \n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n1 + \ns \n1 \n2M 4 \n\n(cid:19) |M| \n− \n\n4m2 (s \nN ) \n(cid:18) − \nW (cid:16) (cid:17) \n\n2 \n\n∂Ψ \n∂h \ns \n2 − \n\n(g2 + g′ 2)v \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nZ (cid:16) \n\ns \n\n(cid:19) \n1 \n2M 4 \n4m2 (s \nN ) \n1 + \n(cid:18) − \n\nM1 denotes the amplitude by s-channel Higgs bosons h and H exchange, while \n\nM2 does \nhH and HH can be \n\nthat for t(u)-channel N exchange diagram. The formulas for NN \nobtained by appropriate replacement of the vertexes, e.g., λhhh → \n2, \n\n→ \nλhhH. \n\n2 = \n\n|M1 + \ns \n2 − \n\n(B6) \nM2| |M| \n\n2 = λ2 \nN 2m2 \nN \n|M1| \n\n(cid:16) \n∂Ψ \n∂h \n\n(cid:17) \n2 \ni \n\n∂Ψ \n∂H \n\ni \niλhhh + \n\niλHhh(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\n, (B7) \nM 2 M 2 \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \n\ns \nh + iMhΓh \ns \nH + iMH ΓH \n− − \n\n11", + "page_start": 10, + "page_end": 10, + "source_file": "1002.2525.pdf" + }, + { + "text": "divergence between the approximate posterior q(s) and the exact posterior, which is also \nsometimes called the perceptual divergence: \n\nq(s) \np(s|o) \nDKL[q(s)∥p(s|o)] = ∑ \nq(s) ln (2) \ns \n\nIt is a property of the KL divergence that the two distributions are identical when \nDKL[q(s)∥p(s|o)] = 0. Minimising this divergence then corresponds to approximating \nthe exact posterior p(s|o) with q(s). We cannot evaluate this divergence directly since the \nexact posterior is still unknown. We therefore replace the expression of the exact posterior \nwith the right-hand side of Equation (1). Note that here we use the joint likelihood p(o, s) \nnotation, fraction rule a = a \nb ∗ c and logarithmic rule ln(a ∗ b) = ln a + ln b: \nb \nc \n\nq(s) \np(o,s) \np(o) \nq(s) \np(o, s) \n∑ \ns = ∑ \ns \nq(s) ln q(s) ln + ln p(o) (3) \n\nWe can now rewrite the first term of the right-hand side as the KL divergence of the \napproximate posterior from the joint likelihood, which is equal to the expression used in \nEquation (2): \n\nDKL[q(s)∥p(s|o)] = DKL[q(s)∥p(o, s)] + ln p(o) \n(4) \n\nWe now define the VFE (F [q(s), o]) as the KL divergence of the approximate posterior from \nthe joint likelihood. The VFE is only a function of q(s) and o (and the generative model m), \nand we can therefore calculate it without knowing the model evidence p(o): \n\nq(s) \np(o, s) \nF ≜ DKL[q(s)∥p(o, s)] = ∑ \nq(s) ln (5) \ns \n\nThe probability-weighted sum can be rewritten as an expectation, and the joint likelihood \ncan be decomposed into a prior and a likelihood: \n\n(cid:20) (cid:21) \n\nq(s) \np(o, s) \nF ≜ E = E \nq(s)[ln q(s) − ln p(o|s) − ln p(s)] \nln (6) \nq(s) \n\nWe can now combine our definition of VFE with Equation (4): \n\nDKL[q(s)∥p(s|o)] = F [q(s), o] + ln p(o) \n(7) \n\nFinally, we can reorganise this equation to show that the VFE is the sum of the divergence of \nthe approximation posterior and exact posterior (if we could perform exact inference, this is \nwhat we would obtain) and the surprise ℑ = − ln(p(o)) (the negative log model evidence): \n\nF [q(s), o] = DKL[q(s)∥p(s|o)] \n(cid:125) \n− ln p(o) \n(cid:125) \n(cid:123)(cid:122) \n(cid:124) \nSurprise \n\n(8) \n(cid:124) \n(cid:123)(cid:122) \nDivergence \n\nSince the KL divergence is non-negative, the VFE becomes an upper bound on the surprise: \n\nF [q(s), o] ≥ − ln p(o) (9) \n\nBy rearranging the parts of this expression, we can express the VFE as a balance between \nthe complexity and accuracy, where the accuracy is how well the model predicts observa- \ntion, and the complexity is how much the beliefs need to change in order to maintain a \nhigh accuracy:", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What does Kitaev show about spin- 1/2 model?", + "target_page": 1, + "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. \n\nto realize non-Abelian anyons. The model simply reads \n\nJyτ y \nj τ y \nJxτ x \nj τ x \nHKitaev = \nk − X \nk \n− X \nx−links y−links \n\nJzτ z j τ z \nk \n− X \nz−links \n\n(1) \n\n0 \n1 \n0 \n2 \n\ny \na \nM \n4 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n2 \nv \n6 \n6 \n2 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nwhere τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | \n\n\n \n \n \n \n [html]\n
II. Formulation of the Pseudo - spin - 1 / 2 from Four - spin Cluster.III. Realization of the Kitaev Model.
3IV. Generate the High Order Physical Spin
Interactions by Perturbative Expansion. A. Generate the High Order Terms by Coupli5
to Optical Pluonon.5
B. Generate the High Order Terms by Magnetic Interactions between Clusters.τ
V. Conclusions.8
Acknowledgments8
A. Coupling between Distortions of a Tetrahedron and the Pseudo - spins8
B. Derivation of the Terms Generated by Second Order Perturbation of Inter - cluste Magnetic Interactions9
References10
", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17) \n\nIn this Section we will use directly the results of the \nprevious Section to write down a Hamiltonian whose low \nenergy sector is described by the Kitaev model. The \nHamiltonian will be constructed on the physical spin lat- \ntice illustrated in FIG. 2. \nIn this Section we will use \nj, k to label four-spin clusters (pseudo-spin-1/2 sites), the \nphysical spins in cluster j are labeled as Sj1, . . . , Sj4. \nApply the mappings developed in Section II, we have \n\n1 \n√6 (cid:16)| ↓↓↑↑i \nτ z = P34 1 = \n| − i \n\n+ + ω \n| ↑↑↓↓i | ↑↓↓↑i \nτ z = +1 = \n\n| \nτ z = \n\ni \n\nτ z = +1 \n\nand similarly P34 \n. Therefore P34 \n= \ni \ni \nis just τ x in the physical singlet sector. A complete list \nof all permutation operators is given in TABLE I. We \ncan choose the following representation of τ x and τ y, \n\n1 \n| − | \n\nthe desired Hamiltonian in short notation, \n\nτ x = P12 = 2S1 \nτ y = (P13 \n\nS2 + 1/2 \n· \n(4) \nJxτ x \nj τ x \nk \nH = Hcluster \nP14)/√3 = (2/√3)S1 (S3 S4) \nX \ncluster \n− X \n− · − \n\nx−links \nJyτ y \nj τ y \nJzτ z \nj τ z \nk \nk − X − X \ny−links z−links \n\n(7) \n\nMany other representations are possible as well, because \nseveral physical spin interactions may correspond to the \nsame pseudo-spin interaction in the physical singlet sec- \ntor, and we will take advantage of this later. \n\nwhere j, k label the honeycomb lattice sites thus the four- \nspin clusters, Hcluster is given by (2), τ x,y,z should be \nreplaced by the corresponding physical spin operators in \n(4) and (5) or (6), or some other equivalent representa- \ntions of personal preference. \n\nFor τ z we can use τ z = iτ xτ y, where i is the imagi- \n− \nnary unit, \n\ni(2/√3)(2S1 S2 + 1/2)S1 (S3 S4) \n− · · −", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "x x \ny y \nz z z \nx x x x \ny y y \nz z z z \nx x x x \ny y y \nz z z z \nx x x \ny y y \n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled \nand open circles indicate two sublattices. x, y, z label the links \nalong three different directions used in (1). \n\nderived as well. There have been several proposals to \nopen the fermion gap for the non-Abelian phase without \nspoiling exact solvability4,6. And many generalizations \nto other(even 3D) lattices have been developed in the \nlast few years10–16. All these efforts have significantly \nenriched our knowledge of exactly solvable models and \nquantum phases of matter. \n\nFIG. 2: Left: the physical spin lattice for the model (8). The \ndash circles are honeycomb lattice sites, each of which is ac- \ntually a cluster of four physical spins. The dash straight lines \nare honeycomb lattice bonds, with their type x, y, z labeled. \nThe interaction between clusters connected by x, y, z bonds \nare the Jx,y,z terms in (8) or (9) respectively. Note this is not \nthe 3-12 lattice used in Ref.9,10. Right: enlarged picture of \nthe clusters with the four physical spins labeled as 1, . . . , 4. \nThick solid bonds within one cluster have large antiferromag- \nnetic Heisenberg coupling Jcluster. \n\nHowever, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. \n\nIn this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions,", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = Jz (16/9)[Sj2 (Sj3 Sj4)][Sk2 (Sk3 Sk4)] \nX \nj \n− X · × · × \nz−links \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\n(8) \n\n(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = \nX \nj \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\nJz ( 4/3)(2Sj3 Sj4 + 1/2)[Sj1 (Sj3 Sj4)](2Sk3 Sk4 + 1/2)[Sk1 (Sk3 Sk4)] \n− X − · · − · · − \nz−links \n\n(9) \n\nin terms of physical spins S, has full \nspin rotation symmetry and time-reversal symmetry. A \npseudo-magnetic field term \n~τj term can also be \nincluded under this mapping, however the resulting Ki- \ntaev model with magnetic field is not exactly solvable. \nIt is quite curious that such a formidably looking Hamil- \ntonian (8), with biquadratic and six-spin(or eight-spin) \nterms, has an exactly solvable low energy sector. \n\nThis model, \n\n~h \nPj · \n\nNote that the original Kitaev model (1) has three- \nfold rotation symmetry around a honeycomb lattice site, \ncombined with a three-fold rotation in pseudo-spin space \n(cyclic permutation of τ x, τ y, τ z). This is not apparent \nin our model (8) in terms of physical spins, under the \ncurrent representation of τ x,y,z. We can remedy this by \nusing a different set of pseudo-spin Pauli matrices τ ′x,y,z \nin (7), \n\n′x = \nτ \nτ ′y = \n′z = 1/3τ z + \n1/3τ z \n1/3τ z 2/3τ x, \n1/6τ x + \n1/6τ x \n\np \n\n1/2τ y, \n1/2τ y \np \nτ \np \n− p − p \n\nWith proper representation choice, they have a symmet- \nric form in terms of physical spins, \n\n′x = \nτ \nτ ′y = \nτ ′z = (4/3)S4 (S2 S3) + 2/3(2S1 S4 + 1/2) \n\nWe emphasize that because the first intra-cluster term \nPcluster Hcluster commutes with the latter Kitaev terms \nindependent of the representation used, the Kitaev model \nis realized as the exact low energy Hamiltonian of this \nmodel without truncation errors of perturbation theories, \n/Jcluster)2 or higher order terms will \nnamely no ( \n| \nbe generated under the projection to low energy clus- \nter singlet space. This is unlike, for example, the t/U \nexpansion of the half-filled Hubbard model22,23, where \nat lowest t2/U order the effective Hamiltonian is the \nHeisenberg model, but higher order terms (t4/U 3 etc.) \nshould in principle still be included in the low energy ef- \nfective Hamiltonian for any finite t/U . Similar compari- \nson can be made to the perturbative expansion studies of \nthe Kitaev-type models by Vidal et al.9, where the low \nenergy effective Hamiltonians were obtained in certian \nanisotropic (strong bond/triangle) limits. Although the \nspirit of this work, namely projection to low energy sec- \ntor, is the same as all previous perturbative approaches \nto effective Hamiltonians. \n\nJx,y,z| \n\n(4/3)S2 (S3 S4) + 2/3(2S1 S2 + 1/2) \np \n− · × · \n(4/3)S3 (S4 S2) + 2/3(2S1 S3 + 1/2) \np \n− · × · \n\np \n− · × · \n(10) \n\nSo the symmetry mentioned above can be realized by a \nthree-fold rotation of the honeycomb lattice, with a cyclic \npermutation of S2, S3 and S4 in each cluster. This is in \nfact the three-fold rotation symmetry of the physical spin \nlattice illustrated in FIG. 2. However this more symmet- \nric representation will not be used in later part of this \npaper.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "modes of neighboring tetrahedra. And these coupling \nconstants λx,y,z need to be tuned to produce Jx,y,z of \nthe Kitaev model. This is still not easy to implement in \nsolid state systems. At lowest non-trivial order of pertur- \nbative expansion, we do get our model (9). Higher order \nterms in expansion destroy the exact solvability, but may \nbe controlled by the small parameters λx,y,z/k. \n\nthe desired Jx,y,z terms in (8) from the first and second \norder of perturbations. \n\nThe calculation can be dramatically simplified by the \nfollowing fact that any physical spin-1/2 operator Sx,y,z \nℓ \nconverts the cluster spin singlet states \ninto \nspin-1 states of the cluster. This can be checked by \nexplicit calculations and will not be proved here. For \nall the perturbations to be considered later, the above \nmentioned fact can be exploited to replace the factor \nHcluster k]−1 in the second order pertur- \n[0 \nHcluster j − \nbation to a c-number ( \n\nτ z = 1 \n| ± i \n\n2Jcluster)−1. \nThe detailed calculations are given in Appendix B. We \n− \n\nλx Hperturbation, x = λx[Sj1 \n\nSk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2). \n\nSk2)] \n· · \nJx(Sj1 \n\n− \nJx| · \n\n· · \n\nwhere λx = \nof Jx. \n\n12 Jcluster, sgn(Jx) = 1 is the sign \np | ± \n\nThe perturbation on y-links is \n\nIn this Subsection we consider more conventional per- \nturbations, magnetic interactions between the clusters, \nSk with j and k belong \ne.g. the Heisenberg coupling Sj · \nto different tetrahedra. This has the advantage over the \nprevious phonon approach for not introducing additional \ndegrees of freedom. But it also has a significant disad- \nvantage: the perturbation does not commute with the \ncluster Heisenberg Hamiltonian (2), so the cluster sin- \nglet subspace will be mixed with other total spin states. \nIn this Subsection we will use the spin-chirality represen- \ntation (6) for τ z. \n\nwill only list the results here. \nThe perturbation on x-links is given by \n\nλy Hperturbation, y \n\nSk1 + sgn(Jy) \nSj4 + Sk3 (Sj3 \nSk4) \n\nSj4) (Sk3 Sk4)] \n\nPjk = \nτ z \nj,k = s \n\n· \n(Sj3 \n· \n· \n\n− · − \n\n· \nJy| · \nThe perturbation on z-links is \n\n− | \n\nPs=±1 | ih \nJcluster. \n\nAgain consider two clusters j and k. For simplicity \nof notations define a projection operator \nPjPk, \nwhere \nPj,k is projection into the singlet subspace of clus- \nτ z \nj,k = \nter j and k, respectively, \nPj,k = \ns \n. For a given perturbation λ Hperturbation with small \n| \nparameter λ (in factor λ/Jcluster is the expansion param- \neter), lowest two orders of the perturbation series are \n\n=λy[Sj1 \nJy| \nwith λy = \n4 \np | \n\nλz Hperturbation, z \n\nPjk + λ2 \nHcluster k]−1(1 \n\n= λz[Sj2 \nJz| \nwith λz = 4 \n\n(Sk3 \n\nSk4) + sgn(Jz) \nSk4). \n\nSk2 (Sj3 Sj4)] λ \n\nPjkHperturbation \nHcluster j − \n[0 \n× \n\nPjkHperturbation(1 \n\n− Pjk) \n− Pjk)Hperturbation \n· \n(Sj3 × \nSj4 + Sk3 \n· · × \n\nPjk \n(15) \n− | \n\n· \nJz| · \n\n· \n− \n\nJcluster. \np| \nThe entire Hamiltonian Hmagnetic reads explicitly as, \n\n(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 Hmagnetic = \nX \ncluster j \n\n+ 12 \nJx| · \nJcluster Sj1 Sk1 + sgn(Jx) (Sj2 Sk2) Jx(Sj1 Sj2 + Sk1 Sk2) \nX \nx−links \n(cid:8)p (cid:2) (cid:3) − (cid:9) | · · · · · \n\n+ \n(cid:8)q4 Jy| · \nJcluster Sj1 (Sk3 Sk4) + sgn(Jy)Sk1 (Sj3 Sj4) \nJy| \n(Sj3 Sj4 + Sk3 \nX \ny−links \n(cid:2) (cid:3) − | | · − · − · \n\n+ \n4 \n(cid:8) Jz| · \nJcluster \nSj2 \n(cid:2) \n(Sk3 Sk4) + sgn(Jz)Sk2 (Sj3 Sj4) \nJz| \n(Sj3 Sj4 + Sk3 \nX \nz−links \np| (cid:3) − | · × · × ·", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "chirality interactions in cold atom optical lattices has \nbeen proposed38. system. And convert them to pseudo-spin notation in \nthe physical spin singlet sector. \n\nOur model (8) is achieved at second order of the per- \nturbation series. Higher order terms become trunca- \ntion errors but may be controlled by small parameters \nλx,y,z/Jcluster \n\nConsider a general small distortion of the tetrahedron, \nthe spin Hamiltonian becomes \n\nJx,y,z| \n′ \nSℓ)2 + J Hcluster, SL = (Jcluster/2)( \nδrℓm(Sℓ · \nSm) \n∼ p| \nX \nℓ X \nℓ 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "form \n\nJ ′(QE \n1 f E 1 + QE 2 f E \n2 ) \n\nwhere J ′ is the derivative of Heisenberg coupling Jcluster \nbetween two spins ℓ and m with respect to their distance \nrℓm, J ′ = dJcluster/drℓm; QE \n1,2 are the generalized coor- \ndinates of these two modes; and the functions f E \n1,2 are \n\nwhere λ (in fact λ/k) is the expansion parameter. \nConsider the perturbation Hperturbation = QE \n\nQE \n1k, \n1j · \nwhich means a coupling between the QE \n1 distortion \nmodes of the two tetrahedra. Integrate out the optical \nphonons, at lowest non-trivial order, it produces a term \n(3 J ′2 λ)/(4 k2) τ x \nτ x \nk . This can be seen by minimizing \nj · \nseparately the two cluster Hamiltonians with respect to \n1 = (√3 J ′)/(2 k)τ x, then plug this \nQE \ninto the perturbation term. Thus we have produced the \n(3 J ′2 λ)/(4 k2). \nJx term in the Kitaev model with Jx = \nQE \n2k \nτ y \nk at lowest non-trivial \n\n1 , which gives QE \n\n− \nSimilarly the perturbation Hperturbation = QE \n2j · \n\nwill generate (3 J ′2 λ)/(4 k2) τ y \nj · \n(3 J ′2 λ)/(4 k2). \norder. So we can make Jy = \n− \nτ z \nk coupling is more difficult to get. We \nj τ y \nτ x \nk . By the above reasoning, we \nj · \n2j · \nIt will produce at lowest non-trivial or- \nk . Thus we have Jz = \nj τ y \nj · \nk τ y \nτ x \n\nf E \n2 = (1/2)(S2 \nf E \n1 = \n\nS4 + S1 S3 S1 S4 S2 S3), \n\n· \n1/12(S1 · \nS4 + S2 · \nS3 + S2 \n− \n· \nS4 + S1 \n− \nS3 \np \n· \n2S1 · \n2S3 · \nS4). \n· \nS2 \n\n− \n· \nAccording to TABLE I we have f E \n2 = (√3/2)τ y. Then the coupling becomes \nf E \n\n· − \n\nThe τ z \nj · \ntreat it as \nneed an anharmonic coupling Hperturbation = QE \nQE \nder (9 J ′4 λ)/(16 k4) τ x \n(9 J ′4 λ)/(16 k4). \n\n(√3/2)τ x and \n1 = \n− \nk τ y \nτ x \n\nis [equation (1.8) in Ref.35], \n\nFinally we have made up a spin-lattice model HSL, \nSm interaction for physical spins, \nwhich involves only Sℓ · \n2j)2 \n(QE \n\n(13) \nHcluster, SL + \n\nX \nx−links \nQE \n2k \nλy QE \n2j · \n\nQE \n\nλx QE \nQE \n1k \nHSL = \n1j · \nX \ncluster \n\n+ \nX \ny−links \n\nλz QE \n1jQE 1kQE \n2k \n+ \n2j · \nX \nz−links \n\n1j is the generalized coordinate for the QE \n2j, QE 1k, QE \n\n− \n\nHamiltonian HSL explicitly written as, \n\nk \n2 \nJ ′(QE \n\nk \n2 \n1j)2 + \n(QE Hcluster j, SL =Hcluster j + \n\n√3 \n2 \n2jτ y 1jτ x \nQE \nj ), \nj − − \n\nwhere k > 0 is the elastic constant for these phonon \nmodes, J ′ is the spin-lattice coupling constant, QE \n1j and \nQE \n1 and QE \n2j are the generalized coordinates of the QE \n2 \ndistortion modes of cluster j, Hcluster j is (2). As al- \nready noted in Ref.35, this model does not really break \nthe pseudo-spin rotation symmetry of a single cluster. \n\nwhere QE \n1 mode \non cluster j, and QE \n2k are similarly defined; \n(4Jx,yk2)/(3J ′2) and λz = (16Jzk4)/(9J ′4); the \nλx,y = \nsingle cluster spin-lattice Hamiltonian Hcluster, SL is (13). \nCollect the results above we have the spin-lattice \n\nNow we put two clusters j and k together, and in- \nclude a perturbation λ Hperturbation to the optical phonon \nHamiltonian, \n\nHjk,SL =Hcluster j, SL + Hcluster k, SL \n+ λ Hperturbation[QE \n1j, QE 2j, QE 1k, QE \n2k] \n\nk \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links \n\nThe single cluster spin-lattice Hamiltonian [first three \nlines in (14)] is quite natural. However we need some harmonic(on x- and y-links of honeycomb lattice) and an- \nharmonic coupling (on z-links) between optical phonon", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "How can fractionalised Majorana fermion excitations be understood?", + "target_page": 1, + "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "R \n\nTo address this issue, we took a larger λ for the same \nωsf and re-did the calculation of the conductivities and \noptical integrals. The results for σ(ω) and ∆W (ωc) are \npresented in Fig. 22. We found the same behavior as be- \nfore, i.e., ∆WK is negative. But we also found that the \nlarger is the overall scale for the self-energy, the larger is a \nfrequency of zero-crossing of ∆W (ωc). In particular, for \nthe same λ and ωsf that were used in Ref. 33 to fit the NS \nconductivity data, the zero crossing is at ∼ 0.8 eV which \nis quite close to the bandwidth. This implies that at a \ntruly strong coupling the frequency at which ∆W (ωc) \nchanges sign can well be larger than the bandwidth of \n1eV in which case ∆W integrated up to the bandwidth \ndoes indeed remain positive. Such behavior would be \nconsistent with Refs.8,9. we also see from Fig. 22 that \n∆WK becomes small at a truly strong coupling, and over \na wide range of frequencies the behavior of ∆W (ωc) is \npredominantly governed by ∆f (ωc), i.e. by the cut-off \nterm.50 The implication is that, to first approximation, \n∆WK can be neglected and positive ∆W (wc) integrated \nto a frequency where it is still positive is almost compen- \nsated by the integral over larger frequencies. This again \nwould be consistent with the experimental data in Refs. \n8,9. \n\nWe considered four models: a BCS model with impu- \nrities, a model of fermions interacting with an Einstein \nboson, a phenomenological MFL model with impurities, \nand a model of fermions interacting with collective spin \nfluctuations. \nIn all cases, we found that ∆WK is neg- \native, but how it evolves with ωc and how much of the \nsum rule is recovered by integrating up to the bandwidth \ndepends on the model. \n\nIt is also instructive to understand the interplay be- \ntween the behavior of ∆W (ωc) and the behavior of the \ndifference of the kinetic energy between the SCS and the \nNS, δKE. We computed the kinetic energy as a function \nof λωsf and present the results in Fig. 23 for λ = 1 and \n10. For a relatively weak λ = 1 the behavior is clearly \nBCS like- δKE > 0 and increases with increasing λωsf . \nHowever, at large λ = 10, we see that the kinetic energy \nbegin decreasing at large λωsf and eventually changes \nsign. The behavior of δKE at a truly strong coupling is \n\nThe result most relevant to the experiments on the \ncuprates is obtained for the spin fluctuation model. \nWe found that at strong coupling, the zero-crossing of \nδW (ωc) occurs at a frequency which increases with the \ncoupling strength and may become larger than the band- \nwidth at a truly strong coupling. Still, at even larger \nfrequencies, ∆W (ωc) is negative.", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "∞ \n\nIn our work, we perform direct numerical calculations \nof optical integrals at T = 0 for a lattice dispersion ex- \ntracted from ARPES of the cuprates. The goal of our \nwork is two-fold. First, we perform calculations of the \noptical integral in the NS and analyze how rapidly W (ωc) \napproaches WK , in other words we check how much of \nthe Kubo sum is recovered up to the scale of the band- \nwidth. Second, we analyze the difference between optical \n\nWe also found that for all models except for the origi- \nnal version of the MFLI model the optical weight at the \nhighest frequencies is greater in the NS than in the SCS \n(i.e., ∆W < 0). This observation is consistent with the \nfindings of Abanov and Chubukov32, Benfatto et. al.28, \nand Karakozov and Maksimov34. \nIn the original ver- \nsion of the MFLI model30 the spectral weight in SCS \nwas found to be greater than in the NS (∆W > 0). We \nshow that the behavior of ∆W (ωc) in this model cru- \ncially depends on how the fermionic self-energy modeled \nto fit ARPES data in a NS is modified when a system \nbecomes a superconductor and can be of either sign. We \nalso found, however, that ωc at which ∆W becomes neg- \native rapidly increases with the coupling strength and at \nstrong coupling becomes comparable to the bandwidth. \nIn the CB model, which, we believe, is most appropriate \nfor the application to the cuprates, ∆WK = ∆W (∞) is \nquite small, and at strong coupling a negative ∆W (ωc) \nup to ωc ∼ 1eV is nearly compensated by the optical \nintegral between ωc and “infinity”, which, in practice, is", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "11 \n\nhigh-energy fermions and is an input for the low-energy \ntheory. Below we follow Refs. 31,33 and assume that \nthe momentum dependence of a collective boson is flat \nnear (π, π). The self energy within such model has been \nworked out consistently in Ref. 31,33. \nIn the normal \nstate \n\na SCS a gapless continuum described by Eq. (20) trans- \nforms into a gaped continuum, with a gap about 2∆ and \na resonance at ω = ω0 < 2∆, where for a d−wave gap we \ndefine ∆ as a maximum of a d−wave gap. \nThe spin susceptibility near (π, π) in a superconductor \ncan generally be written up as \n\nχQ \n1 − i Π(Ω) \nωsf \nω2 \nω2 1 \n2 \nχ(q ∼ Q, Ω) = (21) \nΣ′′(ω) = − λnωsf log 1 + \nsf ! \n\nω \nωsf \nΣ′(ω) = −λnωsf arctan \n\nwhere Π is evaluated by adding up the bubbles made \nout of two normal and two anomalous Green’s functions. \nBelow 2∆, Π(Ω) is real (∼ Ω2/∆ for small Ω), and the \nresonance emerges at Ω = ω0 at which Π(ω0) = ωsf . At \nfrequencies larger than 2∆, Π(Ω) has an imaginary part, \nand this gives rise to a gaped continuum in χ(Ω). \n\n(19) \n\nwhere λn is the spin-fermion coupling constant, and ωsf \nis a typical spin relaxation frequency of overdamped spin \ncollective excitations with a propagator \nThe imaginary part of the spin susceptibility around \n\nthe resonance frequency ω0 is31 \n\nχQ \n1 − i Ω \nωsf \nχ(q ∼ Q, Ω) = (20) \n\nπZoω0 \n2 \n\n′′ \nχ (q, Ω) = δ(Ω − ω0) (22) \n\nwhere χQ is the uniform static susceptibility. If we use \nOrnstein-Zernike form of χ(q) and use either Eliashberg \n45 or FLEX computational schemes48, we get rather sim- \nilar behavior of Σ as a function of frequency and rather \nsimilar behavior of optical integrals. \n\nwhere Zo ∼ 2 ωsf χ0/ ∂Π \n∂ω \n\n. The imaginary part \n| \nof the spin susceptibility describing a gaped continuum \nexists for for Ω ≥ 2∆ and is \n\nΩ=ω0 \n\nThe collective nature of spin fluctuations is reflected in \nthe fact that the coupling λ and the bosonic frequency \nωsf are related: λ scales as ξ2, where ξ is the bosonic \nmass (the distance to a bosonic instability), and ωsf ∝ \n2 (see Ref. 49). For a flat χ(q ∼ Q) the product λωsf \nξ− \ndoes not depend on ξ and is the overall dimensional scale \nfor boson-mediated interactions. \n\n′′ \nχ (q, Ω) = Im \n1 − 1 \nωsf \n\" \n\n(cid:0) \n\nχ0 \nπ∆2 \nΩ + i π \n≈ Im \n1 − 1 \nωsf 2 Ω \" # \n\n(cid:1) \nIn Eq. (23) D(x) = K1(x) \nK2(x) \n, and K1(x) and K2(x) \nare Elliptic integrals of first and second kind. The real \npart of χ is obtained by Kramers-Kr¨onig transform of the \nimaginary part. \n\n(cid:0) \n− \nx \n\nχ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In \n\nπZo \n2 \n\nω + ωo \nΣ′′A(ω) = \nλnωo Re \n(ω + ωo)2 − ∆2 ! \n\ncomes from the interaction with the resonance and \np \n\n2 \n1 − 4∆ \nx2 x \nωsf \n\nK2 \n2 \n(cid:16) \n+ \n\nE \n\nω + x \n(ω + x)2 − ∆2 \n\n| | \nΣ′′B(ω) = −λn \ndx Re \n\n(cid:17) \nK2 \n\n1 − 4∆2 \nxωsf \nh \n\n4∆2 \nx2 1 − 4∆2 \nx2 x \nωsf \n2∆ \nD \nZ \n\np \n(cid:1)i \nh \n(cid:1)i (cid:0) (cid:0) \n\ncomes from the interaction with the gaped continuum. The real part of Σ is obtained by Kramers-Kr¨onig trans-", + "page_start": 10, + "page_end": 10, + "source_file": "1001.0764.pdf" + }, + { + "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. \n\nWe now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ \n\n) \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. \n\nThe most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. \n\n− \n\nmodel, where WK is larger in the NS for all Γ (see Fig. \nIn other words, the original MFLI model does not \n4). \nhave the BCSI theory as its limiting case. \n\nWe modified the MFLI model is a minimal way by \nΓ \nchanging the damping term in a SCS to \nω2+∆2 to be \nconsistent with BCSI model. We still use Eq. (18) for \nthe MFL term simply because this term was introduced \nin the NS on phenomenological grounds and there is no \nway to guess how it gets modified in the SCS state with- \n\n√ \n−", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. \n\nOn a more careful look, we found that indifference of \nδW (ωc) to the increase of λ is merely the consequence of \nthe fact that above we kept λωsf constant. Indeed, at \nsmall frequencies, fermionic self-energy in the NS is Σ′ = \nλω, Σ” = λ2ω2/(λωsf ), and both Σ′ and Σ′′ increase \nwith λ if we keep λωsf constant. But at frequencies larger \nthan ωsf , which we actually probe by ∆W (ωc), the self- \nenergy essentially depends only on λωsf , and increasing λ \nbut keeping λωsf constant does not bring us closer to the \nphysics associated with the recovery of electron coherence \nin the SCS. To detect this physics, we need to see how \nthings evolve when we increase λωsf above the scale of \n∆ , i.e., consider a truly strong coupling when not only \nλ ≫ 1 but also the normal state ΣN S(ω ≥ ∆) >> ∆. \n\nIn this work we analyzed the behavior of optical in- \nωc \no σ(ω)dω and Kubo sum rules in \ntegrals W (ωc) ∝ \nthe normal and superconducting states of interacting \nfermionic systems on a lattice. Our key goal was to \nunderstand what sets the sign of ∆WK = ∆W (∞) be- \ntween the normal and superconducting states and what \nis the behavior of W (ωc) and ∆W (ωc) at finite ωc. In a \nweak coupling BCS superconductor, ∆W (ωc) is positive \nat ωc < 2∆ due to a contribution from superfluid den- \nsity, but becomes negative at larger ωc, and approach a \nnegative value of ∆WK. Our study was motivated by fas- \ncinating optical experiments on the cuprates7–10. In over- \ndoped cuprates, there is clear indication11 that ∆W (ωc) \nbecomes negative above a few ∆, consistent with BCS \nbehavior. In underdoped cuprates, two groups argued8,9 \nthat ∆W integrated up to the bandwidth remains posi- \ntive, while the other group argued10 that it is negative. \nThe reasoning why ∆WK may potentially change sign \nat strong coupling involves the correlation between −WK \nand the kinetic energy. \nIn the BCS limit, kinetic en- \nergy obviously increases in a SCS because of gap opening, \nhence −WK increases, and ∆WK is negative. At strong \ncoupling, there is a counter effect – fermions become more \nmobile in a SCS due to a smaller self-energy. \n\nR", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via \n\ncase, as we said, WK does not depend on temperature) \nand analyzed the T dependence of W (ωc) due to the T \ndependence of the cut-off term. They found a good agree- \nment with the experiments. This still does not solve the \nproblem fully as amount of the T dependence of WK in \nthe same model but with a lattice dispersion has not been \nanalyzed. For a superconductor, which of the two terms \ncontributes more, remains an open issue. At small fre- \nquencies, ∆W (ωc) between a SCS and a NS is positive \nsimply because σ(Ω) in a SCS has a δ−functional term. \nIn the models with a constant DOS, for which ∆WK = 0, \nprevious calculations21 show that ∆W (ωc) changes sign \nat some ωc, becomes negative at larger ωc and approaches \nzero from a negative side. The frequency when ∆W (ωc) \nchanges sign is of order ∆ at weak coupling, but increases \nas the coupling increases, and at large coupling becomes \ncomparable to a bandwidth (∼ 1eV ). At such frequencies \nthe approximation of a DOS by a constant is question- \nable at best, and the behavior of ∆W (ωc) should gen- \nerally be influenced by a nonzero ∆WK . In particular, \nthe optical integral can either remain positive for all fre- \nquencies below interband transitions (for large enough \npositive ∆WK), or change sign and remain negative (for \nnegative ∆WK ). The first behavior would be consistent \nwith Refs. 8,9, while the second would be consistent with \nRef. 10. ∆W can even show more exotic behavior with \nmore than one sign change (for a small positive ∆WK ). \nWe show various cases schematically in Fig.1. \n\nd2q \n(2π)2 χ(q, ω)G(k + q, ω + Ω) dω \n2π \nΣ(k, Ω) = 3g2 (6) \n\nZ \n\nwhere g is the spin-fermion coupling, and χ(q, ω) is the \nspin susceptibility whose dynamics changes between NS \nand SCS. \n\nFrom our analysis we found that the introduction of \na finite fermionic bandwidth by means of a lattice has \ngenerally a notable effect on both W and ∆W . We \nfound that for all models except for BCSI model, only \n70% − 80% of the optical spectral weight is obtained by \nintegrating up to the bandwidth. In these three models, \nthere also exists a wide range of ωc in which the behavior \nof ∆W (ωc) is due to variation of ∆f (ωc) which is domi- \nnant comparable to the ∆WK term. This dominance of \nthe cut off term is consistent with the analysis in Refs. \n21,22,33. \n\nω \nc ω \nc \n\n(4). The \nFIG. 1: Schematic behavior of ∆W vs ωc, Eq. \nis ∆WK given by Eq. (3) \nlimiting value of ∆W at ωc = \nDepending on the value of ∆WK, there can be either one sign \nchange of ∆W (panels a and c), or no sign changes (panel b), \nor two sign changes (panel d). \n\n∞", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. \n\nto realize non-Abelian anyons. The model simply reads \n\nJyτ y \nj τ y \nJxτ x \nj τ x \nHKitaev = \nk − X \nk \n− X \nx−links y−links \n\nJzτ z j τ z \nk \n− X \nz−links \n\n(1) \n\n0 \n1 \n0 \n2 \n\ny \na \nM \n4 \n\n] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\n2 \nv \n6 \n6 \n2 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nwhere τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | \n\n\n \n \n \n \n [html]\n
II. Formulation of the Pseudo - spin - 1 / 2 from Four - spin Cluster.III. Realization of the Kitaev Model.
3IV. Generate the High Order Physical Spin
Interactions by Perturbative Expansion. A. Generate the High Order Terms by Coupli5
to Optical Pluonon.5
B. Generate the High Order Terms by Magnetic Interactions between Clusters.τ
V. Conclusions.8
Acknowledgments8
A. Coupling between Distortions of a Tetrahedron and the Pseudo - spins8
B. Derivation of the Terms Generated by Second Order Perturbation of Inter - cluste Magnetic Interactions9
References10
", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "FIG. 3: The BCSI case with a dispersion linearized around the \nFermi surface. Evolution of the difference of optical integrals \nin the SCS and the NS with the upper cut-off ωc Observe \nthat the zero crossing point increases with impurity scattering \nrate Γ and also the ‘dip’ spreads out with increasing Γ. ∆ = \n30 meV \n\nFIG. 2: Distribution functions in four cases (a) BCSI model, \nwhere one can see that for ε > 0, SC>NS implying KE in- \ncreases in the SCS. (b) The original MFLI model of Ref. 30, \nwhere for ε > 0, SCNS, implying KE increases in the \nSCS. Observe that in the impurity-free CB model there is no \njump in n(ǫ) indicating lack of fermionic coherence. This is \nconsistent with ARPES39 \n\nFor a constant DOS, ∆W (ωc) = WSC (ωc) − WN S(ωc) \nis zero at ωc = ∞ and Kubo sum rule reduces to FGT \nsum rule. In Fig. 3 we plot for this case ∆W (ωc) as a \nfunction of the cutoff ωc for different Γ′s. The plot shows \nthe two well known features: zero-crossing point is below \n2∆ in the clean limit Γ << ∆ and is roughly 2Γ in the \ndirty limit21,40 The magnitude of the ‘dip’ decreases quite \nrapidly with increasing Γ. Still, there is always a point \nof zero crossing and ∆W (ωc) at large ωc approaches zero \nfrom below. \n(11) \n\nA. The BCS case \n\nIn BCS theory the quantity Z(ω) is given by \n\nΓ \n∆2 − (ω + iδ)2 \nZBCSI (ω) = 1 + \n\np and \n\nΣBCSI(ω) = ω (Z(ω) − 1) = iΓ \n\nWe now perform the same calculations in the presence \nof lattice dispersion. The results are summarized in Figs \n4,5, and 6. \nω \n(ω + iδ)2 − ∆2 \n(12) \n\nFig 4 shows conductivities σ(ω) in the NS and the SCS \nand Kubo sums WK plotted against impurity scattering \nΓ. We see that the optical integral in the NS is always \ngreater than in the SCS. The negative sign of ∆WK is \nsimply the consequence of the fact that nk is larger in the \nNS for ǫk < 0 and smaller for ǫk < 0, and ∇2ε~k closely \nfollows −ε~k for our choice of dispersion38), Hence nk is \nlarger in the NS for ∇2ε~k > 0 and smaller for ∇2ε~k < \n0 and the Kubo sum rule, which is the integral of the \nproduct of nk and ∇2ε~k (Eq. 3), is larger in the normal \nstate. \n\nWe also see from Fig. 4 that ∆WK decreases with Γ \nreflecting the fact that with too much impurity scattering \nthere is little difference in nk between NS and SCS. \n\np \n\nThis is consistent with having in the NS, Σ = iΓ in accor- \ndance with Eq 6. In the SCS, Σ(ω) is purely imaginary \nfor ω > ∆ and purely real for ω < ∆. The self-energy \nhas a square-root singularity at ω = ∆. \n\nIt is worth noting that Eq.12 is derived from the in- \ntegration over infinite band. If one uses Eq.6 for finite \nband, Eq.12 acquires an additional frequency dependence \nat large frequencies of the order of bandwidth (the low \nfrequency structure still remains the same as in Eq.12). \nIn principle, in a fully self-consistent analysis, one should \nindeed evaluate the self-energy using a finite bandwidth. \nIn practice, however, the self-energy at frequencies of or- \nder bandwidth is generally much smaller than ω and con- \ntribute very little to optical conductivity which predom- \ninantly comes from frequencies where the self-energy is \ncomparable or even larger than ω. Keeping this in mind, \nbelow we will continue with the form of self-energy de- \nrived form infinite band. We use the same argument for \nall four models for the self-energy.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "0 \n0.5 \nω in eV \n\n∆ W (CB model−larger λ ω \n) \nsf \n\nV \ne \nm \nn \nwith lattice \nwithout lattice \n8 \ni \n) \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.4 \n0.6 \nω \n in eV \nc \n\nFIG. 22: Top – conductivity at a larger value of ωsf λ (ωsf = \n26 meV ,λ = 7) consistent with the one used in Ref.33). Bot- \ntom – ∆W with and without lattice. Observe that the fre- \nquency of zero crossing of ∆W enhances compared to the case \nof a smaller λωsf and becomes comparable to the bandwidth. \nAt energies smaller than the bandwidth, ∆W > 0, as in the \nNorman- P´epin model. \n\n0 \n\nFIG. 21: Distribution functions n(ǫ) for CB model for λ = 1 \nand λ = 7 and a constant ωsf = 26 meV . We set ∆ = 30meV . \nFor smaller λ (top), quasiparticles near the FS are well defined \nas indicated by the well pronounced jump in n(ǫ). For λ = 7, \nn(ǫ) is rather smooth implying that a coherence is almost lost. \nSome irregularities is the SCS distribution function are due \nto finite sampling in the frequency domain. The irregularities \ndisappear when finer mesh for frequencies is chosen. \nV \ne \nm \nn \nλ=10 \nλ=1 \n\n30 \ni \nE \nK \nδ \n\n10 \n\n0 2 4 6 \nSelf Energy prefactor \n\nFIG. 23: Kinetic energy difference between the SCS and the \nNS, δKE We set λ to be either λ = 1 or λ = 10 and varied ωsf \nthus changing the overall prefactor in the self-energy. At weak \ncoupling (λ = 1) the behavior is BCS-like – δKE is positive \nand increases with the overall factor in the self-energy. At \nstrong coupling (λ = 7), δKE shows a reverse trend at larger \nωsf . \n\nThe negative sign of ∆W (ωc) above a relatively small \nωc ∼ 0.1 − 0.2eV implies that the ‘compensating’ ef- \nfect from the fermionic self-energy on ∆W is not strong \nenough to overshadow the decrease of the optical inte- \ngral in the SCS due to gap opening. In other words,the \nCB model displays the same behavior as BCSI, EB, and \n\nshows up in the optical gap), where as in the BCSI case \nit would have always begun from 2∆. In Fig 18 we plot \nthe Kubo sums WK vs coupling λ. We see that for all λ, \nWK in the NS stays larger than in the SCS. Fig 19 shows \nthe cutoff dependence of the optical integrals W (ωc) for \nλ = 1 separately in the NS and the SCS. We again see \nthat only about 73% of the Kubo sum is recovered up \nto the bandwidth of 1 eV indicating that there is a sig- \nnificant amount left to recover beyond this energy scale. \nFig 20 shows ∆W for the two different couplings. We \nsee that, for both λ’s, there is only one zero-crossing for \nthe ∆W curve, and ∆W is negative at larger frequen- \ncies. The only difference between the two plots is that \nfor larger coupling the dip in ∆W gets ‘shallower’. Ob- \nserve also that the solid line in Fig. 20 is rather far away \nfrom the dashed line at ωc > 1meV , which indicates that, \nalthough ∆W (ωc) in this region has some dependence on \nωc, still the largest part of ∆W (ωc) is ∆WK, while the \ncontribution from ∆f (ωc) is smaller.", + "page_start": 12, + "page_end": 12, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What happens when the spin-rotation symmetry is explicitly broken?", + "target_page": 2, + "target_passage": "makes them harder to realize in solid state systems", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "+ \n4 \n(cid:8) Jz| · \nJcluster \nSj2 \n(cid:2) \n(Sk3 Sk4) + sgn(Jz)Sk2 (Sj3 Sj4) \nJz| \n(Sj3 Sj4 + Sk3 \nX \nz−links \np| (cid:3) − | · × · × · \n\nIn (16), we have been able to reduce the four spin in- \nteractions in (8) to inter-cluster Heisenberg interactions, \nand the six-spin interactions in (8) to inter-cluster spin- \nchirality interactions. The inter-cluster Heisenberg cou- \nplings in Hperturbation x,y may be easier to arrange. The inter-cluster spin-chirality coupling in Hperturbation z ex- \nplicitly breaks time reversal symmetry and is probably \nharder to implement in solid state systems. However \nspin-chirality order may have important consequences \nin frustrated magnets36,37, and a realization of spin-", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "One major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. \n\nHcluster = (Jcluster/2) (S1 + S2 + S3 + S4)2 (2) \n\nThe energy levels should be apparent from this form: \none group of spin-2 quintets with energy 3Jcluster, three \ngroups of spin-1 triplets with energy Jcluster, and two spin \nsinglets with energy zero. We will consider large positive The outline of this paper is as follows. In Section II \nwe will lay out the pseudo-spin-1/2 construction. In Sec-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "Appendix A: Coupling between Distortions of a \nTetrahedron and the Pseudo-spins \n\nIn this Appendix we reproduce from Ref.35 the cou- \nplings of all tetrahedron distortion modes to the spin \n\n· − · \n\nNow we can use TABLE I to convert the above cou- \nIt is easy to see that f A and \nplings into pseudo-spin. \nf T2 \n1,2,3 are all zero when converted to pseudo-spins, namely \nprojected to the physical spin singlet sector. But f E \n1 = \n(√3/2)τ x \n2P34)/(4√3) = \n(P14 +P23 +P24 +P13 \n− \nand f E \nP23)/4 = (√3/2)τ y. This \n2 = (P24 + P13 \n− \nhas already been noted by Tchernyshyov et al.28, only \nthe E modes can lift the degeneracy of the physical spin \nsinglet ground states of the tetrahedron. Therefore the \ngeneral spin lattice coupling is the form of (12) given in \nthe main text. \n\n2P12 \nP14 \n− \n− \n\n−", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "∼ \n\nIn this Subsection we regard each four-spin cluster \nas a tetrahedron, and consider possible optical phonon \nmodes(distortions) and their couplings to the spin sys- \ntem. The basic idea is that the intra-cluster Heisen- \nberg coupling Jcluster can linearly depend on the dis- \ntance between physical spins. Therefore certain distor- \ntions of the tetrahedron couple to certain linear combi- \nSm. Integrating out phonon modes will \nnations of Sℓ · \nthen generate high order spin interactions. This idea has \nbeen extensively studied and applied to several magnetic \nmaterials28–34. More details can be found in a recent \nreview by Tchernyshyov and Chern35. And we will fre- \nquently use their notations. In this Subsection we will \nuse the representation (5) for τ z. \n\nIV. GENERATE THE HIGH ORDER PHYSICAL \nSPIN INTERACTIONS BY PERTURBATIVE \nEXPANSION. \n\nOne major drawback of the present construction is that \nit involves high order interactions of physical spins[see \n(8) and (9)], thus is ‘unnatural’. In this Section we will \nmake compromises between exact solvability and natu- \nralness. We consider two clusters j and k and try to \ngenerate the Jx,y,z interactions in (7) from perturbation \nseries expansion of more natural(lower order) physical \nspin interactions. Two different approaches for this pur- \npose will be laid out in the following two Subsections. In \nSubsection IV A we will consider the two clusters as two \ntetrahedra, and couple the spin system to certain opti- \ncal phonons, further coupling between the phonon modes \n\nConsider first a single tetrahedron with four spins \n1, . . . , 4. The general distortions of this tetrahedron can \nbe classified by their symmetry (see for example Ref.35). \nOnly two tetragonal to orthorhombic distortion modes, \nQE \n2 (illustrated in FIG. 3), couple to the pseudo- \nspins defined in Section II. A complete analysis of all \nmodes is given in Appendix A. The coupling is of the \n\n1 and QE", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
physical spinpseudo - spin
P12, and P34τ - r
P13, and P24−( 1 / 2 ) τ = + ( γ / 3 / 2 ) r - y
Pl4, and P28−( 1 / 2 ) 72 − ( V3 / 2 ) τW
\n\n1 \n√6 (cid:16)| ↓↓↑↑i \n\nz z \n−τ \n+ ωτ + ω \n| ↓↑↓↑i | ↓↑↑↓i \nz z \n−τ \n+ ωτ + + ω \n\n3 \n\nJcluster limit. So only the singlet sector remains in low \nenergy. \n\nThe singlet sector is then treated as a pseudo-spin-1/2 \nHilbert space. From now on we denote the pseudo-spin- \n1/2 operators as T = (1/2)~τ , with ~τ the Pauli matri- \nces. It is convenient to choose the following basis of the \npseudo-spin \n\nTABLE I: Correspondence between physical spin operators \nand pseudo-spin operators in the physical spin singlet sector of \nthe four antiferromagnetically coupled physical spins. Pjk = \n2Sj \nSℓ) \nare spin-chirality operators. Note that several physical spin \noperators may correspond to the same pseudo-spin operator. \n\nτ z = 1 = \n| ± i \n\n| ↑↓↓↑i(cid:17) \n(3) \n| ↑↑↓↓i | ↑↓↑↓i \n\nwhere ω = e2πi/3 is the complex cubic root of unity, \nand other states on the right-hand-side(RHS) are \n| ↓↓↑↑i \nbasis states of the four-spin system, in terms of Sz quan- \ntum numbers of physical spins 1, . . . , 4 in sequential or- \nder. This pseudo-spin representation has been used by \nHarris et al. to study magnetic ordering in pyrochlore \nantiferromagnets21. \n\nHowever there is another simpler representation of τ z, \nSℓ). Ex- \nby the spin-chirality operator χjkℓ = Sj · \nS4) is \nplicit calculation shows that the effect of S2 \n(√3/4)τ z in the physical singlet sector. This can also \n− \nS3, S2 \nbe proved by using the commutation relation [S2 \n· \nS4). A complete list of all chirality \nS4] = iS2 \noperators is given in TABLE I. Therefore we can choose \nanother representation of τ z, \n\n(Sk × \n(S3 \n· × \n\n· \n\nWe now consider the effect of Heisenberg-type inter- \nSk inside the physical singlet sector. Note \nactions Sj · \nSk within the cluster commutes with \nthat since any Sj · \nthe cluster Hamiltonian Hcluster (2), their action do not \nmix physical spin singlet states with states of other total \nphysical spin. This property is also true for the spin- \nchirality operator used later. So the pseudo-spin Hamil- \ntonian constructed below will be exact low energy Hamil- \ntonian, without truncation errors in typical perturbation \nseries expansions. \n\nτ z = χ234/(√3/4) = (4/√3)S2 (S3 S4) (6) \n\n− \nThe above representations of τ x,y,z are all invariant under \nglobal spin rotation of the physical spins. \n\n− · × \n\nWith the machinery of equations (4), (5), and (6), it \nwill be straightforward to construct various pseudo-spin- \n1/2 Hamiltonians on various lattices, of the Kitaev vari- \nety and beyond, as the exact low energy effective Hamil- \ntonian of certain spin-1/2 models with spin-rotation sym- \nmetry. In these constructions a pseudo-spin lattice site \nactually represents a cluster of four spin-1/2 moments. It is simpler to consider the permutation operators \nSk + 1/2, which just exchange the states \n= k). \nPjk ≡ \nof the two physical spin-1/2 moments j and k (j \nAs an example we consider the action of P34, \n\n2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "π \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5) \n\nwhere S(~q), with ~q = (0, 0, qz), is the structure factor24 \n(i.e. the Fourier transform of the spin correlation func- \ntion) along the z-direction of the film, while the normal- \nization factor K is the structure factor integral at T = 0. \nAlthough the use of the last observable can be seen as a \nsuitable and elegant way to overcome the intrinsic diffi- \nculties met in defining a correct helical order parameter, \nfree of any undue external bias (as the wave-vector Qz", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "Another note to take is that it is not necessary to have \nsuch a highly symmetric cluster Hamiltonian (2). The \nmappings to pseudo-spin-1/2 should work as long as the \nground states of the cluster Hamiltonian are the two-fold \ndegenerate singlets. One generalization, which conforms \nthe symmetry of the lattice in FIG. 2, is to have \n\nHcluster = (Jcluster/2)(r \n\n4 \n3 3 \n\n1 2 \n2 \n(a) (b) \n\n3 \n4 \n3 2 3 \n\nQE \n2 \n\n2 \n1 4 1 \n1 (a) (b) (c) \n\nIllustration of the tetragonal to orthorhombic \nFIG. 3: \nQE \n2 (bottom) distortion modes. (a) Perspective \nview of the tetrahedron. 1, . . . , 4 label the spins. Arrows in- \ndicate the motion of each spin under the distortion mode. (b) \nTop view of (a). (c)(d) Side view of (a). \n\n1 (top) and QE \n\nS1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. \n\nof the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = Jz (16/9)[Sj2 (Sj3 Sj4)][Sk2 (Sk3 Sk4)] \nX \nj \n− X · × · × \nz−links \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\n(8) \n\n(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 H = \nX \nj \n\nJx (2Sj1 Sj2 + 1/2)(2Sk1 Sk2 + 1/2) Jy (4/3)[Sj1 (Sj3 Sj4)][Sk1 (Sk3 Sk4)] \n− X − X · · · − · − \nx−links y−links \n\nJz ( 4/3)(2Sj3 Sj4 + 1/2)[Sj1 (Sj3 Sj4)](2Sk3 Sk4 + 1/2)[Sk1 (Sk3 Sk4)] \n− X − · · − · · − \nz−links \n\n(9) \n\nin terms of physical spins S, has full \nspin rotation symmetry and time-reversal symmetry. A \npseudo-magnetic field term \n~τj term can also be \nincluded under this mapping, however the resulting Ki- \ntaev model with magnetic field is not exactly solvable. \nIt is quite curious that such a formidably looking Hamil- \ntonian (8), with biquadratic and six-spin(or eight-spin) \nterms, has an exactly solvable low energy sector. \n\nThis model, \n\n~h \nPj · \n\nNote that the original Kitaev model (1) has three- \nfold rotation symmetry around a honeycomb lattice site, \ncombined with a three-fold rotation in pseudo-spin space \n(cyclic permutation of τ x, τ y, τ z). This is not apparent \nin our model (8) in terms of physical spins, under the \ncurrent representation of τ x,y,z. We can remedy this by \nusing a different set of pseudo-spin Pauli matrices τ ′x,y,z \nin (7), \n\n′x = \nτ \nτ ′y = \n′z = 1/3τ z + \n1/3τ z \n1/3τ z 2/3τ x, \n1/6τ x + \n1/6τ x \n\np \n\n1/2τ y, \n1/2τ y \np \nτ \np \n− p − p \n\nWith proper representation choice, they have a symmet- \nric form in terms of physical spins, \n\n′x = \nτ \nτ ′y = \nτ ′z = (4/3)S4 (S2 S3) + 2/3(2S1 S4 + 1/2) \n\nWe emphasize that because the first intra-cluster term \nPcluster Hcluster commutes with the latter Kitaev terms \nindependent of the representation used, the Kitaev model \nis realized as the exact low energy Hamiltonian of this \nmodel without truncation errors of perturbation theories, \n/Jcluster)2 or higher order terms will \nnamely no ( \n| \nbe generated under the projection to low energy clus- \nter singlet space. This is unlike, for example, the t/U \nexpansion of the half-filled Hubbard model22,23, where \nat lowest t2/U order the effective Hamiltonian is the \nHeisenberg model, but higher order terms (t4/U 3 etc.) \nshould in principle still be included in the low energy ef- \nfective Hamiltonian for any finite t/U . Similar compari- \nson can be made to the perturbative expansion studies of \nthe Kitaev-type models by Vidal et al.9, where the low \nenergy effective Hamiltonians were obtained in certian \nanisotropic (strong bond/triangle) limits. Although the \nspirit of this work, namely projection to low energy sec- \ntor, is the same as all previous perturbative approaches \nto effective Hamiltonians. \n\nJx,y,z| \n\n(4/3)S2 (S3 S4) + 2/3(2S1 S2 + 1/2) \np \n− · × · \n(4/3)S3 (S4 S2) + 2/3(2S1 S3 + 1/2) \np \n− · × · \n\np \n− · × · \n(10) \n\nSo the symmetry mentioned above can be realized by a \nthree-fold rotation of the honeycomb lattice, with a cyclic \npermutation of S2, S3 and S4 in each cluster. This is in \nfact the three-fold rotation symmetry of the physical spin \nlattice illustrated in FIG. 2. However this more symmet- \nric representation will not be used in later part of this \npaper.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. \n\nOn a more careful look, we found that indifference of \nδW (ωc) to the increase of λ is merely the consequence of \nthe fact that above we kept λωsf constant. Indeed, at \nsmall frequencies, fermionic self-energy in the NS is Σ′ = \nλω, Σ” = λ2ω2/(λωsf ), and both Σ′ and Σ′′ increase \nwith λ if we keep λωsf constant. But at frequencies larger \nthan ωsf , which we actually probe by ∆W (ωc), the self- \nenergy essentially depends only on λωsf , and increasing λ \nbut keeping λωsf constant does not bring us closer to the \nphysics associated with the recovery of electron coherence \nin the SCS. To detect this physics, we need to see how \nthings evolve when we increase λωsf above the scale of \n∆ , i.e., consider a truly strong coupling when not only \nλ ≫ 1 but also the normal state ΣN S(ω ≥ ∆) >> ∆. \n\nIn this work we analyzed the behavior of optical in- \nωc \no σ(ω)dω and Kubo sum rules in \ntegrals W (ωc) ∝ \nthe normal and superconducting states of interacting \nfermionic systems on a lattice. Our key goal was to \nunderstand what sets the sign of ∆WK = ∆W (∞) be- \ntween the normal and superconducting states and what \nis the behavior of W (ωc) and ∆W (ωc) at finite ωc. In a \nweak coupling BCS superconductor, ∆W (ωc) is positive \nat ωc < 2∆ due to a contribution from superfluid den- \nsity, but becomes negative at larger ωc, and approach a \nnegative value of ∆WK. Our study was motivated by fas- \ncinating optical experiments on the cuprates7–10. In over- \ndoped cuprates, there is clear indication11 that ∆W (ωc) \nbecomes negative above a few ∆, consistent with BCS \nbehavior. In underdoped cuprates, two groups argued8,9 \nthat ∆W integrated up to the bandwidth remains posi- \ntive, while the other group argued10 that it is negative. \nThe reasoning why ∆WK may potentially change sign \nat strong coupling involves the correlation between −WK \nand the kinetic energy. \nIn the BCS limit, kinetic en- \nergy obviously increases in a SCS because of gap opening, \nhence −WK increases, and ∆WK is negative. At strong \ncoupling, there is a counter effect – fermions become more \nmobile in a SCS due to a smaller self-energy. \n\nR", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "**(a)**\n1 \n*TN*(8) = 92(2)K \n\n90K \n91K \n92K \n93K \n94K \n95K \n\n*e*\n*P*\n0.5 \n\n0 \n-140 -139 -138 -137 -136 -135 -134 -133 -132 -131 \n*e*\n**(b)**\n\n129K \n130K \n131K \n132K \n133K \n134K \n\n*TC*(8) = 133.3(3)K \n0.4 \n*e*\n*P*\n0.2 \n\n0 \n-94 -92 -90 -88 \n-86 \n*e*\n-84 -82 -80 -78 \n\nFIG. 10: (colors online) Equilibrium probability distribution \nof the energy for the thickness n = 8 for some temperatures \naround TN (8), (a), and TC(8), (b), respectively. \n\nopposite magnetization. We can thus confidently assert \nthat, regardless of the underlying lattice structure, by \ndecreasing the number of the out-of-plane interactions, \nfor thicknesses close to the helical bulk pitch, the block \n\nAs a final issue we address the problem of the order \nof the transitions observed at TN (n) and TC(n), respec- \ntively. In particular, we focus our attention to the thick- \nness ranges where the chiral order parameter is relevant, \nregions i) and ii) as defined at the beginning of \ni.e. \nthis Section. In Fig. 10 the equilibrium probability dis- \ntribution of the energy for temperatures around TN (8) \n(Fig. 10a) and TC(8) (Fig. 10b) is plotted: \nfor both \ntemperatures, no double peak structure is observed, so \nthat we have no direct indication for a first order tran- \nsition even if, according to precedent studies of Loison \nand Diep17,18, the presence of a first-order transition at \nTN (n), cannot be completely excluded, as it could reveal \nitself only when the lateral dimension L are much larger \nthan the largest correlation length. The same conclusion \nabout the order of transition is reached for any other in- \nvestigated film thickness, as the energy probability distri- \nbution shape does not qualitatively change. This findings \nagree with the results we got in previous MC simulations \ndiscussed in Ref. 15, so that we may conclude that the \norder of the observed transitions is not affected by the \nrange of interactions. \n\n1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- \n\ndon) 6, 13 (2007). (1987). \n7 Minhyea Lee, W. Kang, Y. Onose, Y. Tokura, and N. P. \n\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo \nSimulation in Statistical Physics, Cambridge University \nPress, Cambridge (2000). \nOng, Phys. Rev. Lett. 102, 186601 (2009) \n\n8 P. Pedrazzini et al., Phys. Rev. Lett. 98, 047204 (2007). \n9 H. Kawamura and M. S. Li, Phys. Rev. Lett. 87, 187204 \n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Meth- \nods in Statistical Physics, Clarendon Press, Oxford (1999). (2001). \n\n10 P. J. Jensen, and A. R. Mackintosh, Rere Earth Mag- \nnetism (Structure and Excitations), Clarendon Press, Ox- \nford (1991). \n11 S. Konings, C. Schuessler-Langeheine, H. Ott, E. Weschke, \n\n23 B. Efron, The Annals of Statistics 7, 1 (1979). \n24 P. M. Chaikin, T. C. Lubensky Principles of condensed \nmatter physics, Cambridge University Press, New York \n(1995). \n25 K. Binder, Z. Phys. B 43, 119 (1981). K. Binder, Phys. E. Schierle, J. B. Goedkoop, arXiv 0707.2765v2 \n12 P.J. Jensen, and K.H. Bennemann, Surface Science Re- Rev. Lett. 47, 693 (1981). \n\n26 Such observable has been obtained from instantaneous \nevaluation of the structure factor during the stochastic \nprocess, and subsequently statistically analyzed as all the \nother macroscopic quantities.", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "What is the Oxbridge Academy email?", + "target_page": 59, + "target_passage": "Email: info@oxbridgeacademy.co.za", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613", + "page_start": 26, + "page_end": 26, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments \n\nTo make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "With our head office in Stellenbosch in the Western Cape, we cater to our \nstudents’ needs by recruiting industry-expert tutors to provide academic \nassistance via telephone and e-mail, as well as by designing our study \nmaterial in such a way that it is clear, simple, and easy for our students \nto understand. \n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. \n\nIf you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees.", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "You can find the course name and course code for your chosen course on \nthe relevant detailed course information page on our website. Have a look \nat the example in the screenshot below (the course name and course code \nare circled in red): \n\n\n\nPlease make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation", + "page_start": 21, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Depending on which course you study, you will either be assessed \nby means of written assignments, or through a combination of \nwritten assignments and exams. Assignments not only help to \ndeepen your understanding of the work, but they often also count \ntoward your final mark. \n\nIf you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around.", + "page_start": 36, + "page_end": 36, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers \n\n5. When you use external resources, remember to reference them \nproperly, and to include them in a bibliography. \nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries. \ncom/definition/english/plagiarism), which is a serious offence. \n\n6. \nown words when you formulate your answers. \n\nAlways hand in your own work, and make sure that you use your", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Don’t use text-speak (such as “ur” and “pls”) in your e-mail.**\nNot only does this look unprofessional, but your tutor may have a hard \ntime understanding what it is that you are trying to say. You should also \navoid using emoticons ( ;-) ), as these don’t belong in formal communica- \ntion. \n\n**Take care when sending attachments.**\nIf you need to send an attachment, make sure that it is in an accessible \nfile \nlimit. Many e-mail clients limit the size of attachments to 5 MB -- and if \nyour attachment exceeds this size, your e-mail might not be delivered. \n\nformat, and that the size doesn’t exceed the maximum", + "page_start": 35, + "page_end": 35, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. \n\n• Organise your study material into a structure that makes sense to you. \n\n• Arrange your study material into a format that suits your learning style. \n\n\n \n \n \n \n [html]\n
• Create memory aids for yourself.• Identify key ideas and concepts.
• Focus on what ' s important.• Prepare for exams more easily.
", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**E-mail address**\nPlease provide a valid e-mail address that you check on a regular \nbasis, as we’ll be using this address to communicate with you \nthroughout your studies. \n**Occupation**\nRefers to your current job (if you are employed). If you are \nunemployed, you can simply write “unemployed” or “not applicable”. \n**Delivery address**\nRefers to the address at which you want your study material to be \ndelivered. The reason why we prefer you to select your work address \nis so that there will always be someone available to receive your \nstudy material, even if you are not there when the courier arrives.", + "page_start": 22, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "When is it necessary to use a host multipathing driver for load balancing?", + "target_page": 340, + "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(cid:2) Balanced host load across HBA ports \n\nIf the host has more than one HBA port per fabric, zone each host port with a separate \ngroup of Storwize V7000 ports. \n\n(cid:2) Balanced host load across Storwize V7000 ports \n\nTo obtain the best overall performance of the subsystem and to prevent overloading, the \nload of each Storwize V7000 port should be equal. Assuming a similar load is generated \nby each host, you can achieve this balance by zoning approximately the same number of \nhost ports to each Storwize V7000 port. \n\nFigure 3-4 on page 56 shows an example of a balanced zoning configuration that was \ncreated by completing the following steps: \n\n1. Divide ports on the I/O Group into two disjoint sets, such that each set contains two ports \nfrom each I/O Group node, each connected to a different fabric. \n\nFor consistency, use the same port number on each I/O Group node. The example that is \nshown in Figure 3-4 on page 56 assigns ports 1 and 4 to one port set, and ports 2 and 3 to \nthe second set. \n\nBecause the I/O Group nodes have four FC ports each, two port sets are created. \n\n2. Divide hosts attached to the I/O Group into two equally numerous groups. \n\nIn general, for I/O Group nodes with more than four ports, divide the hosts into as many \ngroups as you created sets in step 1. \n\n3. Map each host group to exactly one port set. \n\n4. Zone all hosts from each group to the corresponding set of I/O Group node ports. \n\nThe host connections in the example on Figure 3-4 on page 56 are defined in the following \nmanner: \n\n– Hosts in group one are always zoned to ports 1 and 4 on both nodes. \n– Hosts in group two are always zoned to ports 2 and 3 on both nodes of the I/O Group. \n\n**Tip:**Create an alias for the I/O Group port set. This step makes it easier to correctly zone \nhosts to the correct set of I/O Group ports. It also makes host group membership visible in \nthe FC switch configuration. \n\nThe use of this schema provides four paths to one I/O Group for each host, and helps to \nmaintain an equal distribution of host connections on Storwize V7000 ports. \n\n**Tip:**To maximize performance from the host point of view, distribute volumes that are \nmapped to each host between both I/O Group nodes.", + "page_start": 76, + "page_end": 76, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 3-4 Overview of four-path host zoning \n\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient \nlevel of redundancy. For the Storwize V7000 environment, no more than four paths per I/O \nGroup are required to accomplish this layout. \n\nAll paths must be managed by the multipath driver on the host side. Make sure that the \nmultipath driver on each server can handle the number of paths required to access all \nvolumes mapped to the host. \n\nFor hosts that use four HBAs/ports with eight connections to an I/O Group, use the zoning \nschema that is shown in Figure 3-5 on page 57. You can combine this schema with the \nprevious four-path zoning schema.", + "page_start": 77, + "page_end": 77, + "source_file": "sg247938.pdf" + }, + { + "text": "(cid:2) Number of paths per host multipath device \n\nThe maximum supported number of paths per multipath device that is visible on the host is \neight. Although the IBM Subsystem Device Driver Path Control Module (SDDPCM), \nrelated products, and most vendor multipathing software can support more paths, the \nStorwize V7000 expects a maximum of eight paths. In general, you see only an effect on \nperformance from more paths than eight. Although the IBM Spectrum Virtualize can work \nwith more than eight paths, this design is technically unsupported. \n\n(cid:2) Do not intermix dissimilar array types or sizes \n\nAlthough the IBM Spectrum Virtualize supports an intermix of differing storage within \nstorage pools, it is best to always use the same array model, Redundant Array of \nIndependent Disks (RAID) mode. RAID size (RAID 5 6+P+S does not mix well with RAID 6 \n14+2), and drive speeds. \n\nRules and guidelines are no substitution for monitoring performance. Monitoring performance \ncan provide a validation that design expectations are met, and identify opportunities for \nimprovement. \n\n**IBM Spectrum Virtualize performance perspectives**\n\nIBM Spectrum Virtualize software was developed by the IBM Research Group. It is designed \nto run on commodity hardware (mass-produced Intel-based processors [CPUs] with \nmass-produced expansion cards) and to provide distributed cache and a scalable cluster \narchitecture. One of the main goals of this design was to use refreshes in hardware. Currently, \nthe Storwize V7000 cluster is scalable up to eight nodes (four control enclosures). \n\nThe performance is near linear when nodes are added into the cluster until performance \neventually becomes limited by the attached components. Although virtualization provides \nsignificant flexibility in terms of the components that are used, it does not diminish the \nnecessity of designing the system around the components so that it can deliver the level of \nperformance that you want. \n\nThe key item for planning is your SAN layout. Switch vendors have slightly different planning \nrequirements, but the goal is that you always want to maximize the bandwidth that is available \nto the Storwize V7000 ports. The Storwize V7000 is one of the few devices that can drive \nports to their limits on average; therefore, it is imperative that you put significant thought into \nplanning the SAN layout. \n\nEssentially, performance improvements are gained by selecting the most appropriate internal \ndisk drive types, spreading the workload across a greater number of back-end resources \nwhen using external storage, and adding more caching. These capabilities are provided by \nthe Storwize V7000 cluster. However, the performance of individual resources eventually \nbecomes the limiting factor.", + "page_start": 762, + "page_end": 762, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 3-5 Overview of eight-path host zoning \n\nFor more information, see Chapter 8, “Hosts” on page 317. \n\n**3.6.6 Zoning considerations for Metro Mirror and Global Mirror**\n\nThe SAN configurations that use intercluster Metro Mirror and Global Mirror relationships \nrequire the following other switch zoning considerations: \n\n(cid:2) Review the latest requirements and recommendations at this website. \n\n(cid:2) If two ISLs are connecting the sites, split the ports from each node between the ISLs. That \nis, exactly one port from each node must be zoned across each ISL. \n\n(cid:2) Local clustered system zoning continues to follow the standard requirement for all ports on \nall nodes in a clustered system to be zoned to one another. \n\nWhen designing zoning for a geographically dispersed solution, consider the effect of the \ncross-site links on the performance of the local system. \n\n**Important:**Be careful when you perform the zoning so that ports that are dedicated for \nintra-cluster communication are*not*used for Host/Storage traffic in the 8-port and 12-port \nconfigurations. \n\nThe use of mixed port speeds for intercluster communication can lead to port congestion, \nwhich can negatively affect the performance and resiliency of the SAN. Therefore, it is not \nsupported.", + "page_start": 78, + "page_end": 78, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.12.1 Queue depth**\n\nTypically, hosts issue subsequent I/O requests to storage systems without waiting for \ncompletion of previous ones. The number of outstanding requests is called*queue depth*. \nSending multiple I/O requests in parallel (asynchronous I/O) provides significant performance \nbenefits compared to sending them one-by-one (synchronous I/O). However, if the number of \nqueued requests exceeds the maximum that is supported by the storage controller, you \nexperience performance degradation. \n\nTherefore, for large storage networks, plan for setting correct SCSI commands queue depth \non your hosts. For this purpose, a large storage network is defined as one that contains at \nleast 1000 volume mappings. For example, a deployment with 50 hosts with 20 volumes \nmapped to each of them is considered a large storage network. For more information about \nthe queue depth calculations, search for “Queue depth in large SANs” at this IBM Knowledge \nCenter web page. \n\n**3.12.2 Offloaded data transfer**\n\nIf your Windows hosts are configured to use Microsoft Offloaded Data Transfer (ODX) to \noffload the copy workload to the storage controller, consider the benefits of this technology \nagainst extra load on storage controllers. The benefits and effects of enabling ODX are \nespecially prominent in Microsoft Hyper-V environments with ODX enabled. \n\n**3.13 Host mapping and LUN masking**\n\nHost mapping is similar in concept to LUN mapping or masking. LUN mapping is the process \nof controlling which hosts have access to specific LUs within the disk controllers. LUN \nmapping is typically done at the storage system level. Host mapping is done at the software \nlevel. \n\nLUN masking is usually implemented in the device driver software on each host. The host has \nvisibility of more LUNs than it is intended to use. The device driver software masks the LUNs \nthat are not to be used by this host. After the masking is complete, only some disks are visible \nto the operating system. The system can support this type of configuration by mapping all \nvolumes to every host object and by using operating system-specific LUN masking \ntechnology. However, the default (and preferred) system behavior is to map only those \nvolumes that the host is required to access. \n\nThe act of mapping a volume to a host makes the volume accessible to the WWPNs or iSCSI \nnames such as iSCSI qualified names (IQNs) or extended-unique identifiers (EUIs) that are \nconfigured in the host object. \n\n**3.13.1 Planning for large deployments**\n\n\n \n \n \n \n [html]\n
group to single I / O Group only. This epproach allows you to configure up to 2048 host objects on a system with four I / O Groups ( eight nodes ).
For best performance, split each host group into two sets. For each set, configure the preferred access node for volumes presented to the host set to one of the I / Oroup nodes.
\n\n**71** Chapter 3. Planning", + "page_start": 92, + "page_end": 92, + "source_file": "sg247938.pdf" + }, + { + "text": "**Note:**With 12 or more ports per node, four ports should be dedicated for node-to-node \ntraffic. Doing so is especially important when high write data rates are expected because \nall writes are mirrored between I/O Group nodes over these ports. \n\nThe port designation patterns that are shown in 3.6, “SAN configuration planning” on page 50 \nprovide the required traffic isolation and simplify migrations to configurations with greater \nnumber of ports. More complicated port mapping configurations that spread the port traffic \nacross the adapters are supported and can be considered. However, these approaches do \nnot appreciably increase availability of the solution. \n\nAlternative port mappings that spread traffic across HBAs might allow adapters to come back \nonline following a failure. However, they do not prevent a node from going offline temporarily \nto restart and attempt to isolate the failed adapter and then rejoin the cluster. Also, the mean \ntime between failures (MTBF) of the adapter is not significantly shorter than that of the \nnon-redundant node components. The presented approach takes all of these considerations \ninto account with a view that increased complexity can lead to migration challenges in the \nfuture, and simpler approach is usually better. \n\n**3.6.8 Port masking**\n\nYou can use a port mask to control the node target ports that a host can access. By using \nlocal FC port masking, you can set which ports can be used for node-to-node/intracluster \ncommunication. By using remote FC port masking, you can set which ports can be used for \nreplication communication. Port masking, combined with zoning, enables you to dedicate \nports to particular type of traffic. Setting up Fibre Channel port masks is particularly useful \nwhen you have more than four Fibre Channel ports on any node in the system, as it saves \nsetting up many SAN zones. \n\nTwo Fibre Channel port masks are on a system. The local port mask controls connectivity to \nother nodes in the same system; the partner port mask controls connectivity to nodes in \nremote, partnered systems. By default, all ports are enabled for both local and partner \nconnectivity. \n\nThe port masks apply to all nodes on a system; a different port mask cannot be set on nodes \nin the same system. You do not have to have the same port mask on partnered systems. \n\nA mixed traffic of host, back-end, intracluster, and replication might cause congestion and \nbuffer to buffer credit exhaustion. This type of traffic can result in heavy degradation of \nperformance in your storage environment. \n\nFibre Channel I/O ports are logical ports, which can be on Fibre Channel platform ports or \nFCoE platform ports. \n\nThe port mask is a 64-bit field that applies to all nodes in the cluster. In the local FC port \nmasking, you can set a port to be dedicated to node-to-node/intracluster traffic by setting a 1 \nto that port. Remote FC port masking allows you to set which ports can be used for replication \ntraffic by setting 1 to that port. \n\nIf a port has a 0 in the specific mask, it means no traffic of that type is allowed. Therefore, in a \nlocal FC port map, a 0 means no node-to-node traffic occurs. A 0 on the remote FC port \nmasking means that no replication traffic occurs on that port. Therefore, if a port has a 0 on \nlocal and remote FC port masking, only host and back-end storage traffic is allowed on it.", + "page_start": 80, + "page_end": 80, + "source_file": "sg247938.pdf" + }, + { + "text": "When configuring multiple masters, the cluster installation process supports the native HA \nmethod. This method uses the native HA master capabilities that are built into OpenShift \nContainer Platform and can be combined with any Load Balancing solution. \n\nIf a host is defined in the [lb] section of the inventory file, Ansible installs and configures \nHAProxy automatically as the load balancing solution. If no host is defined, it is assumed that \nyou pre-configured an external load balancing solution of your choice to balance the master \nAPI (port 8443) on all master hosts. \n\n**Note:**The HAProxy Load Balancer is intended to demonstrate the API server’s HA mode \nand is not recommended for production environments. If you are deploying to a cloud \nprovider, Red Hat recommends deploying a cloud-native TCP-based Load Balancer or \ntake other steps to provide a highly available load balancer. \n\n**DNS**\nDNS service is an important component in the Red Hat OpenShift Container Platform \nenvironment. Regardless of the provider of DNS, an organization is required to have certain \nrecords in place to serve the various Red Hat OpenShift Container Platform components. \n\nConsidering the Load Balancer values for the Red Hat OpenShift Container Platform master \nservice and infrastructure nodes running router Pods are known beforehand, entries must be \nconfigured into the DNS before starting the deployment procedure. \n\n**DNS for OpenShift applications**\nApplications that are served by OpenShift are accessible by the router on ports 80/TCP and \n443/TCP. The router uses a wildcard record to map all host names under a specific sub \ndomain to the same IP address without requiring a separate record for each name. This \nprocess allows Red Hat OpenShift Container Platform to add applications with arbitrary \nnames if they are under that sub domain. \n\nFor example, a wildcard record for*.apps.example.com causes DNS name lookups for \napp1.apps.example.com and app2.apps.example.com to both return the same IP address: \n9.109.x.y. All traffic is forwarded to the OpenShift Infrastructure Nodes (Routers). The \nRouters examine the HTTP headers of the queries and forward them to the correct \ndestination. \n\nWith a load-balancer host address of 9.109.x.y, the wildcard DNS record for \n*.apps.example.com resolves IP address 9.109.x.y. \n\nA simple DNS round-robin resolution can be used to spread traffic across infrastructure \nnodes. \n\nFor production environments, it is recommended to have more advanced load balancing \ncapabilities to distribute the traffic among the OpenShift Routers. In those cases, an external \nLoad Balancer is used. \n\n**OpenShift Software Defined Networking (SDN)**\nRed Hat OpenShift Container Platform offers the ability to specify how pods communicate \nwith each other. This process can be done by using Red Hat provided Software-defined \nnetworks (SDN) or a third-party SDN. \n\nDeciding on the suitable internal network for an Red Hat OpenShift Container Platform step is \na crucial step. Unfortunately, no correct answer exists regarding the suitable pod network to \nchose because this choice varies based on the specific scenario requirements for how a Red \nHat OpenShift Container Platform environment is to be used.", + "page_start": 109, + "page_end": 109, + "source_file": "sg248459.pdf" + }, + { + "text": "**OnD ema nd Insta nc e**\n\n\n+ \n\nObje ct \nServe r Ob ject \nSe rver \n\n**Syst em A** **Syste m B**\n\n*Figure 12-4 Horizontal and vertical scaling with multiple LPARs*\n\nThis scenario is in organizations with large systems, such as AIX or z/OS, that are installed \nand that have enough available capacity to support the required Content Manager \nOnDemand workload. One advantage of this configuration is that you can control the priority \nof work and computer resource distribution to each of the LPARs, such as the number of \nprocessors or the processing priority (depending on the computer system/operating system \narchitecture) that is allocated to each of the LPARs. So, for example, load jobs can be \nassigned a low priority during the day when the focus is on data retrieval and a high priority \nduring the night when the focus is on data loading. \n\nThis setup supports horizontal scalability by using multiple technologies as appropriate. The \nmain constraint is that clients must have access to all systems through TCP/IP. \n\n**12.2.6 Multiple server configuration rules**\n\nThe following general rules apply when you configure multiple Content Manager OnDemand \nservers. In all cases, for additional guidance, see the appropriate Content Manager \nOnDemand documentation or contact Content Manager OnDemand Lab Services. \n\n(cid:2) Each Content Manager OnDemand server has its own set of configuration files. \n\n(cid:2) The parameters in all configuration files must be set so that all of the servers are part of \nthe same instance. \n\n(cid:2) The Content Manager OnDemand clients connect to the IP address listening port of the \nContent Manager OnDemand server (library server module). \n\n(cid:2) The documents are retrieved from the various object servers based on the location \n\ninformation that is returned by the library server. This retrieval is transparent to the client \nsystems. \n\n(cid:2) Parallel load processes must have separate temp directories. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" + }, + { + "text": "**Architectu ral flexibility**\n**& scalability**\n\n\n\n\n**TCP/IP**\n**Net work** Library \nServer (1) \nodbc \nDB2 \n\n\n\n\n\n\n\nTemp \nS torage \n\nHFS \nzFS (z/OS) \nCache \nS torage \n**Vertical**\nbig ger bo x \n\n**Horizonta l**\nmultip le systems \n\n**C lient**\n\n**Arc hitec tur al**\nmultip le serve r p latforms \nMultip le lo cation s \n2 ti er and 3 tie r \nMultip le cli ent typ es \n\nTem p \nStorage \n\nHFS \nzFS ( z/OS) \nCache \nStorage \n\n**Data Stora ge**\nNumb er of ca bin ets, \nFo lde r, AGs, App lica ti ons \nTCP/IP or \nNo TCP/IP \nLo ad pro cess \nObjec t S erver(s) \n(1 or more) \nArchive St orage \nTS M – OA M - V SAM \n\nSame o r d iffe rent machi ne/pl atfo rm \n**T esti ng comp lexity**\n\n*Figure 12-7 Horizontal and vertical scalability*\n\nA Content Manager OnDemand server can scale from a Windows server up to a cluster of \nz/OS systems. It is important to initially select an installation that meets the following \nrequirements: \n\n(cid:2) Appropriate for your current workload in terms of the following items: \n\n– Performance \n– Reliability \n– Availability \n– Scalability \n\n(cid:2) Support for your future growth requirements if the following actions are necessary: \n\n– Increase the number of users that access the system \n– Increase the quantity of data that is stored in the system \n\n(cid:2) Change in the types of archived data \n\n(cid:2) Change in the preprocessing requirements", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n \n [html]Storwize V7000 System 2\n
Storwize V7000 System 1
2 nodes4 nodes6 nodes8 nodes
2 nodes5666
4 nodes6101112
6 nodes6111617
8 nodes6121721
\n\nThese numbers estimate the amount of traffic between the two clustered systems when no \nI/O is taking place to mirrored volumes. Half of the data is sent by each of the systems. The \ntraffic is divided evenly over all available intercluster links. Therefore, if you have two \nredundant links, half of this traffic is sent over each link. \n\nThe bandwidth between sites must be sized to meet the peak workload requirements. You \ncan estimate the peak workload requirement by measuring the maximum write workload \naveraged over a period of 1 minute or less, and adding the heartbeat bandwidth. Statistics \nmust be gathered over a typical application I/O workload cycle, which might be days, weeks, \nor months, depending on the environment in which the Storwize V7000 is used. \n\nWhen planning the inter-site link, consider also the initial sync and any future resync \nworkloads. It might be worthwhile to secure additional link bandwidth for the initial data \nsynchronization. \n\nIf the link between the sites is configured with redundancy so that it can tolerate single \nfailures, you must size the link so that the bandwidth and latency requirements are met even \nduring single failure conditions. \n\nWhen planning the inter-site link, make a careful note whether it is dedicated to the \ninter-cluster traffic or is going to be used to carry any other data. Sharing link with other traffic \n(for example, cross-site IP traffic) might reduce the cost of creating the inter-site connection \nand improve link utilization. However, doing so might affect the links’ ability to provide the \nrequired bandwidth for data replication. \n\nVerify carefully that the devices that you plan to use to implement the intercluster link are \nsupported. \n\n**Cluster configuration**\nIf you configure replication services, you might decide to dedicate ports for intercluster \ncommunication, intracluster traffic, or both. In that case, make sure that your cabling and \nzoning reflects that decision. Also, such dedicated ports are inaccessible for host or back-end \nstorage traffic, so plan your volume mappings and hosts and back-end storage connections \naccordingly.", + "page_start": 98, + "page_end": 98, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", + "target_page": 1, + "target_passage": "Gamma ray Burst Monitor", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\nObservations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 \n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n6 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n2 \nv \n5 \n5 \n9 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nsists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. \n\nKnown sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con-", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "FIG. 2: Crab light curve. Horizontal scale is in modified \nJulian days over the 490 day GBM exposure period. Ver- \ntical scale is in photons/cm2/sec/keV averaged over daily \nintervals. Horizontal lines show the average flux in each of \nfive energy bands increasing from top to bottom \n\nThe shape of the individual occultation steps de- \npends on energy and occultation angle. Transmis- \nsion as a function of time is modeled as T (t) = \nexp[−µ(E)A(h)], where µ(E) is the mass attenuation \ncoefficient of gamma rays at energy E in air and A(h) \nis the air mass along the line of sight at a given alti- \ntude h(t). Account is taken of the detector response \nas it changes as a function of angle across the fit win- \ndow. For each source, occultation times are predicted. \nEach step is fit over a 4-minute window along with a \nquadratic background and using an assumed spectrum \nto determine the detector count rate due to the source. \nThe instrument response is used to convert the count \nrate to a flux. Up to 31 steps are possible for a given \nsource in a day, and these steps are summed to get a \nsingle daily average flux. The GBM occultation sensi- \ntivity exceeds that of BATSE at energies below ∼ 25 \nkeV and above ∼ 1.5 MeV [5]. \n\neral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. \n\nIII. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n12-25 keV band, where the flux initially rose to about \n240 mCrab (2009 Oct 25-28), suddenly dropped to \nnon-detectable on 2009 October 29-30, then rose again \nduring the period 2009 October 31 to November 2. As \nof mid December 2009, the source remains in a high \nintensity state. The light curve is shown for the pe- \nriod MJD 54700-55200, again with 1-day resolution, \nin Fig. 8. The fluxes for XTE J1752-223 in Table 1 \nare given are for the interval of flaring activity, TJD \n55130-55180. \n\n\n\nThis work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. \n\n[1] C. Meegan et al., Ap. J. 702, 791 (2009). \n[2] C. Wilson-Hodge et al. (2010), these proceedings. \n[3] B. A. Harmon et al., Ap. J. Suppl. 138, 149 (2002). \n[4] B. A. Harmon et al., Ap. J. Suppl. 154, 585 (2004). \n[5] G. L. Case et al., in The First GLAST Symposium, \nedited by S. Ritz, P. Michelson, and C. Meegan \n(2007), vol. 921 of AIP Conf. Proceedings, p. 538. \n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub- \n\n(1998). \n\n[10] M. McConnell et al., Ap. J. 523, 928 (2000). \n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. \nAstrophys. Suppl. 5, 80 (2005). \n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. \n5, 341 (2005). \n\n[13] L. Bouchet et al., Ap. J. 693, 1871 (2009). \n[14] M. C. Bell et al., Ap. J. 659, 549 (2007). \n[15] G. L. Case et al. (2010), to be submitted. \n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 \nlished), astro-ph/0903.3037. \n[7] J. C. Ling and W. A. Wheaton, Ap. J. 598, 334 \n(2003). (2009). \n\n[8] E. Jourdain and J. P. Roques, Ap. J. 704, 17 (2009). \n[9] H. Steinle et al., Astron. and Astrophys. 330, 97", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "What is Cyg X-1?", + "target_page": 3, + "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "SQUID \n\nFigure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. \n\nSimilar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. \n\nClear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "TYPICAL GUILD-UP 0F tzci~m~ENTs \n\n\n\n,-WING+ FUSELAGE \n\nWING ONLY/. \n\n\n\n- - \n\n- \n\n\n\nC.G. @ 30% MAC \n\n\n\n\nEFFECT OF C.G. WsITION \n\n\n\n50% MAC \n\n\n\n40% MAC (NEUTRAL pOlNn \n---", + "page_start": 277, + "page_end": 277, + "source_file": "00-80T-80.pdf" + }, + { + "text": "-0.1 \n\n(a) Fe TEY \n-0.2 \n\ny \nr \nt \ne \nm \nm \ny \ns \na \nD \nC \nM \nX \n\n0.004 \n\n0.000 \n\n(b) Mn TEY \n-0.004 \n\nFIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2449.pdf" + }, + { + "text": "16 \n× \n\nOptimization. We use AdamW (Loshchilov and Hutter, 2017) to optimize the x-encoder and predictor weights. \nThe ViT-L/16224 and ViT-H/16224 models use a batch size of 3072 while the ViT-H/16384 uses a batch size of \n2400. Models are trained for a total of 90,000 iterations. The learning rate is linearly increased from 2 \n10−4 \n10−4 during the first 12, 000 iterations of pretraining, and decayed to 10−6 following a cosine schedule. \nto 6.25 \n× \n× \n\n17", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": ") \ns \nt \ni \nn \nu \n. \n\nb \nr \na \n( \n\nn \no \ni \nt \n\np \nr \no \ns \nb \na \ny \na \nr \n- \nX \n\nFIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection.", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 2: Crab light curve. Horizontal scale is in modified \nJulian days over the 490 day GBM exposure period. Ver- \ntical scale is in photons/cm2/sec/keV averaged over daily \nintervals. Horizontal lines show the average flux in each of \nfive energy bands increasing from top to bottom \n\nThe shape of the individual occultation steps de- \npends on energy and occultation angle. Transmis- \nsion as a function of time is modeled as T (t) = \nexp[−µ(E)A(h)], where µ(E) is the mass attenuation \ncoefficient of gamma rays at energy E in air and A(h) \nis the air mass along the line of sight at a given alti- \ntude h(t). Account is taken of the detector response \nas it changes as a function of angle across the fit win- \ndow. For each source, occultation times are predicted. \nEach step is fit over a 4-minute window along with a \nquadratic background and using an assumed spectrum \nto determine the detector count rate due to the source. \nThe instrument response is used to convert the count \nrate to a flux. Up to 31 steps are possible for a given \nsource in a day, and these steps are summed to get a \nsingle daily average flux. The GBM occultation sensi- \ntivity exceeds that of BATSE at energies below ∼ 25 \nkeV and above ∼ 1.5 MeV [5]. \n\neral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. \n\nIII. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "l--J-@ $!?e \n\n+Y \n\nI \nDRAG \n\nSIN 7 = - j \n\n\\ \nWEIGHT \n\nGLIDE RATIO*L/o \n\n\ni \n\n LIFT-OR&G \nRATIO \n-CLEAN CONFIGURATION \n\nL4l \nr )M \n\n\nA 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 \n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n6 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n2 \nv \n5 \n5 \n9 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nsists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. \n\nKnown sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con-", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n12-25 keV band, where the flux initially rose to about \n240 mCrab (2009 Oct 25-28), suddenly dropped to \nnon-detectable on 2009 October 29-30, then rose again \nduring the period 2009 October 31 to November 2. As \nof mid December 2009, the source remains in a high \nintensity state. The light curve is shown for the pe- \nriod MJD 54700-55200, again with 1-day resolution, \nin Fig. 8. The fluxes for XTE J1752-223 in Table 1 \nare given are for the interval of flaring activity, TJD \n55130-55180. \n\n\n\nThis work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. \n\n[1] C. Meegan et al., Ap. J. 702, 791 (2009). \n[2] C. Wilson-Hodge et al. (2010), these proceedings. \n[3] B. A. Harmon et al., Ap. J. Suppl. 138, 149 (2002). \n[4] B. A. Harmon et al., Ap. J. Suppl. 154, 585 (2004). \n[5] G. L. Case et al., in The First GLAST Symposium, \nedited by S. Ritz, P. Michelson, and C. Meegan \n(2007), vol. 921 of AIP Conf. Proceedings, p. 538. \n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub- \n\n(1998). \n\n[10] M. McConnell et al., Ap. J. 523, 928 (2000). \n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. \nAstrophys. Suppl. 5, 80 (2005). \n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. \n5, 341 (2005). \n\n[13] L. Bouchet et al., Ap. J. 693, 1871 (2009). \n[14] M. C. Bell et al., Ap. J. 659, 549 (2007). \n[15] G. L. Case et al. (2010), to be submitted. \n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 \nlished), astro-ph/0903.3037. \n[7] J. C. Ling and W. A. Wheaton, Ap. J. 598, 334 \n(2003). (2009). \n\n[8] E. Jourdain and J. P. Roques, Ap. J. 704, 17 (2009). \n[9] H. Steinle et al., Astron. and Astrophys. 330, 97", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "FIG. 2: Crab light curve. Horizontal scale is in modified \nJulian days over the 490 day GBM exposure period. Ver- \ntical scale is in photons/cm2/sec/keV averaged over daily \nintervals. Horizontal lines show the average flux in each of \nfive energy bands increasing from top to bottom \n\nThe shape of the individual occultation steps de- \npends on energy and occultation angle. Transmis- \nsion as a function of time is modeled as T (t) = \nexp[−µ(E)A(h)], where µ(E) is the mass attenuation \ncoefficient of gamma rays at energy E in air and A(h) \nis the air mass along the line of sight at a given alti- \ntude h(t). Account is taken of the detector response \nas it changes as a function of angle across the fit win- \ndow. For each source, occultation times are predicted. \nEach step is fit over a 4-minute window along with a \nquadratic background and using an assumed spectrum \nto determine the detector count rate due to the source. \nThe instrument response is used to convert the count \nrate to a flux. Up to 31 steps are possible for a given \nsource in a day, and these steps are summed to get a \nsingle daily average flux. The GBM occultation sensi- \ntivity exceeds that of BATSE at energies below ∼ 25 \nkeV and above ∼ 1.5 MeV [5]. \n\neral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. \n\nIII. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. \n\nto observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. \n\n\n\nGRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "VERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. \n\n1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", + "target_page": 3, + "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100%", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "Scandinavia \n\n\n\n**Fig. 3 | Time transects across six geographical regions in Europe.**\n**a**–**f**, Ancestry change visualized over a time transect spanning from the Bronze \nAge to the present day in Poland (**a**), southeastern Europe (**b**), central Europe \n(**c**), Italy (**d**), Britain and Ireland (**e**) and Scandinavia (**f**). The maps show sample \nlocations of all available ancient genomes with at least 0.5× coverage from these regions (Supplementary Table 1). Their ancestry is shown on the same \nMDS model as in Fig. 2a for each time period. For each geographic region, \nthe early medieval period is highlighted in orange and the area in the MDS \ncorresponding to Scandinavian and central European ancestries is highlighted \nin an orange box. \n\nmedieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. \n\nNearby, in present-day Hungary, we observe Scandinavian-related \nancestry components in several burials dating to the sixth century \nce associated with Longobards (Longobard_earlyMED(I))10 (Fig. 2c). \nThis is consistent with the original study10, which reported affinity to \npresent-day groups from northwestern Europe (GBR, CEU and FIN in \nthe 1000 Genomes Project (1000GP))10 but which we can resolve with", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. \n\nIn southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "**High-resolution genomic history of early**\n**medieval Europe**\n\n**Leo Speidel1,2,3**✉**, Marina Silva1, Thomas Booth1, Ben Raffield4, Kyriaki Anastasiadou1,**\n**Christopher Barrington5, Anders Götherström6,7, Peter Heather8 & Pontus Skoglund1**✉ \nhttps://doi.org/10.1038/s41586-024-08275-2 \n\nReceived: 14 December 2023 \n\nAccepted: 23 October 2024 \n\nPublished online: 1 January 2025 \n\nOpen access \n\n Check for updates \n\nMany known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. \n\nAncient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + }, + { + "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). \n\nTwigstats substantially improves models of admixture between \nancestries from Iron Age Britain and northern Europe in early medi- \neval England9, halving standard errors from 9% with SNPs to 4% when \nusing time stratification (point estimates 80% and 79% Iron Age \nBritain-related ancestry, respectively). We used this improved reso- \nlution to demonstrate that an earlier Roman individual (6DT3) dating \nto approximately second to fourth century ce from the purported \ngladiator or military cemetery at Driffield Terrace in York (Roman \n*Eboracum*), England60, who was previously identified as an ancestry \noutlier61,62, specifically carried approximately 25% EIA Scandinavian \nPeninsula-related ancestry (Fig. 2c). This documents that people with \nScandinavian-related ancestry already were in Britain before the fifth \ncentury ce, after which there was a substantial influx associated with \nAnglo-Saxon migrations9. Although it is uncertain whether this indi- \nvidual was a gladiator or soldier, individuals and groups from northern \nEurope are indeed recorded in Roman sources both as soldiers and as \nenslaved gladiators63,64. \n\nAcross Europe, we see regional differences in the southeastern and \nsouthwestern expansions of Scandinavian-related ancestries. Early \nmedieval groups from present-day Poland and Slovakia carry spe- \ncific ancestry from one of the Scandinavian EIA groups—the one with \nindividuals primarily from the northern parts of Scandinavia in the \nEIA—with no evidence of ancestry related to the other primary group \nin more southern Scandinavia (Fig. 2d). By contrast, in southern and \nwestern Europe, Scandinavian-related ancestry either derives from", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Viking Age mobility into Scandinavia**\nPrevious studies had suggested a major influx of ancestry related to \nBritain into Viking Age Scandinavia6,7. Although we detect this ances- \ntry in some individuals (7 individuals in Norway, 14 in Denmark and \n14 in Sweden), including some individuals whose ancestry appears to \nbe entirely derived from Iron Age Britain, its overall impact appears \nreduced compared with previous reports. Our analysis indicates a pro- \nportionally larger impact of ancestry from Iron Age Britain in northern \nNorway, with southern Scandinavia predominantly influenced by \ncontinental central European ancestries (Fig. 4d). We hypothesize \nthat our estimates of ancestry from Britain are reduced relative to \nprevious studies because ancestry related to Britain and continen- \ntal central Europe may have been indistinguishable. This could be \ndue to a lack of statistical power to distinguish these closely related \nsources with standard methods, as well as through potential biases \nintroduced by using modern surrogate populations that have since \nbeen influenced by later gene flow (such as gene flow into Britain). \nWe illustrate this by replicating the analyses previously described6,7 \n(Extended Data Fig. 8). \n\nSimilarly, a previous study has suggested that individuals at sites such \nas Kärda in southern Sweden carried ancestry from southern Europe6. \nIn our models, two Kärda individuals fit with central European-related \nancestry, but none of the individuals has a substantial proportion of \nancestry related to southern European sources (Extended Data Fig. 9). \nInstead, we detect ancestry from southern European sources in only \nthree individuals from Scandinavia, and in relatively small propor- \ntions (Fig. 4a). \n\n**Conclusions**\nOur approach, Twigstats, transfers the power advantage of haplotype- \nbased approaches to a fully temporal framework, which is applica- \nble to*f*-statistics and enables previously unavailable unbiased and \ntime-stratified analyses of admixture. We demonstrated that Twigstats \nenables fine-scale quantitative modelling of ancestry proportions, \nrevealing wide-ranging ancestry changes that affect northern and \ncentral Europe during the Iron, Roman and Viking ages. We reveal evi- \ndence of the southward and/or eastward expansion of individuals who \nprobably spoke Germanic languages and who had Scandinavian-related \nancestry in the first half of the first millennium ce. We note that \n‘Scandinavian-related’ in this context relates to the ancient genomes \navailable, and so it is entirely possible that these processes were driven, \nfor example, from regions in northern-central Europe. This could be \nconsistent with the attraction of the greater wealth, which tended to \nbuild up among Rome’s immediate neighbours and may have played \na major role in vectors of migration internal to communities in Europe \nwho lived beyond the Roman frontier52. Later, patterns of gene flow \nseem to have turned northwards, with the spread of Iron Age Central \nEurope-related ancestry into Scandinavia. Overall, our approach can \nbe used for the reconstruction of new high-resolution genetic histories \naround the world. \n\nInterestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "reduces standard errors (s.e.) by up to tenfold and potentially more, \ndepending on sample sizes and details of the genetic history model. The \napproach does not produce detectable bias in estimates of admixture \nproportions (Fig. 1b–d and Extended Data Fig. 3). Furthermore, we \ndemonstrate that computing*f*-statistics on genotypes ascertained \nfor young mutation ages produce a power gain nearly equal to that \nproduced when using full genealogies in many examples, while add- \ning flexibility by allowing lower-quality genomes to be grafted onto a \ngenealogy reconstructed with higher-quality genomes31. \n\nIn the first half of the first millennium ce, Roman historians such as \nTacitus and Ammianus Marcellinus described the geographical dis- \ntribution and movements of groups beyond the imperial frontier and \nsuggested a potential role for them in the fall of the western Roman \nEmpire52. However, the exact nature and scale of these historically \nattested demographic phenomena—and their genetic impact— \nhave been questioned53, and have been difficult to test with genetic \napproaches owing to the close relations shared between many groups \nthat were ostensibly involved. Less is understood at further distances \nfrom the Roman frontier owing to a lack of historical accounts. The \nimproved statistical power of time-restricted ancestry in Twigstats \nthus offers an opportunity to revisit these questions. \n\nTo develop an ancestry model for early medieval individuals (Supple- \nmentary Table 1), we first need a broad characterization of the ancestry \nof the earlier sources from the early Iron Age (EIA) and Roman periods. \nWe use hierarchical UPGMA clustering based on pairwise clade testing \nbetween all individuals, and formally test the cladality of proposed \nancestry groups with qpWave5 (cladality in this sense means whether \nthey are consistent with being symmetrically related to all other tested \ngroups; Methods). This resulted in a set of model ancestry sources \nthat included Iron Age and Roman Britain (*n*= 11), the Iron Age of cen- \ntral European regions of mostly Germany, Austria and France (*n*= 10), \nRoman Portugal (*n*= 4), Roman Italy (*n*= 10), Iron Age Lithuania (*n*= 5), \nthe EIA Scandinavian Peninsula (Sweden and Norway,*n*= 10) and several \nother more eastern groups dating to the Bronze Age and EIA (*n*= 25) \n(Fig. 2a and Extended Data Fig. 1). We then use a rotational qpAdm \napproach54 to narrow down the set of contributing sources from this \nlarger pool of putative sources. \n\nWe further confirm with simulations that genealogy-based*f*-statistics \nestimates are robust to sequencing and phase-switch errors of expected \nmagnitude (Extended Data Fig. 3b). In fact, although sequence errors \ncan affect SNP-based population-genetic approaches substantially, \nerrors can be ‘corrected’ in genealogies as they take all variants in a \nregion into account32. \n\nPrevious studies have suggested ascertaining rare mutations as a \nproxy for recent history3,4, but we show that this approach is prone to \nbias when effective population sizes vary between populations, and \nthat using full time-restricted genealogies is both unbiased and more \npowerful (Fig. 1b and Extended Data Fig. 3). We attribute this to the \nobservation that mutation age is not fully predictive of allele frequency \n(Extended Data Fig. 4) and that the genealogy-based approach gains \npower from the inclusion also of higher-frequency young mutations \nthat ‘tag’ recent coalescences by closely pre-dating them. We demon- \nstrate that a widely used ‘chromosome painting’ approach, and any \nconceptually similar modelling based on identity by descent, that finds \nthe nearest neighbours between chromosomal segments in a sample \nand model groups using a non-negative least squares of genome-wide \npainting profiles2 is also prone to bias, when source groups have under- \ngone strong drift since the admixture event (Fig. 1b and Extended Data \nFig. 3b).", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "continuity from the EIA in Norway and northern Sweden (Fig. 4a). When \nconsidered collectively, the individuals who show evidence of central \nEuropean-related ancestry are mostly observed in regions histori- \ncally within the Danish sphere of influence and rule. Currently, no such \nindividuals, for example, are noted in eastern central Sweden, which \nwas a focus of regional power of the Svear (Fig. 4a). The difference in \ndistribution could suggest that the central European-related ancestry \nwas more common in regions dominated by the historical Götar and \ngroups inhabiting the lands on the borders of the Danish kingdom. \n\nthat of established groups, we focused on the island of Öland in south- \neast Sweden, where 23 individuals for whom we could reconstruct \nancestry portraits also had associated strontium stable isotope data66. \nStrontium isotope data from dental enamel reflect the geology of the \nregion where an individual grew to maturity, and there are considerable \ndifferences in expectations between Öland and many other regions \nin northern Europe. The full range of strontium isotope ratios in 109 \nindividuals show two modes, a majority group with low ratios and a \nsecond minority group with high ratios falling outside the expected \nrange of local fauna (Fig. 4b). Among 23 individuals with genomes in \nour data, all 5 individuals with 100% ancestry relating to central Europe To test the extent to which the variation in ancestry was consistent \nwith mobility during the lifetime of the individuals or, alternatively,", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", + "target_page": 12, + "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "We additionally perform non-parametric multidimensional scaling \n(MDS) on outgroup-*f*3 statistics44 computed using Twigstats, the results \nof which do not depend on any modelling assumptions and which show \nincreased resolution compared with conventional outgroup-*f*3 sta- \ntistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). \nEncouragingly, the MDS model supports regional fine-scale genetic \nstructures reflected in our source groups, such as the separation of \npredominantly Norwegian and northern Swedish EIA individuals from \nsouthern Peninsular Scandinavia (Fig. 2a); this relationship is not \ndetected without Twigstats. In this MDS analysis, we note a close affinity \nof wide-ranging individuals from Portugal, France, Germany, Austria \nand Britain. We hypothesize that this corresponds to areas associated \nwith the Celtic-speaking world, and that their close genetic affinity is \ndue to earlier expansions. Sparse sampling limits our understanding \nof the full extent of regional ancestry variation in central Europe and \nsome other regions, but the continental ancestries differentiated in \nthe MDS model suggests that major ancestry variation across Europe \nin this period is relatively well captured. \n\nWe next test the Twigstats time-restricted genealogy approach \non a range of empirical examples. First, we boost pairwise outgroup \n*f*3-statistics44 to quantify fine-scale population structure; we demon- \nstrate this improvement using a previously proposed simulation39 \n(Extended Data Fig. 5a). When applied to published genomes from \nNeolithic Europe (Methods and Supplementary Table 1), we can repli- \ncate the previously suggested fine-scale structure between individuals \nburied in megalithic structures in Ireland compared with others45, a \nrelationship that is not apparent from SNP data alone (Extended Data \nFig. 5b). For the well-studied example of three major ancestries contrib- \nuting to prehistoric Europe, that is, Mesolithic hunter-gatherers, early \nfarmers and steppe populations13–16, we obtain unbiased estimates and \nan approximately 20% improvement in standard errors in an already \nwell-powered qpAdm model46 (Extended Data Fig. 5c). \n\nFinally, we demonstrate that Twigstats can be used to resolve com- \npeting models of punctual admixture and long-standing gene flow, or \nconstrain the time of admixture. For instance, it has previously been \nsuggested that long-standing deep structure and gene flow between \nNeanderthals and early modern humans in Africa may produce genetic \npatterns that resemble a punctual admixture event some 60,000 years \nago47–49, casting doubt on the model of Neanderthal admixture into \nancestors of Eurasians49–51. However, whereas such long-standing deep \nsubstructure would confound SNP-based*f*-statistics to produce pat- \nterns similar to Neanderthal admixture, we demonstrate, in simula- \ntions, that Twigstats can clearly distinguish this history from recent \nadmixture (Extended Data Fig. 5d). Application of Twigstats on empiri- \ncal whole genomes produces results inconsistent with deep substruc- \nture alone, but consistent with punctual admixture. \n\n**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3).", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 9 | Ancestry models of Viking Age individuals in**\n**Scandinavia. a**, MDS of each Scandinavian Viking group plotted on top of \npreceding Iron age and Roman individuals.**b**, All accepted qpAdm models using \nTwigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden, \nand Norway, computed in a rotational qpAdm with source groups identical to \nFig. 4. We only retain models with feasible admixture proportions, standard \nerrors of <0.25, and show models with 1 source and a p-value greater than 0.01 \nor otherwise with 2 sources and a p-value greater than 0.01. If several models \nsatisfy p > 0.05, we show all such models, otherwise we select the model with \nthe largest p-value. The -log10 p-values are shown to the left of each model. \nWe combine models involving related sources, if they exist, by averaging their \nrespective admixture proportions, standard errors, and p-values. We plot one \nstandard error.", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed3.pdf" + }, + { + "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). \n\nTwigstats substantially improves models of admixture between \nancestries from Iron Age Britain and northern Europe in early medi- \neval England9, halving standard errors from 9% with SNPs to 4% when \nusing time stratification (point estimates 80% and 79% Iron Age \nBritain-related ancestry, respectively). We used this improved reso- \nlution to demonstrate that an earlier Roman individual (6DT3) dating \nto approximately second to fourth century ce from the purported \ngladiator or military cemetery at Driffield Terrace in York (Roman \n*Eboracum*), England60, who was previously identified as an ancestry \noutlier61,62, specifically carried approximately 25% EIA Scandinavian \nPeninsula-related ancestry (Fig. 2c). This documents that people with \nScandinavian-related ancestry already were in Britain before the fifth \ncentury ce, after which there was a substantial influx associated with \nAnglo-Saxon migrations9. Although it is uncertain whether this indi- \nvidual was a gladiator or soldier, individuals and groups from northern \nEurope are indeed recorded in Roman sources both as soldiers and as \nenslaved gladiators63,64. \n\nAcross Europe, we see regional differences in the southeastern and \nsouthwestern expansions of Scandinavian-related ancestries. Early \nmedieval groups from present-day Poland and Slovakia carry spe- \ncific ancestry from one of the Scandinavian EIA groups—the one with \nindividuals primarily from the northern parts of Scandinavia in the \nEIA—with no evidence of ancestry related to the other primary group \nin more southern Scandinavia (Fig. 2d). By contrast, in southern and \nwestern Europe, Scandinavian-related ancestry either derives from", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "We investigated regional differences in non-local ancestry across \nScandinavia. In Denmark, 25 out of 53 Viking Age individuals had detect- \nable (*z-*score > 1) central European-related ancestry (CentralEurope. \nIronRoman or Portugal.IronRoman) in their best accepted qpAdm \nmodels. In Sweden 20 out of 62 individuals had detectable central \nEuropean-related ancestry, concentrated almost entirely in southern \nregions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed \nin only 2 out of 24 individuals, indicating a wide-ranging impact of \nincoming ancestry in southern Scandinavia and suggesting more \n\nNature | Vol 637 | 2 January 2025 |**123**", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "individuals form a clade with respect to reference groups. The reason \nwhy this is a principled approach despite the 1000GP groups post-dating \nthe ancient individuals is that if a group of ancient individuals are truly \nhomogeneous, they will be so also with respect to later individuals. \n\n**Code availability**\nTwigstats is freely available under an MIT licence through GitHub \n(https://github.com/leospeidel/twigstats), and detailed documenta- \ntion, as well as example data, is available at https://leospeidel.github. \nio/twigstats/. The code has also been deposited at Zenodo (https:// \nzenodo.org/records/13833120)76. All scripts to reproduce simulations, \nand to run Relate on imputed ancient genomes, and downstream \nanalyses, including computation of*f*-statistics and running qpAdm \nmodels, are available through GitHub (https://github.com/leospeidel/ \ntwigstats_paper). \nWe then define clusters by running UPGMA (unweighted pair group \nmethod with arithmetic mean) on −log10[*P*values] obtained from \nqpwave between all pairs of individuals and cut the resulting dendro- \ngram at a height corresponding to a*P*value of 0.01. We then further \nsubdivide clusters by requiring all samples to be within 500 years of \nthe mean cluster age. \n\nTo choose the source groups shown in Fig. 2a and Extended Data \nFig. 1d, we run this algorithm on samples from Iron and Roman Age \nEurope (Supplementary Table 1). We retain groups that have at least \nthree individuals and, therefore, exclude clusters of size one or two. \n\n70. Maier, R., Flegontov, P., Flegontova, O., Changmai, P. & Reich, D. On the limits of fitting \n\ncomplex models of population history to*f*-statistics.*eLife***12**, e85492 (2023). \n71. Kelleher, J., Etheridge, A. M. & McVean, G. Efficient coalescent simulation and", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed3.pdf" + }, + { + "text": "Hunter-gatherers, early European farmers, and Yamnaya Steppe people46. \nWe show results for Twigstats-5000. Bias is measured as the difference in \nadmixture proportions obtained from Twigstats-5000 and all SNPs, and \nwe show standard errors of the latter. We plot two standard errors around \nthe mean. The standard error improvement shown is one minus the ratio of \nstandard errors obtained from Twigstats-5000 and using all SNPs.**d**, Neanderthal \nadmixture proportion inferred using an*f*4-ratio of the form*f*4(outgroup, Altai, \ntarget, Mbuti)/*f*4(outgroup, Altai, Vindija, Mbuti). We compute these on genetic \nvariation data from the Simon’s Genome Diversity Project (SGDP)75 and use the \nhigh-coverage Altai and Vindija Neanderthals78,79. We also compute equivalent \n*f*4-ratio statistics in a simulation emulating Neanderthal admixture 50,000 years \nago and a second simulation involving no Neanderthal admixture but deep \nstructure that leads to a similar inference unless deep coalescences are ignored \nby Twigstats. We plot two standard errors around the mean. \n\n**Extended Data Fig. 5 | Three examples of applying Twigstats. a**Fine-scale \npopulation structure simulation emulating ref. 39 (see Methods for simulation \ndetails). First two principal components are computed from pairwise outgroup \n*f*3 statistics on the genotypes directly and on Relate trees inferred from the \n50 target individuals. Labels in plots show the average coordinates of members \nof that population. For each panel, we calculate a separation index (SI) as in39, \nwhich we define as the proportion of individuals for which the closest \nindividual (by the Euclidean distance in PC space) is in the same population. \n**b**, Fine-scale genetic structure in Neolithic Europe quantified using an MDS \ncalculated on a symmetric matrix that contains all pairwise outgroup*f*3 \nstatistics (outgroup: YRI) between individuals. These are either calculated \ndirectly on genotypes or calculated using Twigstats on Relate genealogies \nwith a cutoff of 1000 generations. Individuals were selected by filtering based \non Steppe and Western Hunter-gatherer ancestry (Methods).**c**, Admixture \nproportions inferred using qpAdm with three distal sources of Western", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 10 | Ancestry models of farflung Viking individuals.**\n**a**, MDS of each farflung Viking group plotted on top of preceding Iron age and \nRoman individuals.**b**, All accepted qpAdm models using Twigstats-1000 for \nevery non-Scandinavian Viking individual computed in a rotational qpAdm \nwith source groups identical to Fig. 4. We plot one standard error.", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Viking Age mobility into Scandinavia**\nPrevious studies had suggested a major influx of ancestry related to \nBritain into Viking Age Scandinavia6,7. Although we detect this ances- \ntry in some individuals (7 individuals in Norway, 14 in Denmark and \n14 in Sweden), including some individuals whose ancestry appears to \nbe entirely derived from Iron Age Britain, its overall impact appears \nreduced compared with previous reports. Our analysis indicates a pro- \nportionally larger impact of ancestry from Iron Age Britain in northern \nNorway, with southern Scandinavia predominantly influenced by \ncontinental central European ancestries (Fig. 4d). We hypothesize \nthat our estimates of ancestry from Britain are reduced relative to \nprevious studies because ancestry related to Britain and continen- \ntal central Europe may have been indistinguishable. This could be \ndue to a lack of statistical power to distinguish these closely related \nsources with standard methods, as well as through potential biases \nintroduced by using modern surrogate populations that have since \nbeen influenced by later gene flow (such as gene flow into Britain). \nWe illustrate this by replicating the analyses previously described6,7 \n(Extended Data Fig. 8). \n\nSimilarly, a previous study has suggested that individuals at sites such \nas Kärda in southern Sweden carried ancestry from southern Europe6. \nIn our models, two Kärda individuals fit with central European-related \nancestry, but none of the individuals has a substantial proportion of \nancestry related to southern European sources (Extended Data Fig. 9). \nInstead, we detect ancestry from southern European sources in only \nthree individuals from Scandinavia, and in relatively small propor- \ntions (Fig. 4a). \n\n**Conclusions**\nOur approach, Twigstats, transfers the power advantage of haplotype- \nbased approaches to a fully temporal framework, which is applica- \nble to*f*-statistics and enables previously unavailable unbiased and \ntime-stratified analyses of admixture. We demonstrated that Twigstats \nenables fine-scale quantitative modelling of ancestry proportions, \nrevealing wide-ranging ancestry changes that affect northern and \ncentral Europe during the Iron, Roman and Viking ages. We reveal evi- \ndence of the southward and/or eastward expansion of individuals who \nprobably spoke Germanic languages and who had Scandinavian-related \nancestry in the first half of the first millennium ce. We note that \n‘Scandinavian-related’ in this context relates to the ancient genomes \navailable, and so it is entirely possible that these processes were driven, \nfor example, from regions in northern-central Europe. This could be \nconsistent with the attraction of the greater wealth, which tended to \nbuild up among Rome’s immediate neighbours and may have played \na major role in vectors of migration internal to communities in Europe \nwho lived beyond the Roman frontier52. Later, patterns of gene flow \nseem to have turned northwards, with the spread of Iron Age Central \nEurope-related ancestry into Scandinavia. Overall, our approach can \nbe used for the reconstruction of new high-resolution genetic histories \naround the world. \n\nInterestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "continuity from the EIA in Norway and northern Sweden (Fig. 4a). When \nconsidered collectively, the individuals who show evidence of central \nEuropean-related ancestry are mostly observed in regions histori- \ncally within the Danish sphere of influence and rule. Currently, no such \nindividuals, for example, are noted in eastern central Sweden, which \nwas a focus of regional power of the Svear (Fig. 4a). The difference in \ndistribution could suggest that the central European-related ancestry \nwas more common in regions dominated by the historical Götar and \ngroups inhabiting the lands on the borders of the Danish kingdom. \n\nthat of established groups, we focused on the island of Öland in south- \neast Sweden, where 23 individuals for whom we could reconstruct \nancestry portraits also had associated strontium stable isotope data66. \nStrontium isotope data from dental enamel reflect the geology of the \nregion where an individual grew to maturity, and there are considerable \ndifferences in expectations between Öland and many other regions \nin northern Europe. The full range of strontium isotope ratios in 109 \nindividuals show two modes, a majority group with low ratios and a \nsecond minority group with high ratios falling outside the expected \nrange of local fauna (Fig. 4b). Among 23 individuals with genomes in \nour data, all 5 individuals with 100% ancestry relating to central Europe To test the extent to which the variation in ancestry was consistent \nwith mobility during the lifetime of the individuals or, alternatively,", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a**, Map \nshowing ancestry carried by each Scandinavian Viking age individual.**b**, Ancestry \nproportions across individuals grouped by Latitude and genetic sex.**c**, Odds \nratio and p-values calculated using a two-sided Fisher’s exact test on the number \nof males and females carrying each ancestry in Viking Age Denmark, Sweden, \nNorway, Iceland, and Gotland.**d**,*F4*values of the form*f*4(Scandinavian_Peninsula_\nEIA(I), alternative source group, males in Viking group, females in Viking group) \ncomputed using all SNPs and Twigstats. A significantly positive value is \nevidence of attraction of females with pop2 or males with Scandinavian_\nPeninsula_EIA(I). Number of males and females is shown in each facet title and \nwe restrict to groups with at least four males and females. We plot one standard \nerror.**e**, Map showing ‘farflung’ Viking individuals grouped by ancestry and \ngenetic sex. In contrast to Fig. 4a and d where we showed results for the ‘best’ \nqpAdm model, here in panels**a**,**b, c,**and**e**, an individual is assigned an ancestry \ngroup, if it has**any**accepted model (p > 0.01) where that ancestry features.", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "What are the cultures with which the Wielbark culture is associated?", + "target_page": 4, + "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "In the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100%", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "II \nWielbark, Poland \nI \n\nBritain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb \n\n3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope \n\nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA \n\nItaly.lmperial(l) \nltaly.lmperial(ll) \nltaly.lronRepublic \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_earlyMED(I) \nLongobard_earlyMED(II) \nMontenegro_earlyMED \nNetherlands_Friesland_earlyMED \nPoland_BA \n\n**Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**\n**a**, Source groups used for qpAdm modelling of early medieval Europe. MDS is \ncomputed jointly with individuals from later periods using pairwise outgroup \n*f*3 statistics (outgroup: Han Chinese people). These are calculated using \nTwigstats on Relate genealogies with a cut-off of 1,000 generations. The \ngeographical map shows sampling locations of these individuals.**b**, The \ngenetic structure of ancient groups predominantly from early medieval \ncontexts shown on the same MDS as in**a**. The magnified inset shows an MDS \ncomputed without Twigstats on the same samples as the Twigstats MDS and \nfocusing on early medieval or later individuals.**c**, Ancestry models of early \nmedieval (EM) groups across Europe computed using qpAdm. Sample sizes are shown in black boxes. Sources are highlighted in**a**and marked as bold in the \nkey, and were used in a rotational qpAdm scheme. For each target group, we \nremove models with infeasible admixture proportions (falling outside [0, 1]) \nand use a Twigstats cut-off of 1,000 generations. All models satisfy*P*> 0.01, \nunless a −log10[*P*value] is shown next to the model. If models satisfy*P*> 0.05, \nwe show all such models; otherwise, we show only the model with the largest \n*P*value.**d**, The ancestry proportion derived from EIA Scandinavia in groups \nwith a non-zero component of this ancestry. We show groups modelled in**c**\nthat have a feasible model (*P*> 0.01). In**c**,**d**, we show one s.e. BA, Bronze Age; \nCNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking \nAge; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "continuity from the EIA in Norway and northern Sweden (Fig. 4a). When \nconsidered collectively, the individuals who show evidence of central \nEuropean-related ancestry are mostly observed in regions histori- \ncally within the Danish sphere of influence and rule. Currently, no such \nindividuals, for example, are noted in eastern central Sweden, which \nwas a focus of regional power of the Svear (Fig. 4a). The difference in \ndistribution could suggest that the central European-related ancestry \nwas more common in regions dominated by the historical Götar and \ngroups inhabiting the lands on the borders of the Danish kingdom. \n\nthat of established groups, we focused on the island of Öland in south- \neast Sweden, where 23 individuals for whom we could reconstruct \nancestry portraits also had associated strontium stable isotope data66. \nStrontium isotope data from dental enamel reflect the geology of the \nregion where an individual grew to maturity, and there are considerable \ndifferences in expectations between Öland and many other regions \nin northern Europe. The full range of strontium isotope ratios in 109 \nindividuals show two modes, a majority group with low ratios and a \nsecond minority group with high ratios falling outside the expected \nrange of local fauna (Fig. 4b). Among 23 individuals with genomes in \nour data, all 5 individuals with 100% ancestry relating to central Europe To test the extent to which the variation in ancestry was consistent \nwith mobility during the lifetime of the individuals or, alternatively,", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "We additionally perform non-parametric multidimensional scaling \n(MDS) on outgroup-*f*3 statistics44 computed using Twigstats, the results \nof which do not depend on any modelling assumptions and which show \nincreased resolution compared with conventional outgroup-*f*3 sta- \ntistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). \nEncouragingly, the MDS model supports regional fine-scale genetic \nstructures reflected in our source groups, such as the separation of \npredominantly Norwegian and northern Swedish EIA individuals from \nsouthern Peninsular Scandinavia (Fig. 2a); this relationship is not \ndetected without Twigstats. In this MDS analysis, we note a close affinity \nof wide-ranging individuals from Portugal, France, Germany, Austria \nand Britain. We hypothesize that this corresponds to areas associated \nwith the Celtic-speaking world, and that their close genetic affinity is \ndue to earlier expansions. Sparse sampling limits our understanding \nof the full extent of regional ancestry variation in central Europe and \nsome other regions, but the continental ancestries differentiated in \nthe MDS model suggests that major ancestry variation across Europe \nin this period is relatively well captured. \n\nWe next test the Twigstats time-restricted genealogy approach \non a range of empirical examples. First, we boost pairwise outgroup \n*f*3-statistics44 to quantify fine-scale population structure; we demon- \nstrate this improvement using a previously proposed simulation39 \n(Extended Data Fig. 5a). When applied to published genomes from \nNeolithic Europe (Methods and Supplementary Table 1), we can repli- \ncate the previously suggested fine-scale structure between individuals \nburied in megalithic structures in Ireland compared with others45, a \nrelationship that is not apparent from SNP data alone (Extended Data \nFig. 5b). For the well-studied example of three major ancestries contrib- \nuting to prehistoric Europe, that is, Mesolithic hunter-gatherers, early \nfarmers and steppe populations13–16, we obtain unbiased estimates and \nan approximately 20% improvement in standard errors in an already \nwell-powered qpAdm model46 (Extended Data Fig. 5c). \n\nFinally, we demonstrate that Twigstats can be used to resolve com- \npeting models of punctual admixture and long-standing gene flow, or \nconstrain the time of admixture. For instance, it has previously been \nsuggested that long-standing deep structure and gene flow between \nNeanderthals and early modern humans in Africa may produce genetic \npatterns that resemble a punctual admixture event some 60,000 years \nago47–49, casting doubt on the model of Neanderthal admixture into \nancestors of Eurasians49–51. However, whereas such long-standing deep \nsubstructure would confound SNP-based*f*-statistics to produce pat- \nterns similar to Neanderthal admixture, we demonstrate, in simula- \ntions, that Twigstats can clearly distinguish this history from recent \nadmixture (Extended Data Fig. 5d). Application of Twigstats on empiri- \ncal whole genomes produces results inconsistent with deep substruc- \nture alone, but consistent with punctual admixture. \n\n**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3).", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "Scandinavia \n\n\n\n**Fig. 3 | Time transects across six geographical regions in Europe.**\n**a**–**f**, Ancestry change visualized over a time transect spanning from the Bronze \nAge to the present day in Poland (**a**), southeastern Europe (**b**), central Europe \n(**c**), Italy (**d**), Britain and Ireland (**e**) and Scandinavia (**f**). The maps show sample \nlocations of all available ancient genomes with at least 0.5× coverage from these regions (Supplementary Table 1). Their ancestry is shown on the same \nMDS model as in Fig. 2a for each time period. For each geographic region, \nthe early medieval period is highlighted in orange and the area in the MDS \ncorresponding to Scandinavian and central European ancestries is highlighted \nin an orange box. \n\nmedieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. \n\nNearby, in present-day Hungary, we observe Scandinavian-related \nancestry components in several burials dating to the sixth century \nce associated with Longobards (Longobard_earlyMED(I))10 (Fig. 2c). \nThis is consistent with the original study10, which reported affinity to \npresent-day groups from northwestern Europe (GBR, CEU and FIN in \nthe 1000 Genomes Project (1000GP))10 but which we can resolve with", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "Hunter-gatherers, early European farmers, and Yamnaya Steppe people46. \nWe show results for Twigstats-5000. Bias is measured as the difference in \nadmixture proportions obtained from Twigstats-5000 and all SNPs, and \nwe show standard errors of the latter. We plot two standard errors around \nthe mean. The standard error improvement shown is one minus the ratio of \nstandard errors obtained from Twigstats-5000 and using all SNPs.**d**, Neanderthal \nadmixture proportion inferred using an*f*4-ratio of the form*f*4(outgroup, Altai, \ntarget, Mbuti)/*f*4(outgroup, Altai, Vindija, Mbuti). We compute these on genetic \nvariation data from the Simon’s Genome Diversity Project (SGDP)75 and use the \nhigh-coverage Altai and Vindija Neanderthals78,79. We also compute equivalent \n*f*4-ratio statistics in a simulation emulating Neanderthal admixture 50,000 years \nago and a second simulation involving no Neanderthal admixture but deep \nstructure that leads to a similar inference unless deep coalescences are ignored \nby Twigstats. We plot two standard errors around the mean. \n\n**Extended Data Fig. 5 | Three examples of applying Twigstats. a**Fine-scale \npopulation structure simulation emulating ref. 39 (see Methods for simulation \ndetails). First two principal components are computed from pairwise outgroup \n*f*3 statistics on the genotypes directly and on Relate trees inferred from the \n50 target individuals. Labels in plots show the average coordinates of members \nof that population. For each panel, we calculate a separation index (SI) as in39, \nwhich we define as the proportion of individuals for which the closest \nindividual (by the Euclidean distance in PC space) is in the same population. \n**b**, Fine-scale genetic structure in Neolithic Europe quantified using an MDS \ncalculated on a symmetric matrix that contains all pairwise outgroup*f*3 \nstatistics (outgroup: YRI) between individuals. These are either calculated \ndirectly on genotypes or calculated using Twigstats on Relate genealogies \nwith a cutoff of 1000 generations. Individuals were selected by filtering based \non Steppe and Western Hunter-gatherer ancestry (Methods).**c**, Admixture \nproportions inferred using qpAdm with three distal sources of Western", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 9 | Ancestry models of Viking Age individuals in**\n**Scandinavia. a**, MDS of each Scandinavian Viking group plotted on top of \npreceding Iron age and Roman individuals.**b**, All accepted qpAdm models using \nTwigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden, \nand Norway, computed in a rotational qpAdm with source groups identical to \nFig. 4. We only retain models with feasible admixture proportions, standard \nerrors of <0.25, and show models with 1 source and a p-value greater than 0.01 \nor otherwise with 2 sources and a p-value greater than 0.01. If several models \nsatisfy p > 0.05, we show all such models, otherwise we select the model with \nthe largest p-value. The -log10 p-values are shown to the left of each model. \nWe combine models involving related sources, if they exist, by averaging their \nrespective admixture proportions, standard errors, and p-values. We plot one \nstandard error.", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. \n\nIn southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "We investigated regional differences in non-local ancestry across \nScandinavia. In Denmark, 25 out of 53 Viking Age individuals had detect- \nable (*z-*score > 1) central European-related ancestry (CentralEurope. \nIronRoman or Portugal.IronRoman) in their best accepted qpAdm \nmodels. In Sweden 20 out of 62 individuals had detectable central \nEuropean-related ancestry, concentrated almost entirely in southern \nregions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed \nin only 2 out of 24 individuals, indicating a wide-ranging impact of \nincoming ancestry in southern Scandinavia and suggesting more \n\nNature | Vol 637 | 2 January 2025 |**123**", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", + "target_page": 1, + "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\ndetailed variability analysis for one of two reasons: \n(1) too few data points or (2) flux measurement un- \ncertainties on the order of the amplitude of observed \nvariability. It is important to note that, due to dis- \ncrepancies between the sampling frequency in both \nbands, the variability indices for the 850µm band may \nbe artificially depressed due to the fact that there are \nnot always corresponding measurements at higher fre- \nquencies during flaring epochs. \n\nWe follow the method of Kelly et al. [9], who model \nquasar optical light curves as a continuous time first- \norder autoregressive process (CAR(1)) in order to ex- \ntract characteristic time scales and the amplitude of \nflux variations. Although flaring behavior is not typi- \ncally thought of as an autoregressive process, we find \nthat the light curves are well-fit by the models and \ntherefore adopt the method here to study blazar sub- \nmillimeter light curves. \n\nFigure 3: Characteristic timescale (days) versus \nsubmillimeter luminosity (erg s−1) in the 1mm band for \nall objects. Physically, τ represents a “relaxation \ntimescale”, the timescale beyond which events are no \nlonger correlated. \n\nThe CAR(1) process is described by a stochastic \ndifferential equation [9], \n\n√ \n\n1 \nτ \ndS(t) = S(t) dt + σ dt (cid:15) (t) + b dt, (3) \n\nboth classes extending across a large range in τ . Be- \ncause of the uncertainty for objects with shorter char- \nacteristic timescales, it is hard to draw any definitive \nconclusions about the differences between classes. It \nis important to note that τ does not necessarily rep- \nresent a flaring timescale, which is a behavior that \ntypically operates on a scale of ∼10–100 days and not \non the longer timescales we see in τ . \n\n(4) \n\nIn equations 3 and 4, τ is called the “relaxation \ntime” of the process S(t) and is identified by the \nbreak in PX (f ). The power spectrum appears flat \nfor timescales longer than this and falls off as 1/f 2 for \ntimescales shorter than the characteristic timescale of \nthe process. **4. CONNECTION WITH GAMMA-RAYS**\n\nTaking the logarithm of the blazar light curve (in \nJy) to be S(t), we adopt τ (in days) as the character- \nistic timescale of variability, after which the physical \nprocess “forgets” about what has happened at time \nlags of greater than τ . The two other relevant pa- \nrameters, σ and µ = b/a, are the overall amplitude \nof variability and the logarithm of mean value of the \nlight curve, respectively. \n\nIn the routine, we construct an autoregressive \nmodel for the light curves for a minimum of 100,000 \niterations and calculate the value of τ from the break \nin the power spectrum in each instance. Due to the \nlimited number of observations in the 850µm band, \nwe performed this autoregressive analysis only for the \n1mm light curves, which typically have more than 10 \npoints per light curve. \n\nIn general, we find that in the submillimeter, we \nare observing these blazars at or near the peak of the \nsynchrotron component (αS ∼ 0), but that Fermi - \ndetected sources have more negative energy spectral \nindices overall than Fermi -nondetected sources. \nIn \nFigure 4, we see that while the majority of Fermi \nblazars are observed on the rising part of the syn- \nchrotron component (at lower energies than the peak), \nall of the objects have very steeply falling γ-ray energy \nspectral indexes, putting the γ-ray peak at lower en- \nergies than the observed Fermi band. Knowing that \nwe are not observing the synchrotron and γ-ray com- \nponents at analagous points in the spectrum may al- \nlow us to better understand the magnetic field in the \nparsec-scale jet region and the population of external \nphotons that is being upscattered to γ-rays. \n\nThis method yielded some surprising results. \nIn \nFigure 3, we see that the BL Lacs and FSRQs exhibit \nvirtually no difference in characteristic timescale, with", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. \n\n**Acknowledgments**\n\nThis research is supported by grants from the US \nDepartment of Energy, the US National Science Foun- \ndation, and the Smithsonian Institution, by NSERC in \nCanada, by Science Foundation Ireland, and by STFC \nin the UK. We acknowledge the excellent work of the \ntechnical support staff at the FLWO and the collab- \n\n\n \n \n \n \n [html]\n
| F : Aharonian et al. 2007, Af / A, 475, L0 | J. Holder, et al. 2008, AIPC ; 1085.657 | L. Costanante & G. Ghisellini 2002, Af / A, S84,56 ) E. S. Perlman 2000, AIPC, 515.53
F. W. Stecker et al. 1996, ApJ, 473, L75P. Giommi et al. 2005, A % A, 434.385
| S. Turriziani et al. 2007, A6 / A, 472.6990 JL. Costamante 2006, arXiv : 0612709
1 ) P. Padovani et al. 2002, ApJ, 581.8952 ) R. Mulikerjee et al. 2001. AIPC. 558.324
A. A. Abdo et al. 2009, ApJ, T00.5974 | V. A. Acciari et al. 2008, ApJ, 684, L73
5 | V. A. Acciari et al. 2009, ApJ, 707.612GJ V. A. Acciari et al. 2009, ApJ, 690, L126
77, V. A. Acciari et al. 2009, ApJ, 693, L104Sensory
9 ] R. A. Ong 2009, ATel, 19410 ) R. A. Ong et al. 2009, ATel, 2272
1 ) V. A. Acciari et al. 2009, ApJ, 708, L1002 | R. A. Ong et al. 2009, ATel, 2301
GS | R. A. Ong et al. 2009, ATel, 22604 ] R. A. Ong et al. 2009, ATel, 2309
5 ′ W. Benbow 2009, arXiv : 0908.14126J V. A. Acciari et al. 2009, ApJ, submitted
778 | V. A. Acciari et al. 2009, ApJ, in press
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n12-25 keV band, where the flux initially rose to about \n240 mCrab (2009 Oct 25-28), suddenly dropped to \nnon-detectable on 2009 October 29-30, then rose again \nduring the period 2009 October 31 to November 2. As \nof mid December 2009, the source remains in a high \nintensity state. The light curve is shown for the pe- \nriod MJD 54700-55200, again with 1-day resolution, \nin Fig. 8. The fluxes for XTE J1752-223 in Table 1 \nare given are for the interval of flaring activity, TJD \n55130-55180. \n\n\n\nThis work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. \n\n[1] C. Meegan et al., Ap. J. 702, 791 (2009). \n[2] C. Wilson-Hodge et al. (2010), these proceedings. \n[3] B. A. Harmon et al., Ap. J. Suppl. 138, 149 (2002). \n[4] B. A. Harmon et al., Ap. J. Suppl. 154, 585 (2004). \n[5] G. L. Case et al., in The First GLAST Symposium, \nedited by S. Ritz, P. Michelson, and C. Meegan \n(2007), vol. 921 of AIP Conf. Proceedings, p. 538. \n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub- \n\n(1998). \n\n[10] M. McConnell et al., Ap. J. 523, 928 (2000). \n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. \nAstrophys. Suppl. 5, 80 (2005). \n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. \n5, 341 (2005). \n\n[13] L. Bouchet et al., Ap. J. 693, 1871 (2009). \n[14] M. C. Bell et al., Ap. J. 659, 549 (2007). \n[15] G. L. Case et al. (2010), to be submitted. \n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 \nlished), astro-ph/0903.3037. \n[7] J. C. Ling and W. A. Wheaton, Ap. J. 598, 334 \n(2003). (2009). \n\n[8] E. Jourdain and J. P. Roques, Ap. J. 704, 17 (2009). \n[9] H. Steinle et al., Astron. and Astrophys. 330, 97", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "Where is the Submillimeter Array?", + "target_page": 1, + "target_passage": "near the summit of Mauna Ke", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n12-25 keV band, where the flux initially rose to about \n240 mCrab (2009 Oct 25-28), suddenly dropped to \nnon-detectable on 2009 October 29-30, then rose again \nduring the period 2009 October 31 to November 2. As \nof mid December 2009, the source remains in a high \nintensity state. The light curve is shown for the pe- \nriod MJD 54700-55200, again with 1-day resolution, \nin Fig. 8. The fluxes for XTE J1752-223 in Table 1 \nare given are for the interval of flaring activity, TJD \n55130-55180. \n\n\n\nThis work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. \n\n[1] C. Meegan et al., Ap. J. 702, 791 (2009). \n[2] C. Wilson-Hodge et al. (2010), these proceedings. \n[3] B. A. Harmon et al., Ap. J. Suppl. 138, 149 (2002). \n[4] B. A. Harmon et al., Ap. J. Suppl. 154, 585 (2004). \n[5] G. L. Case et al., in The First GLAST Symposium, \nedited by S. Ritz, P. Michelson, and C. Meegan \n(2007), vol. 921 of AIP Conf. Proceedings, p. 538. \n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub- \n\n(1998). \n\n[10] M. McConnell et al., Ap. J. 523, 928 (2000). \n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. \nAstrophys. Suppl. 5, 80 (2005). \n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. \n5, 341 (2005). \n\n[13] L. Bouchet et al., Ap. J. 693, 1871 (2009). \n[14] M. C. Bell et al., Ap. J. 659, 549 (2007). \n[15] G. L. Case et al. (2010), to be submitted. \n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 \nlished), astro-ph/0903.3037. \n[7] J. C. Ling and W. A. Wheaton, Ap. J. 598, 334 \n(2003). (2009). \n\n[8] E. Jourdain and J. P. Roques, Ap. J. 704, 17 (2009). \n[9] H. Steinle et al., Astron. and Astrophys. 330, 97", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + }, + { + "text": "2 J.-H. Chung, S. J. Chung, S. Lee, B. J. Kirby, J. A. \nBorchers, Y. J. Cho, X. Liu, and J. K. Furdyna, Phys. \nRev. Lett. 101, 237202 (2008). \n\nPolesya, H. Ebert, U. Wurstbauer, M. Hochstrasser, G. \nRossi, G. Woltersdorf, W. Wegscheider, and C. H. Back, \nPhys. Rev. Lett. 101, 267201 (2008). \n\n8 R. P. Campion, K. W. Edmonds, L. X. Zhao, K. Y. Wang, \nC. T. Foxon, B. L. Gallagher, and C. R. Staddon, J. Crys- \ntal Growth 247, 42 (2003). \n\n9 F. Maccherozzi, G. Panaccione, G. Rossi, M. Hochstrasser, \nM. Sperl, M. Reinwald, G. Woltersdorf, W. Wegscheider, \nand C. H. Back, Phys. Rev. B 74, 104421 (2006). \n\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Ed- \nmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. \n93, 132103 (2008). \n\n10 Ch. Binek, S. Polisetty, X. He and A. Berger, Phys. Rev. \nLett. 96, 067201 (2006). \n\n11 C. Won, Y.Z. Wu, E. Arenholz, J. Choi, J. Wu, and Z. Q. \n\n4 M. Zhu, M. J. Wilson, B. L. Sheu, P. Mitra, P. Schiffer, \nand N. Samarth, Appl. Phys. Lett. 91, 192503 (2007); M. \nZhu, M. J. Wilson, P. Mitra, P. Schiffer, and N. Samarth, \nPhys. Rev. B 78, 195307 (2008). \n\nQiu, Phys. Rev. Lett. 99, 077203 (2007). \n12 J. Nogues and I. K. Schuller, J. Magn. Magn. Mater. 192, \n203 (1999). \n\n13 K. F. Eid, M. B. Stone, K. C. Ku, O. Maksimov, P. Schiffer, \nN. Samarth, T. C. Shih and C. J. Palmstrom, Appl. Phys. \nLett. 85, 1556 (2004). \n\n5 S. Mark, C. Gould, K. Pappert, J. Wenisch, K. Brunner, \nG. Schmidt, and L. W. Molenkamp, Phys. Rev. Lett. 103, \n017204 (2009). \n\n14 B. T. Thole, P. Carra, F. Sette, and G. van der Laan, \nPhys. Rev. Lett. 68, 1943 (1992); P. Carra, B. T. Thole, \nM. Altarelli, and X. Wang, Phys. Rev. Lett. 70, 694 (1993). \n15 T. Jungwirth, J. Masek, K. Y. Wang, K. W. Edmonds, \n\n6 G. Wastlbauer and J.A.C. Bland, Adv. Phys. 54, 137 \n(2005). \n7 F. Maccherozzi, M. Sperl, G. Panaccione, J. Minar, S.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA \n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\nvations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. \n\nActive galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**\n\nfour 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. \n\n\n \n \n \n \n [html]\n
ObjectClass | RedshiftM 87
FR I0.004Mkn 421
HBL0.030Mkn 501
HBL0.0341ES 2344 + 514
HBL0.0441ES 1959 + 650
HBL0.047W Comae †
IBL0.102RGB J0710 + 591 †
HBL0.125H 1426 + 428
HBL0.1291ES 0806 + 524 †
HBL0.1381ES 0229 + 200
HBL0.1391ES 1218 + 304
HBL0.182RBS 0413 †
HBL0.1901ES 0502 + 675 †
HBL0.3413.66A †
IBL0.444?PKS 1424 + 240 †
IBL?VER J0521 + 211 †
??
\n\n**6. Blazars Upper Limits**\n\n(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", + "target_page": 2, + "target_passage": "only 129 of the SMA blazars", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA \n\nWe present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. \n\nlimeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. \n\nTo select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and \n\n1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. \n\nflux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. \n\n**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. \n\nas the presence of SSC versus ERC. Here, we use sub- \nmillimeter luminosity as a proxy for jet power, which \nis correlated with the integrated luminosity of the syn- \nchrotron component. Elevated γ-ray luminosity with \nrespect to the synchrotron component (which is often \nseen in FSRQs) suggests the upscattering of external \nphotons off the synchrotron-emitting electrons. These \nobjects should occupy the upper right of the ratio/jet \npower plot, and BL Lacs, which generally exhibit com- \nponents with roughly comparable luminosities, should \noccupy the lower left. It is clear from the figure, how- \never, that many FSRQs exhibit ratios similar to those \nof the BL Lacs and vis versa. \n\nlow luminosity ratios and high luminosity, which sug- \ngest they may be undergoing the same changes as 3C \n454.3. A possible interpretation of the elevated lumi- \nnosity ratios observed in some BL Lacs objects is that \nthere has been a dramatic increase in γ-ray luminos- \nity due to ERC, which would not be reflected in the \nsynchrotron component. \n\n**5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. \n\n[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. \n\nA systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. \n\n• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. \n\n**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "**18**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**16**\n**14**\n**12**\n**10**\n**8**\n**6**\n**4**\n**2**\n**0**\n**0** **2** **4** **6** **8** **10** **12** **14**\n**Crab Flux %**\n\n**12**\n\n**s**\n**e**\n**i**\n**r**\n**t**\n**n**\n**E**\n**10**\n\n**8**\n\n**6**\n\n**4**\n\n**2**\n\n**0**\n**−5** **−4** **−3** **−2** **−1** **0** **1** **2** **3** **4**\n**5**\nσ \n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard \nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the \nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The \ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation \nthreshold. The time-weighted average limit is less than ∼2% Crab flux. \n\nsince the launch of Fermi include LAT detections. In \naddition, several MWL campaigns on the well-studied \nVHE blazars Mkn 421 and Mkn 501 (please see the \ncontributions of D. Gall and A. Konopelko in these \nproceedings) were also performed. Highlights of these \ncampaigns include: \n\n• PKS 1424+240: The broadband SED of this IBL \n(at unknown redshift) is well described by an \nSSC model favoring a redshift of less than 0.1 \n[21]. Using the photon index measured with \nFermi-LAT in combination with recent EBL ab- \nsorption models, the VERITAS data indicate \nthat the redshift of PKS 1424+240 is less than \n0.66. \n• 1ES 2344+514: A major (50% Crab) VHE flare, \nalong with correlations of the VHE and X-ray \nflux were observed from this HBL. The VHE \nand X-ray spectra harden during bright states, \nand a synchrotron self-Compton (SSC) model \ncan explain the observed SED in both the high \nand low states [26]. \n\n• 1ES 1218+304: This HBL flared during VER- \nITAS MWL observations. \nIts unusually hard \nVHE spectrum strongly constrains the EBL. \nThe observed flaring rules out kpc-scale jet emis- \nsion as the explanation of the spectral hardness \nand places the EBL constraints on more solid- \nfooting [27, 28]. \n\n**8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. \n\n• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. \n\nEBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the \n\nVHE emission from 3C 66A was discovered by VER- \nITAS in September 2008 [17] during a flaring episode \nthat was also observed by the Fermi-LAT [18]. The \nobserved flux above 200 GeV was 6% of the Crab Neb- \nula flux and the measured VHE spectrum was very \nsoft (ΓVHE ∼ 4.1). RGB J0710+591 was detected", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica-", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. \n\n**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "How big is the Mermaid fleet?", + "target_page": 12, + "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. \n\nLast year we identified Broome as our next strategic position. No oil and gas work had been \n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance \n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first \n\nclient. The base was then established early this year. \n\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven \n\nmonths operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support \n\nof their current drilling programs. All the holes drilled from the Broome Base have been \n\ndesignated as commercial finds by the explorers and the very major increase in the reserves at \n\nBrecknock, Woodside’s permit 500 kilometres north of Broome creates optimism for future \n\nproduction based in the Broome area. \n\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu \n\nUndan project operated by Phillips, is well advanced and will impact Darwin’s offshore activity \n\nquite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with \n\nPerkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping \n\nis synonymous with Darwin’s history. Set up by V.B. Perkins in the late 40’s, it has grown to \n\nsignificant size, operating its ships across the top of Australia and into South East Asia. There \n\nare many synergies which Mermaid shares with Perkins and we look forward to developing our \n\nDarwin business in close association with that fine old Company. \n\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early \n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to \n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour \n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General \n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. \n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire \n\ncompany has become a significant force and can be expected to be in the final when major \n\nlabour hire contracts are let.", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. \n\nThe function and purpose of Berth 1 will be: \n\n• To service the larger offshore supply boat market on a fast turnaround basis. \n\n• To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going \n\nheavy lift ships and barges. \n\n• To handle inbound and outbound cargoes related to major offshore pipe lay projects. \n\n• To receive and efficiently load reel ships used for deep water small diameter pipelay. \n\n**C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted \n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas \n\nindustry and mineral ports. This berth will offer excellent weather protection for small and \n\nmedium size vessels. \n\n**D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and \n\narmor rock largely won from excavations on the Base. The excavations created will become \n\ndepositories for dredge spoil.", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**Board of Directors**\n\n**The Board carries out its responsibilities in accordance with the following:**\n\n**•**\n**•**\n**•**\n\nThe Board will comprise at least four directors; \n\nThe Board will be made up of at least one quarter of non-executive directors; \n\nThe directors must between them possess a broad range of skills, qualifications and \n\nexperience; \n\n**•**\n**•**\n\nThe Board will meet on a monthly basis; and \n\nAll available information in connection with items to be discussed at a meeting of the \n\nBoard will be provided to each director prior to that meeting. \n\n**The primary responsibilities of the Board include:**\n\n**•**\n**•**\n\nEstablishing Mermaid’s goals and developing strategic plans to achieve them; \n\nThe review and adoption of annual budgets and cashflow forecasts for the financial \n\nperformance of Mermaid and monitoring the results on an ongoing basis; \n\n**•**\n**•**\n\nIdentifying business risks and implementing actions to manage those risks; \n\nDeveloping an effective management and corporate system to ensure safety, quality, \n\nmeasure progress and exercise control; \n\n**•**\nEnsuring the employment and further development of efficient and qualified staff for \n\nthe growth of the Company’s business consistent with industry leadership; \n\n**•**\nIdentifying and developing strategic relationships for growth and access to specialist \n\nexpertise; and", + "page_start": 27, + "page_end": 27, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**•**\nOperating crewed vessel charters; \n\n**•**\nVessel manning, management and logistics; \n\n**•**\nOperating supply base facilities; and \n\n**•**\nEquipment hire. \n\nOther than detailed in the Chairman’s Report set out at pages 1 and 2 of this report and/or in \n\nthe Operations Review set out on pages 3 to 9 of this report, (together the “Chairman’s and \n\nOperations Reviews”), there have been no significant changes to these activities during the \n\nFinancial Year. \n\nIn respect of the financial year ended 30 June 1999, as detailed in the directors’ report for that D I V I D E N D \n\nfinancial year, a final dividend of 1.25 cents per share, franked to 100 per cent at 36 per cent \n\ncorporate income tax rate, was paid to the holders of fully paid ordinary shares on 1 November 1999. \n\nThe Chairman’s and Operations S I G N I F I C A N T C H A N G E S I N T H E S T A T E O F A F F A I R S \n\nReviews set out the matters which have had a significant effect on the state of affairs of Mermaid. \n\nOther than those matters there were no significant changes in the state of affairs of Mermaid \n\nduring the Financial Year. \n\nOn 25 August 2000 the Company announced that it had reached two S U B S E Q U E N T E V E N T S \n\nagreements for the placement of a total of 16,666,666 ordinary fully paid shares in the Company \n\nat an issue price of 30 cents each (Shares). \n\nThe first agreement was with Mr Mark Bradley, who agreed to take a placement of 3,225,000 \n\nShares by 29 September 2000, followed by, if approved of by shareholders at the Company’s \n\nannual general meeting, a further 3,441,666 within 7 days of that meeting. \n\n\n\n\n\nMermaid’s principal activities during the course of the Financial Year were: \nP R I N C I P A L A C T I V I T I E S", + "page_start": 32, + "page_end": 32, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. \n\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company’s \n\naccreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid’s quality assurance and \n\ncompliance team continues with a continuous day to day effort to improve our health, safety and \n\nenvironmental performance. Stringent charterer requirements, which are a pre requisite of \n\nincreased vessel usage, must be met to the letter and are the subject of regular and demanding \n\naudits. Although time consuming and expensive, we are grateful to certain of the large \n\nproducers, who while demanding the highest levels of compliance, have also been prepared to \n\ngive their time, sharing their safety expertise with us and in that way assisting in the very major \n\nadvances our company has made in this all important area. \n\n\n\n\n\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have S A F E T Y \n\nresponsibility.", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Mermaid Marine services base at the Port of Broome (Broome Base) B R O O M E S U P P LY B A S E \n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex \n\nBrowse Ltd arrived from Japan. \n\n\n\nIt is presently expected that at least six \n\n(6) exploration wells will be drilled in the \n\narea during 2001. The Base now employs \n\nas many as ten (10) staff up from the \n\nthree (3) who commenced in February \n\n2000. Excellent management and staff \n\ncompetence are the prime factors, which \n\nhave delivered the smooth start up and \n\n***The Mermaid Broome Supply Base certified Impex, Woodside***\n***and BHP Petroleum exploration program during 2000.*** continued success at Broome. \n\nThe base is currently secured on a come and go lease arrangement, located on Port premises \n\nadjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the \n\nsite has limitations in terms of size and slope. An area more suitable for our long term needs has \n\nbeen optioned from Port authorities and discussions will proceed with our clients this year to \n\ndetermine their precise needs. \n\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and \n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board \n\nto consider further investment to ensure that capability keeps pace with demand and that we \n\nleave no reason for competitors to offer more or better. \n\nThe offshore waters of the Northern Territory, the Zone of Co-Operation (ZOCA) between Australia \n\nand Timor, and the Commonwealth Territory of Ashmore and Cartier host approximately 35% of the \n\nexploration and development budgets of Australian offshore oil and gas industry. D A R W I N B A S E \n\nTwo large petrochemical projects are under study for the Darwin area based upon pipelines from \n\nthe Timor Sea gas resources of the projects above. \n\nDarwin will within 3 years be the northern terminus of the Australian national rail system with the \n\ncompletion of the Alice Springs Darwin rail link, further expanding its role in Australia’s economy.", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service \n\nour marine industries. Some of this has been due to a historical link with our recent industrial \n\npast. This is now behind us, and Australia has now become a centre of excellence with respect \n\nto both new building and ship repair, particularly for high tech and specialty vessels. \n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is \n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between \n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private \n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target. \n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set \n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be \n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne \n\nvessels to be side slipped, thereby increasing capacity. \n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. \n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship \n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns. \n\nMermaid has purchased a very large cyclone rated industrial building \n\n\n\nframe which will be sited beside the slipway and tenanted by Mermaid \n\nengineering and companies which will provide ancillary services \n\nrelated to ship repair. \n\n***The Northwest Shelf is a***\n***world scale offshore oil and***\n***gas exploration province.***", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. \n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. \n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough \n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. \n\nAs construction commences at Dampier, a level of project finance will be arranged providing a \n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance. \n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax F I N A N C I A L \n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease \n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the \n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This \n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on \n\noverheads, which included more beneficial ownership costs, insurance savings, management \n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the \n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line. \n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the \n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the \n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved \n\nto be the right decision for all market conditions. Although there have been no contracts yet let \n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity \n\nhas returned. Expressions of interest for major project work have been issued and as an indication \n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two \n\nmonths to 31st August 2000. The trend has continued in September.", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "What was the budget for the expansion of Dampier Base?", + "target_page": 14, + "target_passage": "a capital budget of $13m", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Work on Dampier B A S E E X P A N S I O N W O R K S A N D E N V I R O N M E N T A L M A N A G E M E N T \n\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving \n\na capital budget of $13m. \n\n**A. DREDGING**\n\nApproximately 700,000 m3 of material is to be dredged in King Bay to form an entrance \n\nchannel, vessel berths, cyclone moorings and to provide access to the slipway. \n\nThe experience of Woodside constructing their nearby base in 1981 indicates that two types of \n\ndredges will be required, a Cutter Suction to remove the soft unconsolidated material (approx.70%) \n\nand a Dipper Dredge (barge mounted back-hoe) to remove harder consolidated material. \n\nThe Dipper Dredge will be the largest of its type in the world, and will be an ideal remedial \n\ndredging tool using the experience gained from the earlier Woodside project. \n\nThe layout of the Base has been very much driven by the desire to avoid or minimize blasting \n\nwhile fulfilling functional objectives. \n\n**B. QUAY WALL ( BERTH 1)**\n\nMarket research and customer needs have caused Mermaid to relocate and redesign the main \n\nberth to accommodate a wider range of vessels than originally contemplated. The berth is now \n\nlocated in deeper water with better vessel access. \n\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide \n\n(MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**•**\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle \n\nmost of the 60 vessels currently working in the region, a considerable number, but one \n\nwhich will rise over coming years. First class engineering facilities have been planned \n\nand highly experienced management recruited. Alternative slipways offering \n\ncomparable capacity are only to be found in Darwin or Fremantle, a sea journey of \n\napproximately 1000 miles from this operational region. Australia has emerged as a \n\ncentre of excellence with respect to vessel repair work, the Dampier facility will both \n\nbenefit from and protect that valuable reputation. \n\n**•**\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The \n\nmajor oilfield services company Halliburton, have been attracted to the base as a \n\ntenant and a $1.1m purpose built building is being constructed for their use. \n\nNegotiations are also proceeding with other groups who recognise the unique \n\nadvantages of operating from this strategically positioned Base. Rental income and \n\nassociated revenues such as plant and labour hire will contribute significantly to the \n\noverall economics of the facility. \n\n**•**\nProtected moorings for cyclone shelter will be established inside the breakwater for \n\nlong term lease to local tug operators. The demand arises from serious vessel and crew \n\nsafety considerations. The Dampier Port Authority are reluctant to see the continued \n\nuse of cyclone moorings in the Harbour, not only for safety reasons, but for \n\nenvironmental concerns as well. Oil spills are not acceptable under any circumstances \n\nand will be avoided whatever the cost. Tug owners share similar concerns, but in \n\naddition they need to remain in a position of readiness for crews and equipment to \n\nresume their important functions immediately following a cyclonic event. The number \n\nof specific purpose spread moorings, detailed on the adjacent plan will total 10 in the \n\nfirst phase of construction, a limit which will be assisted by an ability to remove vessels \n\nup to 100 tonnes from the water by wharf crane for tie down on cradles.", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\nand accounting personnel to annually adjust the Company's rates used to expense capitalized costs. Changes \nin these estimates primarily relate to changes in available airspace, inÖation and applicable regulations. \nChanges in available airspace include changes due to the addition of airspace lying in probable expansion \nareas. \n\n**Total Available Disposal Capacity**\n\nAs of December 31, 2004, the Company owned or operated 58 solid waste landÑlls with total available \ndisposal capacity of approximately 1.7 billion in-place cubic yards. Total available disposal capacity represents \nthe sum of estimated permitted airspace plus an estimate of expansion airspace that the Company believes has \na probable likelihood of being permitted. \n\n**Probable Expansion Airspace**\n\nBefore airspace included in an expansion area is determined as probable expansion airspace and, \ntherefore, included in the Company's calculation of total available disposal capacity, the following criteria \nmust be met: \n\n1. The land associated with the expansion airspace is either owned by the Company or is controlled \nby the Company pursuant to an option agreement; \n\n2. The Company is committed to supporting the expansion project Ñnancially and with appropriate \nresources; \n\n3. There are no identiÑed fatal Öaws or impediments associated with the project, including political \nimpediments; \n\n4. Progress is being made on the project; \n\n5. The expansion is attainable within a reasonable time frame; and \n\n6. The Company believes it is likely the expansion permit will be received. \n\nUpon meeting the Company's expansion criteria, the rates used at each applicable landÑll to expense \ncosts to acquire, construct, close and maintain a site during the post-closure period are adjusted to include \nprobable expansion airspace and all additional costs to be capitalized or accrued associated with the expansion \nairspace. \n\nThe Company has identiÑed three sequential steps that landÑlls generally follow to obtain expansion \npermits. These steps are as follows: \n\n1. Obtaining approval from local authorities; \n\n2. Submitting a permit application to state authorities; and \n\n3. Obtaining permit approval from state authorities. \n\nOnce a landÑll meets the Company's expansion criteria, management continuously monitors each site's \nprogress in obtaining the expansion permit. If at any point it is determined that an expansion area no longer \nmeets the required criteria, the probable expansion airspace is removed from the landÑll's total available \ncapacity and the rates used at the landÑll to expense costs to acquire, construct, cap, close and maintain a site \nduring the post-closure period are adjusted accordingly. \n\n67", + "page_start": 74, + "page_end": 74, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "the consumption of cubic yards of available airspace. These costs include all costs to acquire and construct a \nsite including excavation, natural and synthetic liners, construction of leachate collection systems, installation \nof methane gas collection and monitoring systems, installation of groundwater monitoring wells, and other \ncosts associated with the acquisition and development of the site. Obligations associated with Ñnal capping, \nclosure and post-closure are capitalized, and amortized on a units-of-consumption basis as airspace is \nconsumed. \n\nCost and airspace estimates are developed annually by engineers. These estimates are used by our \noperating and accounting personnel to annually adjust our rates used to expense capitalized costs. Changes in \nthese estimates primarily relate to changes in available airspace, inÖation and applicable regulations. Changes \nin available airspace include changes in design and changes due to the addition of airspace lying in expansion \nareas that we believe have a probable likelihood of being permitted. \n\nOur operations are managed and reviewed through Ñve regions which we designate as our reportable \nsegments. From 2003 to 2004, operating income increased in our Eastern, Southern and Western regions due \nto an overall increase in revenue resulting from the successful execution of our growth strategy. In the Central \nregion, increased revenue was oÅset by weak economic conditions and an increase in costs related to the long- \nhaul transport of waste by third-party vendors. In the Southwestern region, revenue growth was impeded by \nthe closure of a landÑll and the completion of a special waste contract during 2003. The decrease in costs for \nCorporate Entities from 2003 to 2004 is primarily due to a decrease in self-insurance expense. \n\n**2004 Financial Objectives**\n\nIn January 2004, we publicly announced our objectives for the year. These objectives included the \nfollowing: \n\n‚ Generating free cash Öow of approximately $340 million. \n\n‚ Using our free cash Öow to repurchase shares of our common stock under our $200.0 million share \nrepurchase program approved by our board of directors in October 2003 and continuing to pay \nquarterly cash dividends. \n\n‚ Generating diluted earnings per share of $1.50 to $1.55. \n\n‚ Growing revenue from core operations by 3%, with approximately 2% attributable to price increases \nand 1% attributable to volume growth. \n\n‚ Purchasing approximately $275 million of property and equipment. \n\n**2004 Business Performance**\n\nDuring 2004, we achieved our earnings per share objective and exceeded our internal growth, free cash \n\nÖow and share repurchase objectives. \n\nOur internal growth from core operations for 2004 was 5.9%, with 2.3% from price increases and 3.6% \nfrom volume growth. During 2004, our revenue growth from core pricing beneÑted from a broad-based pricing \ninitiative which we started during the fourth quarter of 2003. We experienced core volume growth in all lines \nof our business, including our residential collection business resulting from the addition of several new \nmunicipal contracts, and our landÑll and transfer station businesses resulting from newly opened sites and new \ncontracts. Our core volume growth was also positively impacted by the hurricanes. In addition, our geographic \nmix of business, which is concentrated in high growth markets, positively impacted our operating results. As a \nresult, during 2004 we were able to exceed the internal growth objectives we established at the beginning of \nthe year. \n\nDuring 2004, our operating margins improved, primarily due to lower self-insurance expense. This beneÑt \nwas partially oÅset by increased costs for fuel, labor and subcontracting costs associated with the long-haul \ntransport of waste by third party vendors. The net expansion in our operating margin allowed us to achieve \ndiluted earnings per share of $1.53 during the year ended December 31, 2004. \n\n24", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "budget.considering the med was only only only the blood. The $ 200 ml Elion development commenced following the granting of the necessary Board approvals as well as the finalisation of a larger Gas Salesmore than 100.000 barrels per day. This excellent performance generated production for the year of 19 million barrels – 22 % above expectations.year end. The conversion of the state - of - the - art Floating Production Storage and Offloading facilityCASIN0 AND 30HN BR00KESSANCT30NEDWhile two projects came into production, Santos added two more to the development.Agreement with TXU. Gas production is expected to start in the first quarter of 2006. All formal environmental premotic bronchosteronal premoterThe liquids project involves extracting and processing wet gas to remove condensate, propane and butane ( Siquids ) before re - injecting dry gas back into theshlpyard in Singapore in December 2004 with no lost time safety incidents despite a massive workforce completing over two million work hours.conveyor with the sanctioning of the Casino and John Brookes gas projects during the year. Casino was formally sanctioned in October and was 25 % completegranted for the project by the Commonwealth Government. The use of existing onshore facilities and a low environmental impact design have been integral to", + "page_start": 19, + "page_end": 19, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Killam estimates that $450 per unit of the capital spending relates to maintenance capital, and the remainder relates to value enhancing \nupgrades. Maintenance capital varies with market conditions and relates to investments that are not expected to lead to an increase in NOI, \nor increased efficiency, of a building; however, it is expected to extend the life of a building. Examples of maintenance capital include roof \nand structural repairs and are in addition to regular repairs and maintenance costs that are expensed to NOI. Value enhancing upgrades are \ninvestments in the properties that are expected to result in higher rents and/or increased efficiencies. This includes unit and common area \nupgrades and energy investments, such as natural gas conversions.", + "page_start": 49, + "page_end": 49, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "During 2002, total available airspace increased by 22.6 million cubic yards primarily due to the opening of \na greenÑeld site in South Carolina, changes in engineering estimates and changes in design partially oÅset by \nconsumption. During 2003, total available airspace increased by 56.1 million cubic yards due to new \nexpansions undertaken, two landÑlls that were acquired during the year and changes in design partially oÅset \nby airspace consumption and changes in engineering estimates. During 2004, total available airspace \ndecreased by 15.5 million cubic yards primarily due to airspace consumption partially oÅset by the acquisition \nof a landÑll. \n\nAs of December 31, 2004, we owned or operated 58 solid waste landÑlls with total available disposal \ncapacity estimated to be 1.7 billion in-place cubic yards. Total available disposal capacity represents the sum \n\n38", + "page_start": 45, + "page_end": 45, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "[html]003 and 2002 :Balance as of December 31.2001New Expansions UndertakenLandfills Acquired, Net of DivestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges in DesignBalance as of December 31.2002Permitted airspace :Cubic yards ( in millions )1.329.0—4.945.1( 34.6 )13.1. 41.357.9Number of sites.......541156Expansion airspace :Cubic yards ( in millions )359.64.3—( 35.7 )—( 2.1 )27.2353.3Number of sites.......202—( 2 )_____20Total available airspace :Cubic yards ( in millions )1.688.64.34.99.4< underline >( 34.6 )11.027.61.711.2Number of sites___54Table__1156Balance as of December 31.2002New Expansions UndertakenLandfills Acquired, Net of DirestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges In DesignBalance as of December 31.2003Permitted airspace :Cubic yards ( in millions )1.357.9—26.3154.6( 39.3 )(. 9 )—1.498.6Number of sites562—58Expansion airspace :Cubic yards ( in millions )353.361.6—( 154.1 )—( 3.5 )11.4268.7Number of sites20——( 5 )_________________________________________________________________________________________________________________________________________________________________________________________________________15Total available airspace :Cubic yards ( in millions )1.711.261.626.3_5( 39.3 )( 4.4 )11.41.767.3Number of sites56 mm2 months—58 mmBalance as of December 31.2003Landfills Acquired, Net of DirestituresPermits Granted, Net of ClosuresAirspace ConsumedChanges in Engineering EstimatesChanges In DesignBalance as of December 31.2004Permitted airspace :Cubic yards ( in millions )1.498.624.448.6( 42.1 ). 1—1.529.6Number of sites581( 1 )58Expansion airspace :Cubic yards ( in millions )268.7—( 48.6 )—. 12.0222.2Number of sites15—( 3 )_____12Total available airspace :Cubic yards ( in millions )1.767.324.4—( 42.1 )− 22.01.751.8Number of sites581( 1", + "page_start": 45, + "page_end": 45, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "When did Mermaid Marine Service Base in the Port of Broome start?", + "target_page": 22, + "target_passage": "1 February 2000", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Mermaid Marine services base at the Port of Broome (Broome Base) B R O O M E S U P P LY B A S E \n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex \n\nBrowse Ltd arrived from Japan. \n\n\n\nIt is presently expected that at least six \n\n(6) exploration wells will be drilled in the \n\narea during 2001. The Base now employs \n\nas many as ten (10) staff up from the \n\nthree (3) who commenced in February \n\n2000. Excellent management and staff \n\ncompetence are the prime factors, which \n\nhave delivered the smooth start up and \n\n***The Mermaid Broome Supply Base certified Impex, Woodside***\n***and BHP Petroleum exploration program during 2000.*** continued success at Broome. \n\nThe base is currently secured on a come and go lease arrangement, located on Port premises \n\nadjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the \n\nsite has limitations in terms of size and slope. An area more suitable for our long term needs has \n\nbeen optioned from Port authorities and discussions will proceed with our clients this year to \n\ndetermine their precise needs. \n\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and \n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board \n\nto consider further investment to ensure that capability keeps pace with demand and that we \n\nleave no reason for competitors to offer more or better. \n\nThe offshore waters of the Northern Territory, the Zone of Co-Operation (ZOCA) between Australia \n\nand Timor, and the Commonwealth Territory of Ashmore and Cartier host approximately 35% of the \n\nexploration and development budgets of Australian offshore oil and gas industry. D A R W I N B A S E \n\nTwo large petrochemical projects are under study for the Darwin area based upon pipelines from \n\nthe Timor Sea gas resources of the projects above. \n\nDarwin will within 3 years be the northern terminus of the Australian national rail system with the \n\ncompletion of the Alice Springs Darwin rail link, further expanding its role in Australia’s economy.", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. \n\nLast year we identified Broome as our next strategic position. No oil and gas work had been \n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance \n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first \n\nclient. The base was then established early this year. \n\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven \n\nmonths operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support \n\nof their current drilling programs. All the holes drilled from the Broome Base have been \n\ndesignated as commercial finds by the explorers and the very major increase in the reserves at \n\nBrecknock, Woodside’s permit 500 kilometres north of Broome creates optimism for future \n\nproduction based in the Broome area. \n\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu \n\nUndan project operated by Phillips, is well advanced and will impact Darwin’s offshore activity \n\nquite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with \n\nPerkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping \n\nis synonymous with Darwin’s history. Set up by V.B. Perkins in the late 40’s, it has grown to \n\nsignificant size, operating its ships across the top of Australia and into South East Asia. There \n\nare many synergies which Mermaid shares with Perkins and we look forward to developing our \n\nDarwin business in close association with that fine old Company. \n\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early \n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to \n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour \n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General \n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. \n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire \n\ncompany has become a significant force and can be expected to be in the final when major \n\nlabour hire contracts are let.", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. \n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. \n\nThe Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service \n\nour marine industries. Some of this has been due to a historical link with our recent industrial \n\npast. This is now behind us, and Australia has now become a centre of excellence with respect \n\nto both new building and ship repair, particularly for high tech and specialty vessels. \n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is \n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between \n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private \n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target. \n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set \n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be \n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne \n\nvessels to be side slipped, thereby increasing capacity. \n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. \n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship \n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns. \n\nMermaid has purchased a very large cyclone rated industrial building \n\n\n\nframe which will be sited beside the slipway and tenanted by Mermaid \n\nengineering and companies which will provide ancillary services \n\nrelated to ship repair. \n\n***The Northwest Shelf is a***\n***world scale offshore oil and***\n***gas exploration province.***", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when \n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast \n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of \n\nOnslow and Exmouth further to the south. \n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers \n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is \n\ntypically on cyclone alert three times per season. The season is November to April. \n\nTo date there have been three options available to vessel owners when a cyclone approaches:. \n\n• Run to sea \n\n• Take refuge with crew onboard, on a mooring in the most sheltered location available such \n\nas the Dampier Archipelago or the Monte Bello Islands. \n\n• Construct a cyclone shelter. \n\nMermaid has undertaken significant engineering work on the placing of vessels on partially \n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews \n\ndemobilized to take care of their families and attend to household cyclone preparation.", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. \n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. \n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough \n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. \n\nAs construction commences at Dampier, a level of project finance will be arranged providing a \n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance. \n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax F I N A N C I A L \n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease \n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the \n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This \n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on \n\noverheads, which included more beneficial ownership costs, insurance savings, management \n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the \n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line. \n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the \n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the \n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved \n\nto be the right decision for all market conditions. Although there have been no contracts yet let \n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity \n\nhas returned. Expressions of interest for major project work have been issued and as an indication \n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two \n\nmonths to 31st August 2000. The trend has continued in September.", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Darwin is serviced by three marine infrastructure elements. \n\na. A public port adjacent to the main business centre, which is destined to be redeveloped \n\nas a cruise ship and tourism precinct . \n\nb. A group of freehold water front properties on Frances Bay near to the main business \n\ncenter. \n\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from \n\nthe main business district. \n\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for \n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the \n\nconclusion of a contract then being required to return to Darwin within days or weeks for \n\nanother assignment. \n\nMermaid has decided that needs and opportunities in the north of Australia can be best served by \n\nentering a co-operative arrangement with an established Darwin Company. Agreement has therefore \n\nbeen reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay. \n\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in \n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to \n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in \n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are \n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give \n\nMermaid well placed office facilities, open storage and waterfront access.", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. \n\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company’s \n\naccreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid’s quality assurance and \n\ncompliance team continues with a continuous day to day effort to improve our health, safety and \n\nenvironmental performance. Stringent charterer requirements, which are a pre requisite of \n\nincreased vessel usage, must be met to the letter and are the subject of regular and demanding \n\naudits. Although time consuming and expensive, we are grateful to certain of the large \n\nproducers, who while demanding the highest levels of compliance, have also been prepared to \n\ngive their time, sharing their safety expertise with us and in that way assisting in the very major \n\nadvances our company has made in this all important area. \n\n\n\n\n\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have S A F E T Y \n\nresponsibility.", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**7. RELATED PARTY TRANSACTIONS**\n\nThe directors of Mermaid Marine Australia Limited during the Financial Year were: \n\nA G Birchmore \nJ H Carver \nD A Dillon \nJ A S Mews (appointed 12 August 1998) \n(appointed 29 June 1998) \n(appointed 12 August 1998) \n(appointed 12 August 1998) \n\nInterest in the shares of the Company held by directors and their director related entities as at 30 June 2000. \n\n**Mermaid Marine Australia Limited**\n\n**Ordinary Shares**\n\n**Options over**\n**Ordinary Shares**\n\nA G Birchmore \nJ H Carver \nD A Dillon \nJ A S Mews 13,695,300 \n13,631,300 \n1,520,000 \n1,500,000 382,000 \n20,000 \n10,000 \n– \n\nThe following related party transactions occurred during the Financial Year: \n\n**Transactions with directors and director related entities**\n\nDuring the Financial Year, a total of $75,000 for directors fees was paid to Chalfont Holdings Limited, a \nrelated entity of A G Birchmore. This is reflected in full in note 24 – Remuneration of Directors. \n\n**Transactions with other related parties**\n\n(a) Mermaid Achiever \n\nThe Achiever Partnership (comprising Delmark Investments Pty Ltd, a related entity of A G \nBirchmore, J H Carver, D A Dillon and P D M Holdings Pty Ltd, a related entity of J A S \nMews) entered into a put and call option agreement with the Company on 12 April 1999, \npursuant to which it was agreed that either party could, at any time between 30 June 2000 and \nthe expiration of the Company’s Charter of the Mermaid Achiever from the Achiever \nPartnership, oblige the other party to enter into an Agreement for the sale and purchase of that \nvessel at price fixed at $3,250,000. \n\nOn 24 September 1999 the Company exercised its option to acquire the Mermaid Achiever in \naccordance with the terms of the above option. Bareboat Charter Fees of $184,000 were paid \nfor the period 1st July 1999 to the 30th September 2000 the effective date of settlement. \n\n(b) Fremantle Premises \n\n(i) \n\nThe Achiever Partnership and the Company entered into a heads of agreement \ndated 12 April 1999 for the lease to the entity of its registered office at 20 Mews \nRoad, Fremantle. \n\n(ii) \n\nThe term of the lease is 5 years with a 5 year option of renewal in favour of the \nCompany. \n\n(iii) \n\nThe Company is responsible for all fitting out, maintenance (except capital \nworks items), rates, taxes, insurance, and other usual variable outgoings. \n\n(iv) The offices have undergone substantial refurbishment.", + "page_start": 59, + "page_end": 59, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How do I create a new document in Word?", + "target_page": 2, + "target_passage": "Just select File > New", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "Unlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will \nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too, \nso you can learn by doing. \n\nFor practice using Word features, watch for Try it text in red throughout this document. \n\nTime saver: If you’ve only got a minute \nand you want to see how this works, \nwatch this Video: Welcome to Word. \n\n\n\nWrite eloquently, with a little help \n\nWord automatically checks spelling and grammar, and marks misspelled words with a red \nsquiggly underline. Grammatical glitches get a blue double underline. \n\nTry it: Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write \na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph. \n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct \nthe mistakes.", + "page_start": 0, + "page_end": 0, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "**4** **2**\n\n\n\n\n\n*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_6.xlsx...*\n Click on the***Maintenance***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab \n\n*We’ll copy this completed*\n*data to another workbook...*\n\n Right-click on the \n\nworksheet tab to display \nthe shortcut menu, then \nclick on***Move or Copy***to \ndisplay the***Move or Copy***\ndialog box \n\n Click on the drop arrow for \n***To book***, then select**(new**\n**book)**\n\n Click on***Create a copy***so \nit appears ticked \n\n*This will create a new*\n*workbook as well as*\n*making a copy of the*\n*worksheet...*\n\n Click on**[OK]**\n\n*A new workbook will be*\n*created and Maintenance*\n*will be the only worksheet*\n*in the workbook…*\n\n Save the new workbook as \n***Maintenance.xlsx***, then \nclose it \n\n\n\n\n\n\n\n**Handy to Know…**\n To copy a worksheet into an existing \n\nworkbook, make sure that you open the \ndestination workbook first to ensure that it is \nlisted in***To book***in the***Move or Copy***\ndialog box. \n\n**For Your Reference…**\nTo***copy***a***sheet***to***another workbook***: \n\n1. Right click on the worksheet tab, then click \non***Move or Copy***\n\n2. Select either***(new book)***or the name of \nanother workbook in***To book***\n\n3. Tick***Create a copy***, then click on**[OK]**", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise...*\n\n Click on**File Tab**\n\n then \nselect**Print**to display the \n***Print***dialog box \n\n*Your dialog box may appear a*\n*little different to the one*\n*shown, as the available*\n*options will depend on the*\n*make and model of printer that*\n*you are using...*\n\n Click on**Print**to print the \npages \n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n**For Your Reference…**\nTo***close a workbook***: \nTo***print a document***: \n\n1. Click on the***File Tab***\n1. Click on the***File Tab***\n2. Click on**Print**\n\n and select**Close**", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. \n\nView who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. \n\n\n\nReview and track changes \n\nWhether you just want to check spelling, keep your word count in check, or fully \ncollaborate with other people, the**Review**tab has essential commands to track, \ndiscuss, and manage all of the changes made to your documents. \n\nFormat with styles \n\n**Styles**lets you create, apply, and review the formatting styles in your current \ndocument. To open it, select the**Home**tab, and then select the small arrow in the \nlower right corner of the Styles gallery.", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "Publisher calls the**HrCreateDoc**method at the beginning of the fixed-format export \n\nprocess to specify the creation of an empty fixed-format document. The*wzDocExFile*\n\nparameter specifies a name for the output file to which to write the fixed-format \n\ndocument. \n\nFor an add-in implementation, Publisher calls**HrCreateDoc**with the file name that the \n\nadd-in provided in the call to the**ExportToFixedFormat**method in the Microsoft Office \n\nobject model. However, because add-ins typically provide configuration UI to allow the \n\nuser to specify an output file name, the add-in could disregard this file name during the \n\nexport process. \n\nFor Microsoft Office applications that require the add-in to paginate the document, \n\n**HrCreateDoc**is called twice, once at the start of the pagination-calling sequence, and \n\nagain after the add-in has paginated the document. For more information, see the \n\ndescriptions for the HrSetPageHeightForPagination method and the HrGetPageBreaks \n\nmethod. \n\n\n \n \n \n \n [html]\n
HRFSIII T_HnGatDpFault1_rid (DwORD_1cid
", + "page_start": 12, + "page_end": 12, + "source_file": "office-pdf.pdf" + }, + { + "text": "**1** **2**\n\n\n\n\n\n\n\n\n\n press \n\n\n\n\n\n\n\n\n\n**Try This Yourself:**\n\n*Before you begin ensure*\n*that there is a blank*\n*workbook on the screen…*\n\n Click in cell***A3***to make \n\nthis the active cell, type \n**Garden Settings**and \npress \n\n*When you press*\n*next cell down*\n*automatically becomes*\n*the active cell. By the*\n*way, even though the text*\n*looks like it is in cells A3*\n*and B3 it really only is in*\n*cell A3 – since there is*\n*nothing in B3, Excel*\n*allows the spill over to be*\n*displayed giving the*\n*illusion it is in 2 cells…*\n\n*the*\n\n Type**Pool Covers**and \n Repeat the above steps \nand enter the remaining \ntext in column***A***as shown \n\n Click in cell***B2***to make \nthis the active cell, type \n**UK**and press \n**5**\n\n*When you press*\n*the*\n*cell to the right becomes*\n*the active cell…*\n\n Enter the remaining text in \nrow***2***as shown \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n**For Your Reference…**\n**For Your Reference…**\nTo***save a new document***: \nTo***enter text***: \n\n1. Click the cell pointer on the desired cell and \nand select**Save As**\n1. Click on the***File Tab***\n2. Locate the storage folder in the***Navigation***\n***pane***\n2. Press \n to \n3. Type a***File name***and click on**[Save]**\n\ntype the required information \n\n, an arrow key or \nconfirm the data entry and to move the cell \npointer to another cell \n\n**Handy to Know…**\n**Handy to Know…**\n \n You don’t have to use \n\nIn the exercise above we have named the \n to make \nworkbook***Garden Department Sales***and \nadjacent cells active. You can simply use the \nfiled it in***C:\\Course Files for Excel 2010***. \nmouse and click in the cells if you want or \nEach time you start Excel it will most likely \neven press the arrow keys to move up, \nassume you want to file your workbooks in a \ndown, left, or right. \nfolder called***Documents***which is associated \nwith the user name you use on the computer. \n\n or", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "To create and start a snapshot, complete the following steps: \n1. Open the FlashCopy window from the**Copy Services**→**FlashCopy**menu. \n\n2. Select the Volume that you want to create a snapshot of, and right-click it or click \n**Actions**→**Create Snapshot**, as shown in Figure 11-32. \n\n\n \n \n \n \n [html]13 - Kitters : *--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------UNANUNANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUSANUGUNANUSANUSFirst - stratum :\n
16 - K
1989Short - termItemFragmentGapadyGroupFlarcTime
#----
33 : 3600027 coord061.0531319.99First ARHS Allow
--------
\n\nFigure 11-32 Single-click snapshot creation and start \n\n3. You can select multiple volumes at a time, which creates as many snapshots \n\nautomatically. The system then automatically groups the FlashCopy mappings in a new \nconsistency group, as shown in Figure 11-33. \n\nFigure 11-33 Selection single-click snapshot creation and start \n\n4. For each selected source volume, the following actions occur: \n\n– A FlashCopy mapping is automatically created. It is named by default fcmapXX. \n\n– A target volume is created. By default the source name is appended with a_XX suffix. \n\n– A consistency group is created for each mapping, unless multiple volumes were \nselected. Consistency groups are named by default fccstgrpX. \n\nThe newly created consistency group is automatically started. \n\n**11.2.5 Single-click clone**\n\nThe*clone preset*creates a replica of the volume, which can be changed without affecting the \noriginal volume. After the copy completes, the mapping that was created by the preset is \nautomatically deleted. \n\nThe clone preset uses the following parameters: \n\n(cid:2) Background copy rate: 50 \n(cid:2) Incremental: No \n(cid:2) Delete after completion: Yes", + "page_start": 501, + "page_end": 501, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "Where can I find other Microsoft quick start guides?", + "target_page": 4, + "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Online resources**\n\nThese websites are also relevant as further information sources: \n\n(cid:2) DB2 11 for z/OS information \n\nhttp://www.ibm.com/software/db2zos/library.html \n\n(cid:2) IBM Content Manager OnDemand production information \n\nhttp://www.ibm.com/software/products/us/en/ondemand \n\n(cid:2) Content Manager OnDemand for i Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSB2EG/welcome \n\n(cid:2) Content Manager OnDemand for Multiplatform Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSEPCD/welcome", + "page_start": 433, + "page_end": 433, + "source_file": "sg246915.pdf" + }, + { + "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "1. To begin with navigate to or create the SWRLTab. If it doesn’t already exist use \nWindow>Tabs>SWRLTab to create and select it. If you don’t have the SWRLTab under the \nWindow>Tabs menu then use File>Check for plugins and select the SWRLTab plugin. Remember ifyou \ndo this you need to restart Protégé for the plugin to be available. \n\n2. The SWRLTab is divided into two main views and then some buttons on the bottom of the tab that \nrelate to DROOLS. The question of when and how to use DROOLS confuses many new users but there is \na simple answer: don’t use it!11 As you get more experience with SWRL you will start to understand how \nand when DROOLS is used but for beginners the answer is simple. Think of all those DROOLS buttons \nas things for power users only. You don’t need to use them at all. That is why we installed the Pellet \nreasoner in section 4.2. The Pellet reasoner supports SWRL and when you run the reasoner it will also \nautomatically run any SWRL rules you have. See the bibliography for a paper on DROOLS. \n\n3. Click on the New button at the bottom of the top view. The other buttons should be grayed out since \nthey only apply if you have at least one rule written. This will give you a new pop-up window to write \nyour rule. In the Name field at the top call the rule: HotDiscountRule. You can skip the comment but if \nyou want to add a comment it is a good habit to get into and you can write something like: Provide a \nspecial discount for customers who prefer hot pizzas. \n\n4. Now go to the bottom part of the rule window and start writing the rule. To start you want to bind a \nparameter to each instance of the Customer class12. To do this all you need to do is to write: \nCustomer(?c). Note that auto-complete should work in this window but sometimes it may not and you \nmay need to type the complete name. Also, you will see various hints or error messages in the Status field \nas you type which you can mostly ignore for now. E.g., as you type out Customer you will see messages \nlike: Invalid SWRL atom predicate ‘Cus’ until you complete the name of the Customer class. Those \nmessages can help you understand why your rule won’t parse as you develop more rules but for now you \nshould be able to ignore them. \n\n5. Now you want to bind a parameter to the number of Pizzas that each customer has ordered so far. To \ndo that you first add a ^ character. This stands for the logical*and*. I.e., the rule will fire for every set of \nbindings that satisfy*all*of the expressions in the antecedent. To test the number of Pizzas you use the \ndata property numberOfPizzasPurchased. So at this point your rule should look like: Customer(?c) ^ \nnumberOfPizzasPurchased(?c, ?np). \n\n6. Now we want to test the object property hasSpicinessPreference. The first parameter will also be \n?c. I.e., we are iterating through each instance of Customer, binding it to ?c and then testing the values \nof these properties. However, in this case rather than binding the spiciness preference to a parameter we \njust want to test if it is equal to the instance of Spiciness Hot. So we directly reference that instance in \nthe expression resulting in: ^ hasSpicinessPreference(?c, Hot). \n\n7. As the last part of the antecedent we want to test that the Customer has purchased more than 1 Pizza. \nWe can use the SWRL math built-in swrlb:greaterThan. Add ^ swrlb:greaterThan(?np, 1) That is the last \n\n11 For more on DROOLS see the paper: M. J. O'Connor (2012). A Pair of OWL 2 RL Reasoners in the bibliography. \n12 This isn’t actually required. You will get the same result without the Customer(?c) expression but it is a good \nexample of how one can use the names of classes to iterate over their instances with SWRL. \n\n73", + "page_start": 73, + "page_end": 73, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "(cid:2) Content Manager OnDemand for z/OS Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSQHWE/welcome \n\n(cid:2) Ricoh website for Infoprint product information \n\nhttp://rpp.ricoh-usa.com/ \n\n(cid:2) IBM System i Navigator and IBM Navigator for i information \n\nhttp://www.ibm.com/systems/i/software/navigator/ \n\n(cid:2) IBM Tivoli Storage Manager home page \n\nhttp://www.ibm.com/software/products/en/tivostormana \n\n(cid:2) z/OS information \n\nhttp://www.ibm.com/systems/z/os/zos/ \n\n(cid:2)*Creating PDF Indexing Parameters Using Floating Triggers*\n\nhttp://ibm.co/1FHsXDq \n\n(cid:2)*Understanding the ACIF Input Exit for DB2 Content Manager OnDemand*\n\nhttp://ibm.co/1UUcCT0", + "page_start": 434, + "page_end": 434, + "source_file": "sg246915.pdf" + }, + { + "text": "Rather than a standard bibliography, this section is divided into various categories based on resources that \nwill be valuable for future exploration of the technologies and methods described in this tutorial. \n\n14.1 W3C Documents \nOWL 2 Primer: https://www.w3.org/TR/owl2-primer/ \n\nOWL 2 Specification: https://www.w3.org/TR/owl2-overview/ \n\nSemantic Web Primer for Object-Oriented Software Developers: https://www.w3.org/TR/sw-oosd- \nprimer/ \n\nSPARQL Specification: https://www.w3.org/TR/sparql11-query/ \n\nSWRL Specification and Built-ins: https://www.w3.org/Submission/SWRL/ \n\n14.2 Web Sites, Tools, And Presentations. \nAgile Alliance: https://www.agilealliance.org/agile101/ \n\nCellfie: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nGartner Hype Cycle: https://www.gartner.com/en/research/methodologies/gartner-hype-cycle \n\nJena: Open Source Java Framework for Semantic Web and Linked Data Applications: \nhttps://jena.apache.org/ \n\nOpen World Assumption (OWA) presentation by Nick Drummond and Rob Shearer: \nhttp://www.cs.man.ac.uk/~drummond/presentations/OWA.pdf \n\nProtégé: https://protege.stanford.edu/ \n\nProtégé Best Practices. Summary page on my blog for all my articles on Protégé, OWL, SWRL, etc.: \nhttps://www.michaeldebellis.com/post/best-practices-for-new-protege-users \n\nSHACL Playground: https://shacl.org/playground/ \n\nSWRL Presentation by Martin O’Connor: \nhttps://protege.stanford.edu/conference/2009/slides/SWRL2009ProtegeConference.pdf \n\nWebProtégé: https://webprotege.stanford.edu/ \n\nWebVOWL: Web-based Visualization of Ontologies: http://vowl.visualdataweb.org/webvowl.html \n\n14.3 Papers \nBerners-Lee (2001). The Semantic Web: A new form of Web content that is meaningful to computers will \nunleash a revolution of new possibilities. With James Hendler and Ora Lassila. Scientific American, May \n17, 2001. https://tinyurl.com/BernersLeeSemanticWeb \n\nMacGregor, Robert (1991). \"Using a description classifier to enhance knowledge representation\". IEEE \nExpert. 6 (3): 41–46. doi:10.1109/64.87683 https://tinyurl.com/MacGregorLoom", + "page_start": 89, + "page_end": 89, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "3.5 Help Desk ............................................................................................................................... 48 \n\n3.5.1 How to contact the Portal’s Help Desk .......................................................................... 48 \n\n3.6 Metadata Quality Assurance (MQA) ..................................................................................... 50 \n\n3.6.1 The Global Dashboard View .......................................................................................... 50 \n\n3.6.2 The Catalogue details view ............................................................................................ 51 \n\n3.7 SPARQL Manager ................................................................................................................... 54 \n\n3.7.1 SPARQL Search .............................................................................................................. 54 \n\n3.7.2 SPARQL Assistant ........................................................................................................... 55 \n\n3.7.3 SPARQL Saving/Modifying a Query ............................................................................... 56 \n\n3.7.4 SPARQL Queries ............................................................................................................. 57 \n\n**List of Figures**\n\nFigure 1: EDP Home Page (upper part) ................................................................................................... 8 \n\nFigure 2: EDP Home Page (lower part) .................................................................................................... 9 \n\nFigure 3 – Dataset Resource Page with Link to Geo-Spatial Visualisation. ........................................... 38 \n\nFigure 4 – Selection of layers................................................................................................................. 39 \n\nFigure 5 – Feature Info tool. .................................................................................................................. 40 \n\nFigure 6 – Legend tool. .......................................................................................................................... 40 \n\nFigure 7 – Disclaimer and tutorial buttons. ........................................................................................... 41 \n\nFigure 8 – Error message dialog. ........................................................................................................... 42", + "page_start": 2, + "page_end": 2, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "For example, in the Dashboard pane, you can open help information that is related to the \ndashboard-provided information, as shown in Figure 5-19. \n\n\n \n \n \n \n [html]\n
+Comparison90 %.Q, 5exechß
4
#
lR
\n\nFigure 5-19 Example of Dashboard help content \n\nSelecting the Help Contents option redirects you to the Storwize V7000 IBM Knowledge \nCenter. However, it requires internet access from the workstation where the management \nGUI is started. \n\n**5.3 System View window**\n\nStarting with IBM Spectrum Virtualize release V7.4, the welcome window of the GUI changed \nfrom the well-known former Overview/system 3D pane to the new System pane. In V8.2, the \nsystem pane was changed again to the new System view pane, and the 3D view was \nremoved, as shown in Figure 5-20. \n\nFigure 5-20 Opening the Overview pane \n\nNext, we describe the structure of the pane and how to navigate to various system \ncomponents to manage them more efficiently and quickly. \n\n**5.3.1 Content-based organization**\n\nThe following sections describe several view options within the GUI in which you can filter (to \nminimize the amount of data that is shown on the window), sort, and reorganize the content of \nthe window.", + "page_start": 164, + "page_end": 164, + "source_file": "sg247938.pdf" + }, + { + "text": "http://www.facebook.com/IBMRedbooks \n\n(cid:2) Follow us on Twitter: \n\nhttp://www.twitter.com/ibmredbooks \n\n(cid:2) Look for us on LinkedIn: \n\nhttp://www.linkedin.com/groups?home=&gid=2130806 \n\n(cid:2) Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks \nweekly newsletter: \n\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm \n\n(cid:2) Stay current on recent Redbooks publications with RSS Feeds: \n\nhttp://www.redbooks.ibm.com/rss.html", + "page_start": 20, + "page_end": 20, + "source_file": "sg246915.pdf" + }, + { + "text": "**Other resources**\n\nThe following publications are also relevant as further information sources: \n\n(cid:2) IBM System Storage Master Console: Installation and User’s Guide, GC30-4090 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: CIM Agent \nDevelopers Reference, SC26-7545 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Command-Line \nInterface User’s Guide, SC26-7544 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Configuration Guide, \nSC26-7543 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Host Attachment \nGuide, SC26-7563 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Installation Guide, \nSC26-7541 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Planning Guide, \nGA22-1052 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Service Guide, \nSC26-7542 \n\n(cid:2) IBM System Storage SAN Volume Controller - Software Installation and Configuration \nGuide, SC23-6628 \n\n(cid:2) IBM System Storage SAN Volume Controller V6.2.0 - Software Installation and \nConfiguration Guide, GC27-2286 \n\n(cid:2) IBM System Storage SAN Volume Controller 6.2.0 Configuration Limits and Restrictions, \nS1003799 \n\n(cid:2) IBM TotalStorage Multipath Subsystem Device Driver User’s Guide, SC30-4096 \n\n(cid:2) IBM XIV and SVC Best Practices Implementation Guide \n\nhttp://ibm.co/1bk64gW \n\n(cid:2) Considerations and Comparisons between IBM SDD for Linux and DM-MPIO \n\nhttp://ibm.co/1CD1gxG \n\n**Referenced websites**\n\nThese websites are also relevant as further information sources: \n\n(cid:2) IBM Storage home page \n\nhttp://www.ibm.com/systems/storage \n\n(cid:2) SAN Volume Controller supported platform \n\nhttp://ibm.co/1FNjddm \n\n(cid:2) SAN Volume Controller IBM Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/STPVGU/welcome \n\n(cid:2) Cygwin Linux-like environment for Windows \n\nhttp://www.cygwin.com", + "page_start": 811, + "page_end": 811, + "source_file": "sg247938.pdf" + }, + { + "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How to connect to my Microsoft account from Word?", + "target_page": 2, + "target_passage": " Click File > Account to sign in with your Microsoft account", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. \n\nFind recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. \n\n\n\n\n\nAccess files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. \n\n\n\n\n\nNext steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you!", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now.", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. \n\n\n\nWord works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025.", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "f. On the toolbar, click the fourth icon from the right to place the report window back into \nadd mode. \n\n9. Define a field and an index: \n\na. Find a text string that can be used to identify the location of the field. The text string \nneeds to contain a sample index value. For example, if you want to extract account \nnumber values from the input file, find where the account number is printed on the \npage. \n\nb. By using the mouse, draw a box around the text string. Start just outside of the \n\nupper-left corner of the string. Click and then drag the mouse toward the lower-right \ncorner of the string. As you drag the mouse, the graphical indexer uses a dotted line to \ndraw a box. After you enclose the text string inside of a box, release the mouse. The \ngraphical indexer highlights the text string inside the box. \n\n**Important:**Use the same principles for collecting fields as collecting the trigger text \nstring in step 8b on page 170. If the fields that must be collected are close together, \noverlap them with adjacent fields to ensure that the box is as large as possible and \nto ensure that the data is collected at load time. \n\nc. Click the Define a Field icon on the toolbar. \n\nd. In the Add a Field window, complete the following steps: \n\ni. On the Field Information tab, verify the attributes of the Index field. For example, the \ntext string that you selected in the report window is displayed under Reference \nString and the trigger identifies the trigger on which the field is based. Click**Help**for \nassistance with the options and values that you can specify. \n\nii. On the Database Field Attributes tab, verify the attributes of the database field. In \nthe Database Field Name field, enter the name of the application group field into \nwhich you want Content Manager OnDemand to store the index value. In the Folder \nField Name field, enter the name of the folder field to display in the client search \nwindow. Click**Help**for assistance with the other options and values that you can \nspecify. \n\niii. Click**OK**to define the field and index. \n\ne. To verify the locations of the fields, complete the following steps: \n\ni. Place the report window into display mode. Blue boxes are drawn around the fields. \n\nii. Click the**Select**tool. \n\niii. In the Select window, under Fields, double-click**Field 1**. The graphical indexer \n\nhighlights the text string in the current document. Double-click**Field 1**again. The \ngraphical indexer moves to the next document and highlights the text string. \n\niv. Use the Select window to move forward to each document and display the field. \nThen, return to the first document in the input file. \n\nf. Place the report window back into add mode. \n\n10.Click**Create Indexer Parameters and Fields Report**to create the indexer parameter \n\nreport that the PDF Indexer uses to process the input files that you load into the \napplication. At a minimum, you must have one trigger, one field, and one index. For more \ninformation about the indexing parameters, see*IBM Content Manager OnDemand -*\n*Indexing Reference*, SC19-3354. \n\n11.After you define all of the triggers, fields, and indexes, press Esc to close the report \nwindow.", + "page_start": 195, + "page_end": 195, + "source_file": "sg246915.pdf" + }, + { + "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. \n\n**Set up**\n\n**Explore**\nOnce you sign in,**connect**with your team in \nchat, channels, calls, and meetings. \n\n**Download**the app for desktop and mobile to \naccess Teams with the best performance \nanywhere you go. \n\n**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Meeting essentials**\n**Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know: \n\n**Create meetings**\n\n1. \n\nSelect**+ New meeting**or double-click on a time in your \ncalendar to create a new meeting. \n**1** **2** **3** **4** **5** **6**\n\n2. Add people, a location and any notes. \n\n3. Send your invite. \n\n**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . \n\n**Reactions**\nStay involved without breaking the flow—you can share an emoji reaction to let the \npresenter know how you feel. Reactions also allow you to raise your hand, which \nwill signal that you'd like an opportunity to speak. \n\n**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Note:**Make sure that your PC or notebook has a network route to the system IP \naddress that you specified. In particular, you can access the management GUI from \nany management console that is connected to the same subnet as the system. Enter \nthe system IP address on a supported browser to access the management GUI. \n\n**4.3 System setup**\n\nThis section provides instructions about how to define the basic settings of the system with \nthe system setup wizard, and how to add nodes and optional expansion enclosures. \n\n**4.3.1 System setup wizard**\n\nWhether you are redirected from your PC or notebook after completing system initialization or \nyou browse to the management IP address manually, you must complete the system setup \nwizard to define the basic settings of the system. \n\n**Note:**The first time that you connect to the management GUI, you are prompted to accept \nuntrusted certificates because the system certificates are self-signed. \n\nYou can install certificates that are signed by a trusted certificate authority after you \ncomplete system setup. For more information about how to perform this task, see 4.5, \n“Configuring secure communications” on page 117.", + "page_start": 113, + "page_end": 113, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "What are the products of Hormel Foods Corporation?", + "target_page": 4, + "target_passage": "meat and other food product", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). \n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: \n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
3.2 ( 1 )Bylaws as amended to dates ( Incorporated by relevence to Enhibit 3.2 to Hormels Amerisment No. 3 to Pegistration Statement on Form 5 – 4 datest November 39.2001 ; Fle No. 301 - 88496 )
4.1 ( 1 )Inderture dated as of June 1.2011, between Hormel and U. S. Barrier Trust National Association, as Trustine relating to ortain outstanding ded securities, Incorporated by reference to Ecrible 4.1 to Hormel ’ s Registration Statement on
4.2 ( 1 )Supplemental Inderture No. 1 dated as of Juve 4.2011, to Inderture dated as of June 1.2010, between Hormel and U. S. Bark Trust National Association, as Trustee, relating to ontain outstanding det securities, Incorporated by referencel
4.3 ( 1 )Lefter of Representations detect June S, 2001, among Hormei, 6.5. Bork Trust National Association, as Trustee, and The Depository Trust Company relating to certain sustainsding dedet securities of Hormel, ( incorporated by reference
4.4 ( 1 )Pursuant to Item 601 ( 6 )/ 6 )/ 6 ) of Regulation S - A, opplex of instruments defining the rights of holders of certain long - term detail are not filed. Hormel sgrees to furnish copies therest to the Securities and Exchange Commission upon req
10.1 ( 1 )U. 5550.000.000 Crystilli Agreement, dated as of Crototixer 20.2003, between Hormer, the terries identified on the signature pages therest, and Clicocy LSA. Inc., as Administrative Agent, ( Incorporated by Reference to Eshbit 10.1 to
10.2 ( 1 )( 3 )Home Foods Corporation Dpensitors ’ Shares Incentive Compensation Plan. ( Incorporated by Reference to Appendis A to Home ’ s definitive Proxy Statement Ned on Decombw 30.1987, File No. 301 - 02432.)
10.3 ( 1 )( 3 )Home Foods Corporation Supplemental Executive Retirement Plan ( 2002 Restatement.) ( Incorporated by Reference to Exhibit 10.3 to Hormel ’ s Annusi Report on Form 10 - 4 for the fiscal year ended October 26.2002, fle No. 001 - 02402 )
10.4 ( 1 )( 3 )Homel Foods Corporation 2000 Stock Inoentive Plan, ( Incorporated by Pellevence to Evhblt A to Homel ’ s definitive Provy Statement filed on December 30.1998, Fie No. 01 - 02432.)
", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "/s/ JOEL W. JOHNSON \n\nJOEL W. JOHNSON \n\n/s/ MICHAEL J. \n\nMICHAEL J. McCOY \n\n/s/ GARY J. RAY*\n\nGARY J. RAY \n\n/s/ ERIC A. BROWN*\n\nERIC A. BROWN \n\n/s/ JOHN W. ALLEN*\n\nJOHN W. ALLEN \n\n/s/ JOHN R. BLOCK*\n\nJOHN R. BLOCK \n\n/s/ WILLIAM S. DAVILA*\n\nWILLIAM S. DAVILA \n\n/s/ E. PETER GILLETTE JR.*\n\nE. PETER GILLETTE JR. \n\n/s/ LUELLA G. GOLDBERG*\n\nLUELLA G. GOLDBERG \n\n/s/ SUSAN I. MARVIN*\n\nSUSAN I. MARVIN \n\nJOHN L. MORRISON \n\n/s/ DAKOTA A. PIPPINS*\n\nDAKOTA A. PIPPINS \n\n/s/ JOHN G. TURNER*\n\nJOHN G. TURNER \n\n/s/ DR. ROBERT R. WALLER*\n\nDR. ROBERT R. WALLER \n\n\n \n \n \n \n [html]\n
1 / 23 / 04Chairman of the Board, President, Chief Executive Officer and Director ( Principal Executive Officer )
1 / 23 / 04Executive Vice President, Chief Financial Officer And Director ( Principal Financial and Accounting Officer )
1 / 23 / 04Executive Vice President Refrigerated Foods And Director
1 / 23 / 04Group Vice President Prepared Foods And Director
1 / 23 / 04Director
1 / 23 / 04Director
1 / 23 / 04Director
1 / 23 / 04Director
1 / 23 / 04Director
1 / 23 / 04Director
Director1 / 23 / 04
Director
1 / 23 / 04Director
1 / 23 / 04Director
1 / 23 / 04
\n\n**ITEM 15 (a) (1), (2), AND (3) AND ITEM 15 (c) AND (d)**\n\n**LIST OF FINANCIAL STATEMENTS**\n\n**FINANCIAL STATEMENT SCHEDULE**\n\n**LIST OF EXHIBITS**", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "/ 30 / 00 to 10 / 29 / 0112 / 01 / 95 to 10 / 30 / 002000Dennis B. GoettschsoVice President Foodservice Marketing Director Foodservice Marketing10 / 301 / 90 to 10 / 29 / 00≥ 000Daniel A. Hartzog52Vice President Meat Products Business Director of Meat Products Business DevelopmentMeat Products Regional Sales Mana10 / 30 / 00 to Present07 / 03 / 00 to 10 / 29 / 0009 / 19 / 88 to 07 / 02 / 00≥ 000", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(b) \n\n*Internal Controls.*No change in the Company's internal control over financial reporting identified in connection with such evaluation during the \nfiscal year ended October 25, 2003, has materially affected, or is reasonably likely to materially affect, the Company's internal control over \nfinancial reporting. \n\n**PART III**\n\n**Item 10.*DIRECTORS AND EXECUTIVE OFFICERS OF THE REGISTRANT***\n\nInformation under \"Election of Directors,\" contained on pages 3 and 4 and under \"Committees of the Board of Directors and Meetings,\" on page 5, and \nthe second sentence of the second paragraph under \"Audit Committee Report and Ratification of Appointment of Auditors,\" contained on page 6 of the \ndefinitive proxy statement for the Annual Meeting of Stockholders to be held January 27, 2004, is incorporated herein by reference. \n\nInformation concerning Executive Officers is set forth in Item 1(d) of Part I pursuant to Instruction 3, Paragraph (b) of Item 401 of Regulation S-K. \n\nInformation under \"Section 16(a) Beneficial Ownership Reporting Compliance,\" on page 17 of the definitive proxy statement for the Annual Meeting of \nStockholders to be held January 27, 2004, is incorporated herein by reference. \n\nThe Company has adopted a Code of Ethical Business Conduct in compliance with applicable rules of the Securities and Exchange Commission that \napplies to its principal executive officer, its principal financial officer and its principal accounting officer or controller, or persons performing similar \nfunctions. A copy of the Code of Ethical Business Conduct is available on the Company's website at, www.hormel.com, free of charge, under the caption, \n\"Corporate.\"", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Where are Hormel Foods Corporation plants located? ", + "target_page": 5, + "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**ITEM 2. PROPERTIES**\n\nOur corporate headquarters is located in Ft. Lauderdale, Florida in leased premises. As of December 31, \n2004, we operated approximately 6,100 collection vehicles. Certain of our property and equipment are subject \nto operating leases or liens securing payment of portions of our indebtedness. We also lease certain of our \noÇces and equipment. We believe that our facilities are suÇcient for our current needs.", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). \n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: \n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
3.2 ( 1 )Bylaws as amended to dates ( Incorporated by relevence to Enhibit 3.2 to Hormels Amerisment No. 3 to Pegistration Statement on Form 5 – 4 datest November 39.2001 ; Fle No. 301 - 88496 )
4.1 ( 1 )Inderture dated as of June 1.2011, between Hormel and U. S. Barrier Trust National Association, as Trustine relating to ortain outstanding ded securities, Incorporated by reference to Ecrible 4.1 to Hormel ’ s Registration Statement on
4.2 ( 1 )Supplemental Inderture No. 1 dated as of Juve 4.2011, to Inderture dated as of June 1.2010, between Hormel and U. S. Bark Trust National Association, as Trustee, relating to ontain outstanding det securities, Incorporated by referencel
4.3 ( 1 )Lefter of Representations detect June S, 2001, among Hormei, 6.5. Bork Trust National Association, as Trustee, and The Depository Trust Company relating to certain sustainsding dedet securities of Hormel, ( incorporated by reference
4.4 ( 1 )Pursuant to Item 601 ( 6 )/ 6 )/ 6 ) of Regulation S - A, opplex of instruments defining the rights of holders of certain long - term detail are not filed. Hormel sgrees to furnish copies therest to the Securities and Exchange Commission upon req
10.1 ( 1 )U. 5550.000.000 Crystilli Agreement, dated as of Crototixer 20.2003, between Hormer, the terries identified on the signature pages therest, and Clicocy LSA. Inc., as Administrative Agent, ( Incorporated by Reference to Eshbit 10.1 to
10.2 ( 1 )( 3 )Home Foods Corporation Dpensitors ’ Shares Incentive Compensation Plan. ( Incorporated by Reference to Appendis A to Home ’ s definitive Proxy Statement Ned on Decombw 30.1987, File No. 301 - 02432.)
10.3 ( 1 )( 3 )Home Foods Corporation Supplemental Executive Retirement Plan ( 2002 Restatement.) ( Incorporated by Reference to Exhibit 10.3 to Hormel ’ s Annusi Report on Form 10 - 4 for the fiscal year ended October 26.2002, fle No. 001 - 02402 )
10.4 ( 1 )( 3 )Homel Foods Corporation 2000 Stock Inoentive Plan, ( Incorporated by Pellevence to Evhblt A to Homel ’ s definitive Provy Statement filed on December 30.1998, Fie No. 01 - 02432.)
", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "[html]excLocationRegionTotal Acreage ( 2 )Permitted Acreage ( 3 )Unsed Pcresitted Acreage ( 4 )fillWinter Garden, FloridaSouthern80583IfillRichmond, VirginiaEastern8413884Clark County, NevadaWestern2.2851.2331.018nMontrose, MichiganCentral- 440643St LandfillJesup, GeorgiaSouthern1.40010549FarmsDetroit, MichiganCentral640388192PailBartow, FloridaSouthern3926868N35teAbilene, TexasSouthwestern39600264CanyonValencia, CaliforniaWestern59225745MeEast Sparta, OhioEastern815258170ndfillMorganfield, KentuckyCentral2314723Dona LandfillAulander, North CarolinaSouthern4011342..........................Onaway, MichiganCentral994025LandfillWilliamstown, KentuckyCentral89910031Landfill ( 1 )Lenior, North CarolinaSouthern2587850nThree O3ks, MichiganCentral2811659AgeDenver, ColoradoSouthwestern602195133nGreenville, South CarolinaSouthern21↑478Oconee, GeorgiSouthern379118108IR venPerry Hall, MarylandEastern68395EasyloRacine, WisconsinCentral21813820( 1 )Laughlin, NewadaWestern4040-RidgeDelavan, WisconsinCentral746422SpecificationYork, PennsylvaniaEastern73923022Serv - AllFort Wayne, IndianaCentral587204—ε RoadSt. Augustine, FloridaSouthern3545725SubstanceHouston, TexasSouthwestern100312TennesseeUnion City, TennesseeCentral60012072AgeWinder, GeorgiaSouthern32972—Control ( 1 )Beaver Dam, KentuckyCentral908178121INorth Charleston, South CarolinaSouthern3726—veAmanda, OhioEastern73411265AgeGriffin, GeorgiaSouthern515196130...Swissan, CaliforniaWestern1.423190681 )Presidio, TexasSouthwestern1010. 6Alpine ( 1 )Alpine, TexasSouthwestern807467/ CSCAvalon,", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "*Transfer and Disposal Services.*We own or operate 96 transfer stations. We deposit waste at these \nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport \nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had \napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of \napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based \non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. \nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated \nsoils. See \"\"Ì Properties.'' \n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently \npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and \nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, \nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, \nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be \nmade that all future expansions will be permitted as designed. \n\n*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. \n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to \nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our \ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to \nlarge \"\"Fortune 500'' companies and municipalities. \n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts \nprogram in response to our customers' needs. \n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not \noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the \nacquired companies' local tradenames as used in each geographic market in which we operate. \n\n**Customers**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Does Hormel Food Corporation have any material legal proceedings pending?", + "target_page": 8, + "target_passage": "The Company knows of no pending material legal proceedings.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**\n\n**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: \n\nIndicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 \nduring the preceding 12 months, and (2) has been subject to such filing requirements for the past 90 days. Yes ý No o \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the \nbest of registrant's knowledge in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendments to \nthis Form 10-K. o \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Rule 12b-2 of the Act). Yes ý No o \n\nThe aggregate market value of the voting stock held by non-affiliates of the registrant as of April 26, 2003 (the last business day of the registrant's most \nrecently completed second fiscal quarter), was $1,592,020,962 based on the closing price of $21.74 per share on that date. \n\nAs of December 1, 2003, the number of shares outstanding of each of the Corporation's classes of common stock was as follows: \n\nCommon Stock, $.0586 Par Value—138,672,803 shares \n\nCommon Stock Non-Voting, $.01 Par Value—0 shares \n\n**DOCUMENTS INCORPORATED BY REFERENCE**\n\nPortions of the Annual Stockholders' Report for the year ended October 25, 2003, are incorporated by reference into Part I and Part II Items 5-8, and \nincluded as exhibit 13.1 filed herewith.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**\n\n**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. \n\n**Note (1)**—Uncollectible accounts written off. \n\n**Note (2)**—Recoveries on accounts previously written off. \n\n**Note (3)**—Increase in the reserve due to the inclusion of The Turkey Store Company accounts receivable. \n\n**Note (4)**—Increase in the reserve due to the inclusion of Diamond Crystal Brands accounts receivable. \n\n**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "No new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. \n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(b) \n\n*Internal Controls.*No change in the Company's internal control over financial reporting identified in connection with such evaluation during the \nfiscal year ended October 25, 2003, has materially affected, or is reasonably likely to materially affect, the Company's internal control over \nfinancial reporting. \n\n**PART III**\n\n**Item 10.*DIRECTORS AND EXECUTIVE OFFICERS OF THE REGISTRANT***\n\nInformation under \"Election of Directors,\" contained on pages 3 and 4 and under \"Committees of the Board of Directors and Meetings,\" on page 5, and \nthe second sentence of the second paragraph under \"Audit Committee Report and Ratification of Appointment of Auditors,\" contained on page 6 of the \ndefinitive proxy statement for the Annual Meeting of Stockholders to be held January 27, 2004, is incorporated herein by reference. \n\nInformation concerning Executive Officers is set forth in Item 1(d) of Part I pursuant to Instruction 3, Paragraph (b) of Item 401 of Regulation S-K. \n\nInformation under \"Section 16(a) Beneficial Ownership Reporting Compliance,\" on page 17 of the definitive proxy statement for the Annual Meeting of \nStockholders to be held January 27, 2004, is incorporated herein by reference. \n\nThe Company has adopted a Code of Ethical Business Conduct in compliance with applicable rules of the Securities and Exchange Commission that \napplies to its principal executive officer, its principal financial officer and its principal accounting officer or controller, or persons performing similar \nfunctions. A copy of the Code of Ethical Business Conduct is available on the Company's website at, www.hormel.com, free of charge, under the caption, \n\"Corporate.\"", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. \n\n**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. \n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. \n\n**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Investigations and Other Matters \n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such \nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange \nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The \nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, \nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel, \nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other \ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. \nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement \naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, \nfinancial position or brand. \n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business \n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain \nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications \nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain \nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court \nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by \nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an \nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the \npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand. \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "**ITEM 3. LEGAL PROCEEDINGS**\n\nWe are and will continue to be involved in various administrative and legal proceedings in the ordinary \ncourse of business. We can give you no assurance regarding the outcome of these proceedings or the eÅect \ntheir outcomes may have, or that our insurance coverages or reserves are adequate. A signiÑcant judgment \nagainst our company, the loss of signiÑcant permits or licenses, or the imposition of a signiÑcant Ñne could \nhave a material adverse eÅect on our Ñnancial position, results of operations, cash Öows or prospects. \n\n\n \n \n \n \n [html]\n
No matters were submitted to ourTableTableTableTableTableTableTableTableTableTableTable19
", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What is Mexican Farm Subsidies ?", + "target_page": 9, + "target_passage": "an online tool to analyze how the federal government allocates those subsidies", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**Higher Handset Subsidies**\nis based substantially on subsidizing the \nOur wireless business model \ncost of subscriber handsets, similar to other North American wireless \ncarriers. This attracts customers and in exchange they commit to a term \nwith us. We also commit to a minimum subsidy with the supplier of \ncertain smartphone devices. \n\nBUSINESS RISKS \n\n**Revenue Expectations from New and Advanced Services**\nWe expect that a substantial portion of our future revenue growth may \ncome from new and advanced services, and we continue to invest \nsignificant capital resources to develop our networks so we can offer \nthese services. It is possible, however, that there may not be sufficient \nconsumer demand, or that we may not anticipate or satisfy demand for \ncertain products and services, or be able to offer or market these new \nproducts and services successfully to subscribers. If we do not attract \nsubscribers to new products and services profitably or keep pace with \nchanging consumer preferences, we could experience slower revenue \ngrowth and increased churn. This could have a materially adverse effect \non our business, results of operations and financial condition. \n\n**National Wireless Tower Policy**\nThe policy affects all parties that plan to install or modify an antenna \nsystem, including PCS, cellular and broadcasting service providers. The \npolicy requires, among other things, that antenna proponents consider \nusing existing antenna structures before proposing new structures and \nthose owners of existing systems respond to requests to share antenna \nsystems. Antenna proponents must \nfollow a defined process for \nnotifying the public and addressing local requirements and concerns. \n\n**Acquisitions, Divestitures or Investments**\nAcquiring complementary businesses and technologies, developing \nstrategic alliances and divesting portions of our business are often \nrequired to optimally execute our business strategy. \nCertain types of antenna installations, however, are excluded from the \nconsultation requirements with local authorities and the public. \n\n**Radio Frequency Emissions**\nFrom time to time the media and other reports have highlighted alleged \nlinks between radio frequency emissions from wireless handsets and \nvarious health concerns, including cancer, and interference with various \nmedical devices, \nincluding hearing aids and pacemakers. This may \ndiscourage the use of wireless handsets or expose us to potential \nlitigation even though there are no definitive reports or studies stating \nthat these health issues are directly attributable to radio frequency \nemissions. \n\nServices, technologies, key personnel or businesses of companies we \nacquire may not be effectively assimilated into our business or service \nofferings, or our alliances may not be successful. We also may not be \nable to successfully complete any divestitures on satisfactory terms, if at \nall. Divestitures may reduce our total revenues and net income by more \nthan offset by the sales price. \n\n**Inventory Obsolescence**\nOur inventory balance mainly consists of wireless handset devices, \nwhich generally have relatively short product life cycles due to frequent \nwireless handset \nIf we cannot effectively manage \ninventory levels based on product demand, this may increase the risk of \ninventory obsolescence. \n\nintroductions. \n\nThe Supreme Court of Canada ruled in 2003, however, that the CRTC \ndoes not have the jurisdiction to establish the terms and conditions of \naccessing the poles of hydroelectric companies. As a result, we obtained \naccess under orders from the Ontario Energy Board and the New \nBrunswick Public Utilities Board.", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Right now, one of the most active Asian countries in the Open Data arena is India, which also \n\nsigned an Open Government partnership with the USA in November 2010. In January 2011 the \n\nIndian Congress Party announced plans for a new law to fight corruption among public servants and \n\npoliticians. Anti-corruption websites (including ones in local dialects) like \n\nIndiaagainstcorruption.org, already existed, including one, Ipaidabribe.com, that collected more \n\nthan 3,000 people reports of graft in its first four months. \n\nAs it happens in Asia, even Latin America is currently focused, at least outside Public \n\nAdministration circles, on how to open public data to achieve actual transparency. This appears \n\neven from the way many projects are labeled, that is \"Civic Information\" instead of Open Data \n\n(which is an idea starting from data*reuse*) or Open Government. \n\nThe reason is that even where good Freedom of Information laws exist in Latin America, they still \n\nhave too little practical effects. Mexico, for example, already has a digital system to manage \n\nFreedom of Information requests, but there are reports of complaints filed against municipal \n\nofficials that either have no effect at all, or aren't possible in the first place, because relevant \n\ninformation has not been updated in years, or omits key data like (in the case of budget reports) \n\n*\"descriptions of how the money was spent\"*. \n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active \n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin \n\nAmerica include (from Sasaki's Access to Information: Is Mexico a Model for the Rest of the \n\nWorld?: \n\n• Mexico \n\n• Mexican Farm Subsidies - an online tool to analyze how the federal government \n\nallocates those subsidies \n\n• Compare Your School : compares aggregate test results from any school with the \n\nmunicipal, regional, and national averages \n\n• Rebellion of the Sick built for patients with chronic diseases whose expenses are not \n\ncovered by the government subsidized health coverage. \n\n• Argentina: Public Spending in Bahía analyzes how public funds are used. \n\n• Colombia: Visible Congress monitors the actions of the Colombian congress \n\n• Brazil \n\n• Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010 \n\n*9/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", + "page_start": 8, + "page_end": 8, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "develop an Integrated Nutrient Management Action Plan in 2022. The Farm to Fork \nstrategy will address the reduction in the use and risk of pesticides and support wider \nimplementation of Integrated Pest Management54. As part of this,**the environmental**\n**risk assessment of pesticides will be strengthened**. The pressure from plastics is \nnotably addressed through the implementation of the European Strategy for Plastics55 and \nthe new Circular Economy Action Plan56. \n\nThe Commission will develop a**set of indicators for the progressive reduction of**\n**pollution**, and will establish baselines to help monitor progress. Pressures from marine \nlitter and underwater noise are being addressed under the Marine Strategy Framework \nDirective. \n\n*2.2.10. Addressing invasive alien species*\n\nInvasive alien species can significantly undermine efforts to protect and restore nature. \nBesides inflicting major damage to nature and the economy, many invasive alien species \nalso facilitate the outbreak and spread of infectious diseases, posing a threat to humans \nand wildlife57. The rate of release of invasive alien species has increased in recent years. \nOf the 1,872 species now considered threatened in Europe, 354 are under threat from \ninvasive alien species. Without effective control measures, the rate of invasion and the \nrisks it brings to our nature and health will continue to rise. \n\nThe implementation of the**EU Invasive Alien Species Regulation**58 and other relevant \nlegislation and international agreements must also be stepped up**.**This should aim to \nminimise, and where possible eliminate, the introduction and establishment of alien \nspecies in the EU environment. The aim will be to manage established invasive alien \nspecies and**decrease the number of Red List species they threaten by 50%**59. \n\n**EU Nature Restoration Plan: key commitments by 2030**\n\n1. Legally binding EU nature restoration targets to be proposed in 2021, subject to an \nimpact assessment. By 2030, significant areas of degraded and carbon-rich \necosystems are restored; habitats and species show no deterioration in conservation \ntrends and status; and at least 30% reach favourable conservation status or at least \nshow a positive trend. \n\n2. The decline in pollinators is reversed. \n3. The risk and use of chemical pesticides is reduced by 50% and the use of more \n\nhazardous pesticides is reduced by 50%. \n\n4. At least 10% of agricultural area is under high-diversity landscape features. \n5. At least 25% of agricultural land is under organic farming management, and the \n\nuptake of agro-ecological practices is significantly increased. \n\n6. Three billion new trees are planted in the EU, in full respect of ecological principles. \n7. Significant progress has been made in the remediation of contaminated soil sites. \n8. At least 25,000 km of free-flowing rivers are restored. \n\n54 Sustainable Use of Pesticides Directive (2009/128/EC). \n55 European Strategy for Plastics in a Circular Economy (COM(2018) 28). \n56 A new Circular Economy Action Plan for a cleaner and more competitive Europe (COM(2020) 98). \n57 See for example: Hulme P. (2014). Invasive species challenge the global response to emerging diseases, \n*Trends in parasitology (2014) Vol. 30, Issue 6*; Duscher et al. (2017). \n\n58 Regulation (EU) 1143/2014 on invasive alien species. \n59 Red List of the International Union for the Conservation of Nature (IUCN). \n\n14", + "page_start": 14, + "page_end": 14, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term \nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the \nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly \nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer \nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of \nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply \ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long- \nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot \nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent \nof its hogs under long-term supply contracts. \n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey \nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout \nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs. \n\n**Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of \nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement. \n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge, \nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle, \nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai, \nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers: \nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St. \nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power \n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa. \n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, \nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota. \n\n**Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued \npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, \nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or \nlicensed trademarks used in the Company's segments are:", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "progress towards the target will be under constant review, and adjustment if needed, to \nfarmers’ \nmitigate against undue \ncompetitiveness. \n\nimpact on biodiversity, food security and \n\nAgroecology can provide healthy food while maintaining productivity, increase soil \nfertility and biodiversity, and reduce the footprint of food production. Organic farming in \nparticular holds great potential for farmers and consumers alike. The sector creates jobs \nand attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare \nthan conventional farms, and creates added value for agricultural products32. To make the \nmost of this potential, at least**25% of the EU’s agricultural land must be organically**\n**farmed by 2030**. In addition to CAP measures, the Commission will put forward an \nAction Plan on organic farming, helping Member States stimulate both supply and \ndemand of organic products. It will also ensure consumer’s trust through promotion \ncampaigns and green public procurement. In the implementation of the EU-wide agro- \necological targets set out in this strategy and in the Farm to Fork Strategy, the different \nstarting points and differences in progress already made in Member States will be taken \ninto account. \n\nThe uptake of agroforestry support measures under rural development should be \nincreased as it has great potential to provide multiple benefits for biodiversity, people and \nclimate. \n\nThe decline of**genetic diversity**must also be reversed, including by facilitating the use \nof traditional varieties of crops and breeds. This would also bring health benefits through \nmore varied and nutritious diets. The Commission is considering the revision of \nmarketing rules for traditional crop varieties in order to contribute to their conservation \nand sustainable use. The Commission will also take measures to facilitate the registration \nof seed varieties, including for organic farming, and to ensure easier market access for \ntraditional and locally adapted varieties. \n\n*2.2.3. Addressing land take and restoring soil ecosystems*\n\nSoil is one of the most complex of all ecosystems. It is a habitat in its own right, and \nhome to an incredible diversity of organisms that regulate and control key ecosystem \nservices such as soil fertility, nutrient cycling and climate regulation.**Soil is a hugely**\n**important non-renewable resource**, vital for human and economic health, as well as the \nproduction of food and new medications. \n\nIn the EU, the degradation of soil is having considerable environmental and economic \nconsequences. Poor land management, such as deforestation, overgrazing, unsustainable \nfarming and forestry practices, construction activities and land sealing are among the \nmain causes of this situation33. Despite recent reductions in the pace of soil sealing, \nfertile soils continue to be lost to land take and urban sprawl34. When compounded by \n\n32 OECD (2016), Farm Management Practices to Foster Green Growth. \n33 European Environment Agency (2019), EEA Signals 2019: Land and Soil in Europe. \n34 European Environment Agency and Swiss Federal Office for the Environment (FOEN) (2016), Urban \nsprawl in Europe. \n\n8", + "page_start": 8, + "page_end": 8, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. \n\nIn response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. \n\n**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "Nissan Canada, Inc. Mississauga, Ontario \n\n\n \n \n \n \n [html]\n
MexicoNissan Mexicana, S. A. de C. V.Mexico D. F.Manufacture and sales of automobiles and partsP17.056
100.00
\n\nE \nT \nA \nR \nO \nP \nR \nO \nC", + "page_start": 107, + "page_end": 107, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "currently in favourable status are in that category or show a strong positive trend. \nThe Commission and the European Environmental Agency will provide guidance \nto Member States in 2020 on how to select and prioritise species and habitats. \n\n*2.2.2. Bringing nature back to agricultural land*\n\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are \namong the first to feel the consequences when biodiversity is lost but also among the first \nto reap the benefits when it is restored. Biodiversity enables them to provide us with**safe,**\n**sustainable, nutritious and affordable food**and provides them with the income they \nneed to thrive and develop. European farmers are an essential part of the EU’s future and \nmust continue to be the social and economic hub of many communities across our Union. \n\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. \nThis is why it is important to work with farmers to**support and incentivise the**\n**transition to fully sustainable practices**. Improving the condition and diversity of \nagroecosystems will increase the sector’s resilience to climate change, environmental \nrisks and socioeconomic shocks, while creating new jobs, for example in organic \nfarming, rural tourism or recreation. \n\nTo support the long-term sustainability of both nature and farming, this strategy will \nwork in tandem with the new**Farm to Fork Strategy**and the**new Common**\n**Agricultural Policy (CAP)**, including by promoting eco-schemes and result-based \npayment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the \nCommission will closely monitor progress and improvements in terms of food security \nand farmers income. The Commission will ensure that the CAP Strategic plans are \nassessed against robust climate and environmental criteria, and that Member States set \nexplicit national values for the relevant targets set in this strategy, as well as in the Farm \nto Fork Strategy. These plans should lead to sustainable practices such as precision \nagriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent \ngrassland, and stricter animal welfare standards. \n\nFarmland birds and insects, particularly pollinators, are key indicators of the health of \nagroecosystems and are vital for agricultural production and food security. Their \nalarming decline must be reversed. As set out in the Farm to Fork Strategy, the \nCommission will take action to reduce by**50% the overall use of – and risk from –**\n**chemical pesticides by 2030**and reduce by 50% the use of more hazardous pesticides \nby 2030. This must be supported by the full implementation of the EU Pollinators \ninitiative31. By the end of 2020, the Commission will review the initiative and propose \nadditional measures if necessary. To provide space for wild animals, plants, pollinators \nand natural pest regulators, there is an urgent need to bring back**at least 10% of**\n**agricultural area under high-diversity landscape features**. These include,*inter alia*, \nbuffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, \nterrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion \nand depletion, filter air and water, and support climate adaptation. In addition, more \nbiodiversity often helps lead to more agricultural production. Member States will need to \ntranslate the 10% EU target to a lower geographical scale to ensure connectivity among \nhabitats, especially through the CAP instruments and CAP Strategic Plans, in line with \nthe Farm to Fork Strategy, and through the implementation of the Habitats Directive. The", + "page_start": 7, + "page_end": 7, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**Figure 11: Establishment size and ‘Pressure due to time constraints’ – ESENER 2014 and 201934**\n\n\n\n**Figure 12: Establishment size and ‘Long or irregular working hours’ – ESENER 2014 and 201935**\n\n\n\n**Sectoral differences**are also strong but not that large as between enterprise sizes they vary for \n**‘Pressure due to time constraints’**between 32% in agriculture to 54% in education and HHSW \nactivities. \n\nLooking at countries, as indicated the figure below, the three Nordic EU Member States are at the top \nof the EU27 countries, all three with rates of more than 70%. The lowest levels of less than 30% are \nreported for Italy, Lithuania and Slovakia. 36", + "page_start": 33, + "page_end": 33, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Data availability**\nThe historical weather data (1986–2005) that support the analysis with ESMs in this study are publicly available \nonline at https:// data. giss. nasa. gov/ impac ts/ agmip cf/; the future climate scenario data (2006–2099) that support \nthe analysis with ESMs in this study are publicly available online at https:// pcmdi. llnl. gov/? cmip5 and https:// \nesgf- node. llnl. gov/ proje cts/ esgf- llnl/. The spatial data of harvest area, yield, crop calendar, irrigation portion \nand chemical N input for maize that support the simulation with crop model (DSSAT) in this study are publicly \navailable at http:// mapsp am. info/ (SPAM) and http:// www. sage. wisc. edu (SAGE); the soil data that support the \nsimulation with crop model (DSSAT) in this study are publicly available from the WISE database (https:// www. \nisric. online/ index. php/) and the Digital Soil Map of the World (DSMW) (http:// www. fao. org/ land- water/ land/ \nland- gover nance/ land- resou rces- plann ing- toolb ox/ categ ory/ detai ls/ en/c/ 10265 64/). All other relevant data are \navailable from the corresponding authors. \n\n\n \n \n \n \n [html]\n
Species
Alternatives. The consists. Therefolds. Therefolds. Therefolds. They deference systems : mustsis of resistand terms : r ( H10 ) Rechmond such as and emotional
P ‐ Difficult
Derminan, D : VIPS 100.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.0000
Assessment
Global Allobal. Allobal EAF. BB, FITP - 007 ( 2017 ). ( Crommunity ). ( Y ) & B - bibmeter ) $ A reversele of sessions )
0.000
", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What concerns has open data raised in the insurance sector?", + "target_page": 23, + "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public \n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that \n\nare*already*sold today. Such data, even if of strategic importance as is the case with digital \n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase \n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases: \n\n• the money to generate the data already arrives by some other source than sales and \n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing, \n\nthereby reducing those costs!) \n\n• the only extra expense caused by publishing those data online (assuming they're already \n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that \n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already \n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet. \n\n**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**1. Introduction**\nThis report is the final deliverable of the Open Data, Open Society research project. It follows the \n\npublication of the Open Data, Open Society report, finished in late October 2010 and published in \n\nearly January 2011. That first report focused on explaining the critical importance of digital data in \n\ncontemporary society and business activities; defining Open Data; giving examples on their \n\npotential, especially at the local level, on transparency and economics activities; finally, defining \n\nsummarizing some general best practices. \n\nThis second report looks at what happened in the Open Data arena after October 2010. After some \n\nconsiderations on the general social and political background in late 2010/early 2011, it is divided \n\nin two main parts. The first describes some emerging trends and issues related to Open Data, that \n\ngot minor or no coverage in the first report. The second part discusses some practices and actions to \n\nfollow to deal with those trends and issues. \n\n**2. Social and political landscape**\nIt is worthwhile to begin by mentioning several events, happened between the end of 2010 and the \n\nfirst months of 2011, that can help to understand what will be the place and role of Open Data in the \n\nfuture, as well as the challenges faced by its advocates. \n\nThe first two are the Spanish \"Indignados\" and the Arab Spring. The first movement has among its \n\ngoals*\"a change in society and an increase in social awareness\"*. The Arab Spring, as L. Millar put \n\nit on the New Zealand Computer Society website,*\"demonstrated the potency of technology to*\n\n*reflect citizens' views of government systems that are not transparent.\"*As a consequence, noted the \n\nAfrinnovator blog,*\"we have seen from the civil disobedience in the North of Africa and the Middle*\n\n*East, the appetite for more accountable and transparent government will only grow from here on\"*. \n\nFrom this analysis it looks like, in a way, both the Indignados and the participants to the Arab \n\nSpring are (also) asking for Open Data, even if they aren't using the term and many participants to \n\nthese grassroots movement may still ignore its definition, that was born inside hackers and Public", + "page_start": 2, + "page_end": 2, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "*a research project about openness of*\n*public data in EU local*\n*administration*\n\n*by Marco Fioretti*\n*for the*\n*Laboratory of Economics and Management*\n*of*\n*Scuola Superiore Sant'Anna, Pisa*\n\nThis report is part of the “Open Data, Open Society” Project financed through the DIME network \n(Dynamics of Institutions and Markets in Europe, www.dime-eu.org) as part of DIME Work \nPackage 6.8, coordinated by Professor Giulio Bottazzi", + "page_start": 0, + "page_end": 0, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", + "page_start": 1, + "page_end": 1, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**2.3. Open Data in Latin America, Asia and Africa**\nSeveral countries in Latin America are studying and making experiments with Open Data both at \n\nthe government and at the grassroots level. The same is happening, on a much smaller scale, in a \n\nfew parts of Asia and Africa. On average, the volume of these Open Data experiments and the level \n\nof*local*interest and awareness around them is still lower than what is happening in Europe and \n\nNorth America. In spite of this we suggest that it is important, for public officials and civic activists \n\nin Western Countries, to follow these developments closely. The reason is that they may turn into \n\nvery useful test beds for all the strengths and limits of Open Data, especially those not encountered \n\nyet where the movement was born. \n\nIn fact, the original discourse and arguments around Open Data are heavily Western centric. The \n\nproblem they want to solve is how to make democracy work better*in countries where it already*\n\n*exists and which share a great amount of history and cultural/philosophical values*. \n\nOther countries face very different challenges, from the philosophical level to the practical one. A \n\ncommon issue in developing countries, for example, is that there is very little to open simply \n\nbecause much PSI (Public Sector Information) doesn't exist in digital format yet. Therefore, the first \n\nthing to do is to*create*data, normally through outsourcing and crowd sourcing. \n\nOther issues, that will be discussed in detail in other sections of the report because they are also \n\npresent in Europe in different forms, are related to lack of equal opportunities for access to data and \n\nserious fears (sometimes, concrete, sometimes caused by confusion about what should be open and \n\nhow) that data will be used*against*citizens. A commenter to Gurstein's Open Data: Empowering \n\nthe Empowered or Effective Data Use for Everyone? said: \n\n*in Delhi and Mumbai, mobs and rioters managed to get information about particular*\n*identity groups through voter rolls: openness is, in certain situations, a precarious*\n*virtue. It is almost certain that Open Data would be used to rig election but here again*\n*openness is not the issue, they would find it anyway...*\n\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its \n\neffects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in \n\nThailand, for example, one of the most appreciated entries was a software scraper of the Thailand's \n\nMember of House of Representative Website, that made it possible for everybody to create", + "page_start": 7, + "page_end": 7, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "by David Osimo in EU eGov action plan published: the good, the bad and the unknown, are the \n\nactions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control \n\nover their data. However the Action Plan contains no reference to the need for a more open and \n\ncollaborative governance. \n\nIn the case of European Structural Funds, as Luigi Reggi reported in March 2011: \n\nthere is no single point of access to the data. Hundreds of Managing Authorities are \nfollowing different paths and implementing different information strategies when \nopening up their data. \n\nMany databases (often simple PDF lists) [...show...] huge variation not only in \nthe way they can be accessed but also in content and quality of data provided. \n\n... [...The results of...] an independent web-based survey on the overall \nquality of data published by each Managing Authority responsible for the 434 \nOperational Programmes approved in July 2009... can be summarized as follows: \n\nThe use of open, machine-processable and linked-data formats have unexpected \nadvantages in terms of transparency and re-use of the data by the public and private \nsector. The application of these technical principles does not need extra budget or major \nchanges in government organization and information management; nor does it require \nthe update of existing software and infrastructures. What is needed today is the \npromotion among national and local authorities of the culture of transparency and the \nraising of awareness of the benefits that could derive from opening up existing data and \ninformation in a re-usable way. \n\nThe European Cohesion Policy is only halfway to accomplishing a paradigm shift to \nopen data, with differences in performance both between and - in some cases - within \nEuropean Countries. \n\nThings don't go much better for the European Union in the energy field. Carlo Stagnaro wrote in \n\nEU Energy Orwellianism: Ignorance Is Strength: \n\nEnergy is an active area of EU public policy. Yet authorities are not revealing \ninformation (data is surely has) that is crucial to determine whether its policies are \ndistorting the market and come at too high a cost to society. This is a major fault in \nEurope's credibility in advancing its policy goals, as well as a serious limitation to the \naccountability of the policy making process \n\nWe realized that, while strongly supporting green investments the EU does not know, or \ndoes not make it public, how much is spent every year on green subsidies... With regard \nto green jobs, several estimates exist, but no official figure is provided. \n\nMore recently... I discovered that Eurostat does not tell how much coal capacity is \ninstalled - as opposed to natural gas- or oil-fueled generation plants. It is possible to \nknow how much coal is used, but not the amount of fixed capital which is invested in", + "page_start": 6, + "page_end": 6, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "22.Thinking About Africa's Open Data \n\n23.Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in \n\nEurope \n\n24.UK Open Government Licence removes barriers to re-use of public sector information \n\n25.Western Europe: A journey through tech for transparency projects \n\n26.What open data means to marginalized communities \n\n27.What's in a Name? Open Gov and Good Gov \n\n28.WikiLeaks Relationship With the Media \n\n29.WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government", + "page_start": 33, + "page_end": 33, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**4. Conclusion: seven Open Data strategy and**\n**best practices suggestions**\nStarting from the trends and conclusion described in the previous chapter, this section lists, in the \n\nmost synthetic way possible, some strategic actions and best practices for 2011, that we consider \n\nimportant in making Open Data succeed and bring the greatest possible benefits to all citizens and \n\nbusinesses. \n\n**4.1. Properly define and explain both Open Data and Public**\n**Data**\nJust because Open Data is becoming more popular (and, we may say, more and more necessary \n\nevery year), it is essential to intensify efforts to explain, both to the general public and to public \n\nadministrators, that \n\n1.**Privacy issues are almost always a non-issue.**Quoting from What \"open data\" means - \n\nand what it doesn't):*Privacy and/or security concerns with putting all the government's data*\n\n*out there are a separate issue that shouldn't be confused with Open Data. Whether data*\n\n*should be made publicly available is where privacy concerns come into play. Once it has*\n\n*been determined that government data should be made public, then it should be done*\n\n*openly.*\n\n2. Defining as Public and consequently opening them in the right way,*much more data*than \n\nthose born and stored*inside*Public Administration is an urgent task that is in the best \n\ninterest of all citizens and businesses \n\n**4.2. Keep political issues separated by economics ones**\nOpen Data can reduce the costs of Public Administrations and generate (or at least protect, as in the \n\ncase of deals from local merchants) local jobs in all sectors of the economy, not just high-tech ones. \n\nThere seems to be enough evidence for these two assertions to go for more Open Data*even if*they \n\nhad no effect at all on participation to politics. This should always be kept in mind, also because \n\nsome data that can directly stimulate business are not the same that would be useful for \n\ntransparency. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableControlnCreativeParameters ( n = 22 )
", + "page_start": 26, + "page_end": 26, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", + "target_page": 28, + "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**4.3. Keep past and future separate**\nFor the same reason why it is important to always distinguishes between political and economical \n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about*future*data \n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from \n\nthose about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that \n\nGovernment should publish everything non-private it can**now**is \"rather dangerous\", and that it \n\nwould be much better to release nothing until someone actually asked for it, and at that point doing \n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that \n\nasking for everything as soon as possible would*\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"*. The second is that many existing old data \n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend \n\nresources in opening them. \n\nEven if these concerns were always true, it is important to realize that they apply (especially the \n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very \n\ndifferent constraints. Existing data may still exist only in paper format and/or be locked by closed or \n\nunclear licenses, or not relevant anymore for future decisions. \n\nOpening*future*data, instead, is almost always more important, useful urgent, easier and cheaper \n\nthan digitizing or even only reformatting material that in many cases is already too old to make \n\nimmediate, concrete differences. While this argument is probably not always true when we look at \n\nOpen data for transparency, it probably is when it comes to economic development. \n\nTherefore, features and guidelines that should be present in all future data generation and \n\nmanagement processes include: \n\n• standardization: the less, obviously open, formats are used for data of the same type, the \n\neasier it is to merge and correlate them. The formats that have to be standardized are not \n\nonly those at the pure software level. Even more important is, for example, to adopt by law \n\nstandard identificators for government suppliers, names and machine-readable identifiers of \n\nbudget voices and so on \n\n• preparation for future digitization: new digital systems should explicitly be designed from \n\nthe beginning so that it will be possible, when non-digital records will be digitized, to add \n\nthem to the databases without modifying losses. \n\n\n \n \n \n \n [html]\n
TableTableTable28 / 34Cageright 2012 LOX8, Sourks Seprior : Sent Time, This work is releceed andiror Constine Common atribution license ( htp :// rnativecommens. org / licenses / hy5.01 )
", + "page_start": 27, + "page_end": 27, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: \n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. \n\n**3.8. Need to better define what is Public Data**\nTogether with citizens education, there is a huge challenge that Governments and the Open Data \n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update \n\nand expand the definition of Public Data and to have it accepted by lawmakers and public \n\nadministrators.", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public \n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that \n\nare*already*sold today. Such data, even if of strategic importance as is the case with digital \n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase \n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases: \n\n• the money to generate the data already arrives by some other source than sales and \n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing, \n\nthereby reducing those costs!) \n\n• the only extra expense caused by publishing those data online (assuming they're already \n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that \n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already \n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet. \n\n**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "opinion, the Wikileaks experience proves the advantages of Open Data. \n\nWas Wikileaks right to publish the cable? Were the specific facts and behaviors uncovered by \n\nCablegate right or wrong? The answer to these questions are outside the scope of this document. \n\nHere we only wish to point out that Cablegate and Wikileaks, at least in the form we've known them \n\nso far, have been about: \n\n• reacting to problems*after*they occurred \n\n• without any intervention and involvement of the parties and organizations that may have \n\nbehaved improperly \n\nOpen Data, instead, is about*prevention*of errors, abuses and inefficiencies, through conscious and \n\ncontinuous collaboration of citizens and governments officials*during*day to day operations, if not \n\nbefore their beginning. \n\nOf course, citizens must always check that they aren't getting incomplete or biased data. But in any \n\ncase, Open Data means that the involved government officials aren't just prepared to see that data \n\npublished, they know and accept it from the start. In such a context, some risks associated to \n\nWikileaks, like the fact that the leaker lacks the means to influence the downstream use of the \n\ninformation, and therefore may harm anybody connected to the linked information, are almost non- \n\nexistent. \n\nAbove all, unlike the content of most Wikileaks documents, Open Data are almost always data that \n\nshould surely be open, unlike wartime military reports, and that almost never contain any personal \n\ninformation. In summary, whatever the conclusions about Wikileaks are, they could not be \n\nconclusions against Open Data, because there are too many differences between the two \n\nmovements. \n\n**2.2. Data Openness in EU**\nBoth the interest and the need for data openness at the European Union level remain high. Here, \n\nwithout making any complete analysis, we'll only report and comment a few relevant episodes. \n\nWhile studies continue to point at the political and economical advantages of Open Data, great \n\ninefficiencies and delays still keep the time and cost savings that could be achieved a far goal for \n\nthe European Union. \n\nAll the principles of the Open Declaration (collaboration, transparency, empowerment) have been \n\ndeclared key areas of action of the new EC eGov action plan. Particularly important, as explained", + "page_start": 5, + "page_end": 5, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is*\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"*. This definition is so generic that accepting it together with the assumption that all \n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in \n\nmachine readable format with an open license etc...) doesn't create any particular problem or \n\nconflict. \n\nReal problems however start as it has happened all too often so far, whenever we assume more or \n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by \n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector \n\nInformation) are the same thing. \n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public \n\nData. But this is an age of privatization of many public services, from transportation to healthcare, \n\nenergy and water management. This is an age in which many activities with potentially very serious \n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen \n\n*outside*Public Administrations. The paradox is that, as Sasaki put it, this increased privatization is \n\nhappening in the very same period in which*\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what \n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information*plus*the much bigger \n\namount of data describing and measuring all the activities of private companies, from bus \n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes \n\nreleased in the atmosphere, that have a*direct impact*on the health and rights of all citizens of the \n\ncommunities affected by the activities of those companies. \n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is \n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should \n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as \n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the \n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the \n\nOpen Data community, and for society as a whole, in the next years. \n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public \n\n\n \n \n \n \n [html]\n
Data * that are not PSI, and of the impacts of their lack of openness.TableSpecificity
", + "page_start": 23, + "page_end": 23, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "existing] problem that is somewhere else. \n\nRegardless of the real probability of data alterations before they are published, the major problem \n\nhappens after. We already mentioned in the first report the fact that, while correct interpretation of \n\npublic data from*the majority of average citizens*is absolutely critical, the current situation, even in \n\ncountries with (theoretical) high alphabetization and Internet access rates, is one in which most \n\npeople still lack the skills needed for such analysis. Therefore, there surely is space for both \n\nintentional manipulation of PSI and for misunderstanding it. After the publication of the first report, \n\nwe've encountered several examples of this danger, which are reported in the rest of this paragraph. \n\nBefore describing those cases, and in spite of them, it is necessary to point out one thing. While the \n\nimpact on the general public (in terms of raising interest and enhancing participation) on the Open \n\nData activity of 2010 is been, in many cases and as of today, still minimal, it is also true that there \n\nhas been no big increase in demagogy, more or less manipulated scandals and conflictual discussion \n\ncaused by Open Data. There has certainly been something of this in the Cablegate but that's not \n\nreally relevant because, as we've already explained, what Wikileaks did is intrinsically different \n\nfrom Open Data. So far, negative or at least controversial reactions by manipulation and \n\nmisunderstanding of Open Data haven't happened to such a scale to justify not opening PSI. \n\nThis said, let's look at some recent example of misunderstanding and/or manipulation based on \n\n(sometimes open) public digital data. \n\nNicolas Kayser-Bril mentioned a digital map of all the religious places in Russia, that shows \n\n[also]*\"mosques that are no longer in use, so as to convey the idea that Muslims were invading*\n\n*Russia.\"*\n\nIn September 2010 the Italian National Institute of Geophysics and Vulcanology officially declared \n\nin September 2010 that they were evaluating whether to stop publishing online Italy's seismic data, \n\nas they had been doing for years. The reason was that, following the March 2009 earthquake in \n\nItaly, the data were being used to*\"come to conclusions without any basis at all\"*, both by the press, \n\nto sell more, and by local politicians trying to hide the lack of preventive measures, like enforcing \n\nanti seismic construction codes. \n\nStill in Italy, Daniele Belleri runs a Milan crime mapping blog called \"Il giro della Nera\", making a \n\nbig effort to explain to his readers the limits of the maps he publishes, and the potential for \n\nmisunderstanding if they are used without preparation, or with wrong expectations. This is a \n\nsynthesis of Belleri's explanation, also covered in other websites, that is applicable to any map-", + "page_start": 17, + "page_end": 17, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "with a project called \"Tales of Things\" to allow people to leave messages for each other (or just for \n\nthe world) at the bus stops. Scanning the QR code now allows people to see not just the bus \n\ntimetable, but also the notes other travelers have left on that stop, including*\"what's nearby, who's*\n\n*waiting for whom, what number can you call for a good time. It's a cross between bus stop*\n\n*Facebook and digital graffiti\"*, that happened thanks to the openness of the original bus stop data. \n\nThe Social Life of Data Project will study instead how particular datasets have been used, who used \n\nthem, how those people are connected and what conversations happen around Open Data. \n\n**3.3. Legal issues remain crucial**\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this \n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing \n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible \n\nbenefits in that country. If there are no guarantees that public data can be used without restriction, \n\nvery little happens in practice, and when it happens it may be something against the public interest. \n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process \n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized \n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from \n\ntheir website to reuse them, Public Engines sued. \n\nReporting this, D. Eaves rightly points out that*both*companies are right: one is trying to protect its \n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY \n\nplace where it's available. This is what happens when public officials leave the ownership of*public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little \n\ndifference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "government. Even ignoring data openness, this is essential for at least three other reasons. The first \n\nis to protect a public administration from having to pay*twice*for those data, if it needs it again in \n\nthe future for some other internal activity, not explicitly mentioned in the initial contract. The \n\nsecond reason is to not spend more than what is absolutely necessary to respond to public records \n\nrequests, that is to comply with Freedom of Information laws. \n\nThe final reason is to guarantee quality assurance and detection of abuses at the smallest cost, that is \n\nsharing it with all the citizens using the public services based on those data. A real world example \n\nof this point comes from the \"Where's My Villo?\" service in Brussels. Villo! is a city-wide bike- \n\nsharing scheme started in May 2009, through a partnerships with a private company: JCDecaux \n\nfinances the infrastructure and operates it, in exchange for advertising space on the bikes \n\nthemselves and on billboards at the bike sharing stations. The availability of bikes and parking \n\nspaces of each station is published online in real time on the official Villo's website. \n\nWhen the quality of service decreased, some citizens started \"Where's My Villo?\", another website \n\nthat reuses those data to measure where and how often there aren't enough available bikes and \n\nparking spaces, in a way that made it impossible for JCDecaux to deny the problems and stimulated \n\nit to fix them. Both this happy ending and the fact that it came at almost no cost to the city, because \n\ncitizens could monitor the service by themselves, were possible just because the data from the \n\nofficial website were legally and automatically reusable. \n\n**3.4. The price of digitization**\nIn practice, public data can be opened at affordable costs, in a useful and easily usable way, only if \n\nit is in digital format. As a consequence of this fact, demand for Open Data exposes a problem that \n\nalready existed and must be fixed anyway, regardless (again) of openness. Any substantial increase \n\nof efficiency and reduction of the costs of Public Administrations can only happen when data and \n\nprocedures are digitized. The problem is that such digitization (which, obviously, must happen \n\nanyway sooner or later) can be very expensive and we are only now starting to really realize how \n\nmuch. Actual, material costs are not the worst problem here. Activities like semi-automatic \n\nscanning of paper documents or typing again their content inside some database, are relatively low, \n\none-time expenses that are also very easy to calculate and budget in advance with great precision. \n\nThe real costs are those at the social, cultural, historical and workflow reorganization level. What is \n\nreally difficult, that is expensive in ways that are hard to predict, is to fit inside digital, more or less \n\n\n \n \n \n \n [html]\n
duration of developmentdilutionsDiabetes,1OTITIdUS,IldDIUSdIIUMaximumGenome ( mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, mean, meaIIIdyDeOver
", + "page_start": 13, + "page_end": 13, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", + "page_start": 1, + "page_end": 1, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "How did serum estradiol and progesterone levels change during pregnancy?", + "target_page": 2, + "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "b Sex steroid hormones \n12,500 \n\n17β-estradiol \nProgesterone \n\n1 \n– \nl \n\nm \ng \np \nl \n\no \nd \na \nr \nt \ns \ne \n- \nβ \n7 \n1 \n\ni \n\n\n<0 0–13 14–26 27–40 \nGestation weeks \n\n\n0 \n0 \n\nBirth \n–1 0 10 20 30 40 50 \n\nWeeks since conception \n\n\n\nPre/IVF \n\n// \n\n// \n\n// \n\n// \n\n93 162 \n\n\n\n50 \n\nBirth \n\n\n\nd \n4.80 \n) \n3 \nm \nm \nV \nM \nG \n5 \n0 \n1 \n× \n( \n4.60 \n0 \n1.80 \n) \nm \nm \nT \nC \n6 \n0 \n1 \n× \n( \n1.60 \n\n0 \n) \n1.29 \n3 l \nm \nm \n\no \nv \nn \na \nr \nB \ni \n\n6 \n0 \n1 \n× \n( \n1.27 \n\n0 \n\n14 27 40 \nWeeks since conception \n\nSummary brain measures \n\n. \nt \nn \na \nu \nq \n*R*2 adj = 0.50,*P*= 0.007 \n*R*2 adj = 0.91,*P*< 0.001 0.44 \n\ny \np \no \nr \nt \no \ns \ni \nn \na \nl \na \nb \no \nG \n0.38 \n\n0 \n\ns \ne \nl \nc \ni \nr \nt \nn \ne \nv \nt \na \nL \n\n4,800 \n) \n3 \nm \nm \n( \n\n3,900 \n0 \n\nadj = 0.90,*P*< 0.001 26,000 \n) \n3 \nF \nS \nC \nm \nm \n( \n\n24,500 \n100 150 0 50 100 150 \nWeeks since conception \n\n50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Neuroanatomical changes observed over the**\n**course of a human pregnancy**\n\n\n \n \n \n \n [html]Laura Pritschet ® 1 : 1 ; Caitlin M. Taylor Φ1 ; Daniela Cossio Φ2 ; Lackung Examination\n
Received : 23 August 2023
Accepted : 29 July 2024
Hannah Grotzingar ', Evan Layher ', Elizabeth R. Chrastii Φ3 & Egaly β, Ilecabody Spaking
Published online : 16 September 2024
||| Check for updates
\n\nWorldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. \n\nIn humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "linking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023). \n\nThis precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on \n\nresting state brain activity, white matter microstructure, neural \nmetabolite concentrations and grey matter architecture.*Nat.*\n*Commun.***13**, 6931 (2022). \n\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. \n& Carmona, S. Characterizing the brain structural adaptations \nacross the motherhood transition.*Front. Glob. Womens Health***2**, \n742775 (2021). \n16. Spalek, K. et al. Pregnancy renders anatomical changes in \n\nhypothalamic substructures of the human brain that relate to \naspects of maternal behavior.*Psychoneuroendocrinology***164**, \n107021 (2024). \n17. Martínez-García, M. et al. Do pregnancy-induced brain changes \n\nreverse? The brain of a mother six years after parturition.*Brain Sci.*\n**11**, 168 (2021b). \n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals \n\ntraces of childbirth in the maternal brain.*Proc. Natl Acad. Sci. USA*\n**116**, 22341–22346 (2019). \n\nThese findings provide a critical rationale for conducting further \nprecision imaging studies of pregnancy in demographically enriched \ncohorts to determine the universality and idiosyncrasy of these adap- \ntations and their role in maternal health. Are the changes observed in \nour participant reflective of the broader population? Do deviations \nfrom the norm lead to maladaptive outcomes? A precision imaging \napproach can help determine whether the pace of pregnancy-induced \nneuroanatomical changes drives divergent brain health outcomes in \nwomen, as may be the case during other rapid periods of brain devel- \nopment44. One in five women experiences perinatal depression45 and \nwhile the first FDA-approved treatment is now available46, early detec- \ntion remains elusive. Precision imaging studies could offer clues about \nan individual’s risk for or resilience to depression before symptom \nonset, helping clinicians better determine when and how to intervene. \nNeuroscientists and clinicians also lack tools to facilitate detection \nand treatment of neurological disorders that co-occur, worsen or \nremit with pregnancy, such as epilepsy, headaches, multiple sclerosis \nand intracranial hypertension47. Precision mapping of the maternal \nbrain lays the groundwork for a greater understanding of the subtle \nand sweeping structural, functional, behavioral and clinical changes \nthat unfold across pregnancy. Such pursuits will advance our basic", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Our findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "table, th, td {\n border: 1px solid black;\n font-size: 10px;\n }\n \n \n \n [html]\n
20.Cotridge, A. et al. Change in brain size during and after pregnancy : study in healthy women and women with preeclampsia. Am. J. Neuroradiol. 23.19 – 26 ( 2002 ).38.
21.Paternina - Di, M. et al. Women ’ s neuroplasticity during gestation, childbirth and postpartum. Nat. Neurosci. 27.399 – 327 ( 2024 ).39.
22.Makris, N. et al. Decreased volume of the brain reward system in alcoholism. Biol. Psychiatry 64.192 - 202 ( 2008 ).23.
Filevich, E. et al. Day2day : investigating daily variability of magnetic resonance imaging measures over half a year. BMC Neurosci. 18.65 ( 2017 ).40.24.
Dulac, C., O ’ Connell, L. A. & Wu, Z. Neural control of maternal and paternal behaviors. Science 345.765 – 770 ( 2014 ).41.25.
Carmona, S. et al. Pregnancy and adolescence entail similar neuroanatomical adaptations. a comparative analysis of cerebral morphometric changes. Hum. Brain Mapp, 40.2143 – 2152 ( 209 ).42.26.
Pawluski, J. L., Hoekzema, E., Leuner, B. & Lonstein, J. S. Less canTableTable
be more. fine tuning the maternal brain. Neurosci. Biobehax. Rev. 133.104475 ( 2022 ).43.27.
Martinez - Garcia, M., Jacobs, E. G., de Lange, A. M. G. & Carmona, S. Advancing the neuroscience of human pregnancy. Nat. Neurosci, ZT, 805 – 807 ( 2024 ).44.28.
Pritschet, L., Taylor, C. M., Santander, T. & Jacobs, E. G. Applying dense - sampling methods to reveal dynamic endocrine45.Table
modulation of the nervous system. Curr. Opin. Behav. Sci. 40.72 – 78 ( 2021 ).46.29.
Taxier, L. R., Gross, K. S. & Frick, K. M. Oestradiol as a neuromodulator of learning and memory. Nat. Rev. Neurosci. 2f,47.Table
535 – 550 ( 2020 ).48.30.
Kohl, J. et al. Functional circuit architecture underlying parental behaviour. Nature 556.326 – 331 ( 2018 ). Article 7701.31.Rodrigo, M. J. et al. Inferior fronto - temporo - occipital connectivity : a missing link between maltreated girls and neglectful mothers. Soc. Cogn. Affect. Neurosci. It, 1658 – 1665 ( 2016 ).
Pubjuris32.Pawluski, J. L., L., Lonstein, J. S. & Fleming, A. S. The neurobiology of postpartum anxiety and depression. Trends Neurosci. 40.106 – 120 ( 2017 ).
Ope Attrition33.Barba - Muller, E., Craddock, S., Carmona, S. & Hoekzema, E. Brain plasticity in pregnancy and the postpartum period : links to maternal caregiving and mental health. Arch. Womens Ment. Health 22.289 – 299 ( 2019 ).
adapas last south34.Barth, C. & de Lange, A.- M. G. Towards an understanding of women ’ s brain aging the immunology of pregnancy and menopause. Front. Neuroendocrinol, 58.100850 ( 2020 ).
artic individual incleaves35.Orchard, E. R., Rutherford, H. J. V., Holmes, A. J. & Jamadar, S. D. Matrescence. Ufetime impact of motherhood on cognition and the brain. Trends Cogn. Sci. Zf, 302 – 316 [ 2023 ].
use use, hold36.Duarte - Guterman, F : et al. Cellular and molecular signatures of motherhood in the adult and ageing rat brain. Open Biol. 10.230217 ( 2023 ).
org /
", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed4.pdf" + }, + { + "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "above). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for \nCA1 and CA2/3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of \ntotal gray matter volume calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones \n(estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if \nthey met FDR correction at q < .05. \n\nDiffusion imaging: \nDSI Studio’s correlational tractography (Yeh et al., 2016) was used to analyze the relationship between white matter \nstructure and gestational week (n = 16). A truncated model was run to examine the relationship between white matter and \nsex steroid hormones (n = 14) for the subset of diffusion scans with paired endocrine data during gestation. A non-parametric \nSpearman correlation was used to derive the correlation between gestational week and endocrine factors and our metrics of \ninterest (QA and MD; see Table S9 and Fig. S10 for MD results) because the data were not normally distributed. Statistical \ninference was reached using connectometry, a permutation-based approach that tests the strength of coherent associations \nfound between the local connectome and our variables of interest. It provides higher reliability and replicability by correcting \nfor multiple comparisons. This technique provides a high-resolution characterization of local axonal orientation. The \ncorrelational tractography was run with the following parameters: T-score threshold of 2.5, 4 pruning iterations, and a length \nthreshold of 25 voxel distance. To estimate the false discovery rate (FDR), a total of 4000 randomized permutations were \napplied to obtain the null distribution of the track length. Reported regions were selected based on FDR cutoff (FDR < 0.2, \nsuggested by DSI Studio), and contained at least 10 tracts. For visualization of global and tract QA at each gestational stage, \nmean QA values were extracted using DSI Studio’s whole brain fiber tracking algorithm and ROI-based tracking using the \ndefault HCP842 atlas (Yeh et al., 2013). \n\nPredicting global, network, and regional volumetric change (GMV, CT, MTL subregion, microstructure) by pregnancy-related \nindicators (gestation week, estrogen, progesterone). \n\nWhole brain ROI-based Both \n\nGlobal measures of gray matter volume, cortical thickness, and cerebrospinal fluid were computed by \nANTs and validated with FreeSurfer. A whole-brain probabilistic atlas (e.g., Schaefer 400-region \nparcellation) was used for ROI analysis of cortical thickness and volume and the Yeo/Schaefer 17-network \nscheme was used for network-level analyses. The 'aseg' segmentation was used for ROI analysis of \nsubcortical gray matter volume. The Princeton Young Adult 3T ASHS Atlas Template was used to examine \nvolume among 7 MTL subfields: CA1, CA 2/3, dentate gyrus, subiculum, entorhinal cortex, perirhinal \ncortex, and the parahippocampal gyrus. Whole-brain white matter structure was assessed for the \ndiffusion imaging analysis, wherein every tract and bundle was evaluated. \n\nAnatomical location(s) \n\nN/A; s and diffusion MRI only. \n\nStatistic type for inference \n\n(See Eklund et al. 2016) \n\nCorrection FDR-correction \n\nModels & analysis \n\nn/a Involved in the study \n\nFunctional and/or effective connectivity \n\nGraph analysis \n\nMultivariate modeling or predictive analysis \n\nMultivariate modeling and predictive analysis Multivariate regression analyses was used to explore brain structure in relation to gestation. Regional,", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", + "target_page": 2, + "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "linking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023). \n\nThis precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on \n\nresting state brain activity, white matter microstructure, neural \nmetabolite concentrations and grey matter architecture.*Nat.*\n*Commun.***13**, 6931 (2022). \n\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. \n& Carmona, S. Characterizing the brain structural adaptations \nacross the motherhood transition.*Front. Glob. Womens Health***2**, \n742775 (2021). \n16. Spalek, K. et al. Pregnancy renders anatomical changes in \n\nhypothalamic substructures of the human brain that relate to \naspects of maternal behavior.*Psychoneuroendocrinology***164**, \n107021 (2024). \n17. Martínez-García, M. et al. Do pregnancy-induced brain changes \n\nreverse? The brain of a mother six years after parturition.*Brain Sci.*\n**11**, 168 (2021b). \n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals \n\ntraces of childbirth in the maternal brain.*Proc. Natl Acad. Sci. USA*\n**116**, 22341–22346 (2019). \n\nThese findings provide a critical rationale for conducting further \nprecision imaging studies of pregnancy in demographically enriched \ncohorts to determine the universality and idiosyncrasy of these adap- \ntations and their role in maternal health. Are the changes observed in \nour participant reflective of the broader population? Do deviations \nfrom the norm lead to maladaptive outcomes? A precision imaging \napproach can help determine whether the pace of pregnancy-induced \nneuroanatomical changes drives divergent brain health outcomes in \nwomen, as may be the case during other rapid periods of brain devel- \nopment44. One in five women experiences perinatal depression45 and \nwhile the first FDA-approved treatment is now available46, early detec- \ntion remains elusive. Precision imaging studies could offer clues about \nan individual’s risk for or resilience to depression before symptom \nonset, helping clinicians better determine when and how to intervene. \nNeuroscientists and clinicians also lack tools to facilitate detection \nand treatment of neurological disorders that co-occur, worsen or \nremit with pregnancy, such as epilepsy, headaches, multiple sclerosis \nand intracranial hypertension47. Precision mapping of the maternal \nbrain lays the groundwork for a greater understanding of the subtle \nand sweeping structural, functional, behavioral and clinical changes \nthat unfold across pregnancy. Such pursuits will advance our basic", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). \n\nAlthough studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. \n\n7. Celik, A., Somer, M., Kukreja, B., Wu, T. & Kalish, B. T. The \n\ngenomic architecture of pregnancy-associated plasticity in \nthe maternal mouse hippocampus.*eNeuro***9**, ENEURO.0117-22. \n2022 (2022). \n8. Puri, T. A., Richard, J. E. & Galea, L. A. M. Beyond sex differences: \n\nshort- and long-term effects of pregnancy on the brain.*Trends*\n*Neurosci.***46**, 459–471 (2023). \n9. Chaker, Z. et al. Pregnancy-responsive pools of adult neural \n\nstem cells for transient neurogenesis in mothers.*Science***382**, \n958–963 (2023). \n\n10. Diamond, M. C., Johnson, R. E. & Ingham, C. Brain plasticity \ninduced by environment and pregnancy.*Int. J. Neurosci.***2**, \n171–178 (1971). \n11. Servin-Barthet, C. et al. The transition to motherhood: \n\nlinking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023).", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "–8 \n\nl \na \nt \no \nT \nA \nc \nb \nm \nL \nC \nN \nM \nD \ni \nr \ne \nP \ns \ni \nV \nt \nn \ne \nC \ns \ni \nV \nB \nN \nM \nD \nB \nt \no \nM \nm \no \nS \n\ni \ni \n\n\n\nL \n\nLat R \nMed \n\nRegional GMV \n\nPostcentral gyrus \nDorsal attention network B \n\nB \nt \nn \no \nC \nB \nc \nb \nm \nL \nA \nN \nM \nD \nr \na \nP \np \nm \ne \nT \nA \nn \nt \nt \nA \ns \nr \no \nD \nA \nt \no \nM \nm \no \nS \nA \nt \nn \no \nC \nB \nn \nt \nt \nA \ns \nr \no \nD \nC \nt \nn \no \nC \n\nA \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS B \nn \nt \nt \nA \nt \nn \ne \nV \nl \na \nS \n\ni \ni \n\nFrontal eye fields \nDorsal attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\nMedial frontal \nSalience ventral attention network A Inferior parietal \nControl network B \n\nGestation + postpartum Gestation Gestation + postpartum \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n–1 –1 \n\nV \nM \nG \ng \nv \nA \n–2 –2 \n\n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nInsula \nSalience ventral attention network B \n\n\n\n\n\n\n\nGestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post 0 10 \n20 \nWeek \n\nGestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 \n\nV \nM \nG \ng \nv \nA \n\n–1 \n–2 –2 \n\n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n**Fig. 2 | Cortical GMV showed widespread change through gestation and**\n**postpartum. a**, Multivariate regression analyses reveal largely negative \nrelationships between gestation week and regional GMV, with only a minority \nof regions unaffected or increasing over the gestational window (baseline—36 \nweeks). All associations presented here were corrected for multiple comparisons \n(FDR at*q*< 0.05; nonsignificant values set to zero for interpretability).**b**, Average \nnetwork change was calculated by estimating GMV percent change from baseline \n(initial) to 36 weeks gestation (final). Attention and control networks appear \nmost affected.**c**, Six representative regions, classified by major subnetworks, \nthat exhibit pronounced GMV change across gestation. For each panel, we \ndisplay a scatterplot between average GMV of the ROIs and gestation week \n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy \nstage across the whole study (right; gestation and postpartum sessions, 26 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each \nboxplot represents IQR for each stage, with a horizontal line representing the \nmedian value. The whiskers indicate variability outside (±1.5) of this range. \nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical \ntests were corrected for multiple comparisons (FDR at*q*< 0.05) and values \nwere*z*scored and transformed to have a mean of zero and s.d. of one for easier \ncomparison across regions. Please note that the data values shown here are raw \n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list). \nBrain visualizations created with R package ggseg48. IQR, interquartile range; \nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral \nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont, \ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention \nnetwork; SalVentAttn, salience/ventral attention network.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "b Sex steroid hormones \n12,500 \n\n17β-estradiol \nProgesterone \n\n1 \n– \nl \n\nm \ng \np \nl \n\no \nd \na \nr \nt \ns \ne \n- \nβ \n7 \n1 \n\ni \n\n\n<0 0–13 14–26 27–40 \nGestation weeks \n\n\n0 \n0 \n\nBirth \n–1 0 10 20 30 40 50 \n\nWeeks since conception \n\n\n\nPre/IVF \n\n// \n\n// \n\n// \n\n// \n\n93 162 \n\n\n\n50 \n\nBirth \n\n\n\nd \n4.80 \n) \n3 \nm \nm \nV \nM \nG \n5 \n0 \n1 \n× \n( \n4.60 \n0 \n1.80 \n) \nm \nm \nT \nC \n6 \n0 \n1 \n× \n( \n1.60 \n\n0 \n) \n1.29 \n3 l \nm \nm \n\no \nv \nn \na \nr \nB \ni \n\n6 \n0 \n1 \n× \n( \n1.27 \n\n0 \n\n14 27 40 \nWeeks since conception \n\nSummary brain measures \n\n. \nt \nn \na \nu \nq \n*R*2 adj = 0.50,*P*= 0.007 \n*R*2 adj = 0.91,*P*< 0.001 0.44 \n\ny \np \no \nr \nt \no \ns \ni \nn \na \nl \na \nb \no \nG \n0.38 \n\n0 \n\ns \ne \nl \nc \ni \nr \nt \nn \ne \nv \nt \na \nL \n\n4,800 \n) \n3 \nm \nm \n( \n\n3,900 \n0 \n\nadj = 0.90,*P*< 0.001 26,000 \n) \n3 \nF \nS \nC \nm \nm \n( \n\n24,500 \n100 150 0 50 100 150 \nWeeks since conception \n\n50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes \n\nLateral ventricle \n\nCaudate \n\nThalamus \n4,000 \n) \n3 \nm \nm \n3,800 \n( \n\nV \nM \nG \ng \nv \nA \n3,600 \n\n\n\nRight ventral diencephalon \nGestation Gestation + postpartum \n\n4,000 \n\n3,900 \n\n3,800 \n\n3,700 \n\n3,600 \n\n3,500 \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n\n\n\n\n\n\n\n\n\n\nGestation \n*R2* adj = 0.41,*q*= 0.027 \n) \n3 \n200 \nm \nm \n180 ( \n\nV \nM \nG \ng \nv \nA \n\n180 \n\n160 \n\n0 10 \n\n\n\n1,900 \n\n1,800 \n\n1,700 \nPre \n1st 2nd 3rd \nStage \n30 \n\nGestation Gestation + postpartum \n*R2* adj = 0.36,*q*= 0.031 \n) \n540 3 \n540 \nm \nm \n( \n\nV \nM \nG \ng \nv \nA \n460 460 \n0 \n20 \n10 \nWeek \n30 Pre \n1st 2nd 3rd \nStage \n\nGestation + postpartum Gestation \n*R2* adj = 0.58,*q*= 0.001 200 \n) \n3 \nm \nm \n1,900 \n( \n\nV \nM \nG \ng \nv \nA \n\n1,800 \n160 \n1,700 \n\n20 \nWeek \n30 Pre 1st 2nd 3rd Post 0 \n10 \nWeek \n20 \nStage \n\n**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. \n\noutstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "Our findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "What may reflect the decrease in GMV during pregnancy?", + "target_page": 6, + "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and \n\n**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). \n\n**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). \n\nNext, high-resolution segmentation of the MTL allowed us to \ninterrogate subcortical structures at a finer resolution, revealing non- \nlinear volumetric decreases in CA1 (*F*(2,15) = 5.84,*q*= 0.031,*R*2 \nadj = 0.36; \nFig. 3b, left) and CA2/CA3 (*F*(2,15) = 6.82,*q*= 0.027,*R*2 \nadj = 0.41; Fig. 3b, \nmiddle) across gestation. PHC exhibited linear volumetric decreases \nacross gestation (*F*(1,16) = 24.87,*q*< 0.001,*R*2 \nadj = 0.58; Fig. 3b, right) \nwhich was also tied to estradiol (*F*(1,12) = 20.21,*q*= 0.005,*R*2 \nadj = 0.60). \nAll three relationships remained significant after proportional correc- \ntion for total GMV. There was no significant change in other subregions \nor total volume of the hippocampal body, or in the parahippocampal \ngyrus (Supplementary Table 7 and Supplementary Fig. 8). \n\n**Whole-brain dynamics from baseline through postpartum**\nTo begin, we characterized broad neuroanatomical changes over the \ncourse of the entire experimental window (baseline—2 years postpar- \ntum, 26 scans; Fig. 1d). Generalized additive models revealed strong \nnonlinear (effective degrees of freedom > 3) relationships between \nweeks since conception and summary brain metrics. Total GMV \n(*F*= 27.87,*P*< 0.001, deviance explained = 93.9%,*R*2 \nadj = 0.91), summary \nCT (*F*= 15.79,*P*< 0.001, deviance explained = 78.6%,*R*2 \nadj = 0.75) and \ntotal brain volume (*F*= 26.12,*P*< 0.001, deviance explained = 93.4%, \n*R*2 \nadj = 0.90) linearly decreased during gestation and appeared to \npartially rebound postpartum. In contrast, global microstructural \nintegrity (QA) of white matter increased throughout the first and sec- \nond trimesters before returning to baseline levels in the postpartum \nperiod (whole-brain QA,*F*= 4.62,*P*= 0.007, deviance explained = 60.2%, \n*R*2 \nadj = 0.51). We also observed nonlinear patterns of lateral ventricle \nexpansion*(F*= 10.44,*P*< 0.001, deviance explained = 83.8%,*R*2 \nadj = 0.77) \nand increased cerebrospinal fluid (CSF;*F*= 13.32,*P*< 0.001, deviance \nexplained = 83.8%,*R*2 \nadj = 0.79) rising in the second and third trimesters \nbefore dropping sharply postpartum.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "*Cortical GMV and CT*. We then narrowed our analyses to the first 19 \nsessions (baseline—36 weeks gestation) to assess novel brain changes \noccurring over the gestational window. We first computed Pearson’s \nproduct-moment correlation matrices between the following vari- \nables: gestation week, estradiol, progesterone and the 17 network-level \naverage GMV values. We then ran a multivariate regression analysis \npredicting ROI-level GMV changes by gestation week. To identify which \nregions were changing at a rate different from the global decrease, \nwe then ran the analyses again to include total GMV in the regression \nmodel (Supplementary Table 2). This was extended to the network \nlevel, where we ran partial correlations accounting for total GMV. These \nsame analyses were then run with CT measures. Globally-corrected \nresults provided in Supplementary Tables 1–5. Percent change at the \nnetwork level was computed by subtracting the final pregnancy value \n(36 weeks pregnant) from the first prepregnancy baseline value, then \ndividing that difference by said first prepregnancy baseline value. All \nanalyses underwent multiple comparisons testing (false discovery rate \n(FDR)-corrected at*q*< 0.05). \n\n||*ts*− ̂*t*|| \n̂*t*\nε*j*= 100 × mean ( ) \n\nWhere*ts*is the morphometric measurement of a parcel for session*s*\n̂*t*is the mean of*t*across sessions55,79. Thus, we defined variability \nand \nas the mean absolute percent difference between each individual and \nthe mean across sessions. Across-session variability estimates for all \n400 regions were then averaged across eight participants, and a global \nmeasure of cortical GMV variability was computed by averaging across \nthe 400 regions. This approach was repeated independently for the \nT2 hippocampal scans, wherein we computed across-session variability \nfor each parcel of the ASHS parcellation scheme (*n*= 7 bilateral sub- \nfields). However, it is important to note that raw subfield values (that \nis, no manual retouching) were used for Day2Day variability assess- \nments and should be interpreted with caution. Finally, to better com- \npare against our own data, we repeated this approach using our", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "Our findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. \n\nSimilar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "linking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023). \n\nThis precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on \n\nresting state brain activity, white matter microstructure, neural \nmetabolite concentrations and grey matter architecture.*Nat.*\n*Commun.***13**, 6931 (2022). \n\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. \n& Carmona, S. Characterizing the brain structural adaptations \nacross the motherhood transition.*Front. Glob. Womens Health***2**, \n742775 (2021). \n16. Spalek, K. et al. Pregnancy renders anatomical changes in \n\nhypothalamic substructures of the human brain that relate to \naspects of maternal behavior.*Psychoneuroendocrinology***164**, \n107021 (2024). \n17. Martínez-García, M. et al. Do pregnancy-induced brain changes \n\nreverse? The brain of a mother six years after parturition.*Brain Sci.*\n**11**, 168 (2021b). \n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals \n\ntraces of childbirth in the maternal brain.*Proc. Natl Acad. Sci. USA*\n**116**, 22341–22346 (2019). \n\nThese findings provide a critical rationale for conducting further \nprecision imaging studies of pregnancy in demographically enriched \ncohorts to determine the universality and idiosyncrasy of these adap- \ntations and their role in maternal health. Are the changes observed in \nour participant reflective of the broader population? Do deviations \nfrom the norm lead to maladaptive outcomes? A precision imaging \napproach can help determine whether the pace of pregnancy-induced \nneuroanatomical changes drives divergent brain health outcomes in \nwomen, as may be the case during other rapid periods of brain devel- \nopment44. One in five women experiences perinatal depression45 and \nwhile the first FDA-approved treatment is now available46, early detec- \ntion remains elusive. Precision imaging studies could offer clues about \nan individual’s risk for or resilience to depression before symptom \nonset, helping clinicians better determine when and how to intervene. \nNeuroscientists and clinicians also lack tools to facilitate detection \nand treatment of neurological disorders that co-occur, worsen or \nremit with pregnancy, such as epilepsy, headaches, multiple sclerosis \nand intracranial hypertension47. Precision mapping of the maternal \nbrain lays the groundwork for a greater understanding of the subtle \nand sweeping structural, functional, behavioral and clinical changes \nthat unfold across pregnancy. Such pursuits will advance our basic", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes \n\nLateral ventricle \n\nCaudate \n\nThalamus \n4,000 \n) \n3 \nm \nm \n3,800 \n( \n\nV \nM \nG \ng \nv \nA \n3,600 \n\n\n\nRight ventral diencephalon \nGestation Gestation + postpartum \n\n4,000 \n\n3,900 \n\n3,800 \n\n3,700 \n\n3,600 \n\n3,500 \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\n\n\n\n\n\n\n\n\n\n\nGestation \n*R2* adj = 0.41,*q*= 0.027 \n) \n3 \n200 \nm \nm \n180 ( \n\nV \nM \nG \ng \nv \nA \n\n180 \n\n160 \n\n0 10 \n\n\n\n1,900 \n\n1,800 \n\n1,700 \nPre \n1st 2nd 3rd \nStage \n30 \n\nGestation Gestation + postpartum \n*R2* adj = 0.36,*q*= 0.031 \n) \n540 3 \n540 \nm \nm \n( \n\nV \nM \nG \ng \nv \nA \n460 460 \n0 \n20 \n10 \nWeek \n30 Pre \n1st 2nd 3rd \nStage \n\nGestation + postpartum Gestation \n*R2* adj = 0.58,*q*= 0.001 200 \n) \n3 \nm \nm \n1,900 \n( \n\nV \nM \nG \ng \nv \nA \n\n1,800 \n160 \n1,700 \n\n20 \nWeek \n30 Pre 1st 2nd 3rd Post 0 \n10 \nWeek \n20 \nStage \n\n**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. \n\noutstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "b Sex steroid hormones \n12,500 \n\n17β-estradiol \nProgesterone \n\n1 \n– \nl \n\nm \ng \np \nl \n\no \nd \na \nr \nt \ns \ne \n- \nβ \n7 \n1 \n\ni \n\n\n<0 0–13 14–26 27–40 \nGestation weeks \n\n\n0 \n0 \n\nBirth \n–1 0 10 20 30 40 50 \n\nWeeks since conception \n\n\n\nPre/IVF \n\n// \n\n// \n\n// \n\n// \n\n93 162 \n\n\n\n50 \n\nBirth \n\n\n\nd \n4.80 \n) \n3 \nm \nm \nV \nM \nG \n5 \n0 \n1 \n× \n( \n4.60 \n0 \n1.80 \n) \nm \nm \nT \nC \n6 \n0 \n1 \n× \n( \n1.60 \n\n0 \n) \n1.29 \n3 l \nm \nm \n\no \nv \nn \na \nr \nB \ni \n\n6 \n0 \n1 \n× \n( \n1.27 \n\n0 \n\n14 27 40 \nWeeks since conception \n\nSummary brain measures \n\n. \nt \nn \na \nu \nq \n*R*2 adj = 0.50,*P*= 0.007 \n*R*2 adj = 0.91,*P*< 0.001 0.44 \n\ny \np \no \nr \nt \no \ns \ni \nn \na \nl \na \nb \no \nG \n0.38 \n\n0 \n\ns \ne \nl \nc \ni \nr \nt \nn \ne \nv \nt \na \nL \n\n4,800 \n) \n3 \nm \nm \n( \n\n3,900 \n0 \n\nadj = 0.90,*P*< 0.001 26,000 \n) \n3 \nF \nS \nC \nm \nm \n( \n\n24,500 \n100 150 0 50 100 150 \nWeeks since conception \n\n50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). \n\nAlthough studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. \n\n7. Celik, A., Somer, M., Kukreja, B., Wu, T. & Kalish, B. T. The \n\ngenomic architecture of pregnancy-associated plasticity in \nthe maternal mouse hippocampus.*eNeuro***9**, ENEURO.0117-22. \n2022 (2022). \n8. Puri, T. A., Richard, J. E. & Galea, L. A. M. Beyond sex differences: \n\nshort- and long-term effects of pregnancy on the brain.*Trends*\n*Neurosci.***46**, 459–471 (2023). \n9. Chaker, Z. et al. Pregnancy-responsive pools of adult neural \n\nstem cells for transient neurogenesis in mothers.*Science***382**, \n958–963 (2023). \n\n10. Diamond, M. C., Johnson, R. E. & Ingham, C. Brain plasticity \ninduced by environment and pregnancy.*Int. J. Neurosci.***2**, \n171–178 (1971). \n11. Servin-Barthet, C. et al. The transition to motherhood: \n\nlinking hormones, brain and behaviour.*Nat. Rev. Neurosci.***24**, \n605–619 (2023).", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "How to light up my sports smart watch?", + "target_page": 2, + "target_passage": "Up button: Short press to light up or turn off the screen", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Figure 5-32 Turning the Identify LED off \n\nAlternatively, you can use the command-line interface (CLI) to get the same results. Enter the \nfollowing commands in this sequence: \n\n1. Enter**svctask chenclosure -identify yes 1**(or enter**chenclosure -identify yes 1**). \n2. Enter**svctask chenclosure -identify no 1**(or enter**chenclosure -identify no 1**). \n\nTo view internal components (components that cannot be seen from the outside), review the \nbottom of the GUI underneath where the list of external components is displayed. You can \nselect any of these components and details show in the right pane, as with the external \ncomponents.", + "page_start": 171, + "page_end": 171, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "Is my sports smartwatch's fitness data turned on or off by default?", + "target_page": 4, + "target_passage": "Fitness data is turned on by default.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "The port is unverified (see Figure 8-55) because it is not logged on to the Storwize V7000 \nsystem. The first time that it logs on, its state is automatically changed to online, and the \nmapping is applied to this port.", + "page_start": 386, + "page_end": 386, + "source_file": "sg247938.pdf" + }, + { + "text": "138. Figueiredo, Mayara Costa; Ankrah, Elizabeth; Powell, Jacquelyn E.; Epstein, Daniel A.; \n\nChen, Yunan (12 January 2024). \"Powered by AI: Examining How AI Descriptions Influence \nPerceptions of Fertility Tracking Applications\" (https://dl.acm.org/doi/10.1145/3631414). \n*Proc. ACM Interact. Mob. Wearable Ubiquitous Technol*.**7**(4): 154:1–154:24. \ndoi:10.1145/3631414 (https://doi.org/10.1145%2F3631414).", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "When does my Sport smartwatch start and stop monitoring sleep?", + "target_page": 5, + "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. \n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). \n\n\n \n \n \n \n [html]\n
Activity Consistence
", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. \n\n**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. \n\n\n \n \n \n \n [html]\n
Firmware version
", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. \n\n\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the \n\n\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. \n\n**●Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n\n \n \n \n \n [html]\n
battery Seiko board has been protected, so plug in the charging cableto activate it.
Table
", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. \n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\n\n \n \n \n \n [html]\n
II light up or vibrate.
5.2. SMS notification :
", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a \n\ncharging cable. \n\n\n \n \n \n \n [html]\n
A. Watch function descriptionButton description :
", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "1.2 Search the application at App market and download \nFor Android users: \nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download, \nremember to check the pop-up box on your phone when installing, and agree to the permission. \nFor iOS users: \nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your \nphone when installing, and agree to the permission. \n\nAfter WearPro is installed, the app icon appears as . \n\n2.Bind Bluetooth \n\n\n\n2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**13.7 Monitoring**\n\nAn important step is to correct any issues that are reported by your IBM Storwize V7000 \nsystem as soon as possible. Configure your system to send automatic notifications to \nstandard Call Home server or to the new Cloud Call Home server when a new event is \nreported. To avoid having to monitor the management GUI for new events, select the type of \nevent for which you want to be notified. For example, restrict notifications to only events that \nrequire action. The following event notification mechanisms are available: \n\n(cid:2) Call Home \n\nAn event notification can be sent to one or more email addresses. This mechanism notifies \nindividuals of problems. Individuals can receive notifications wherever they have email \naccess, including mobile devices. \n\n(cid:2) Cloud Call Home \n\nCloud services for Call Home is the optimal transmission method for error data because it \nensures notifications are delivered directly to the IBM support center. \n\n(cid:2) SNMP \n\nAn SNMP traps report can be sent to a data center management system, such as IBM \nSystems Director, that consolidates SNMP reports from multiple systems. With this \nmechanism, you can monitor your data center from a single workstation. \n\n(cid:2) Syslog \n\nA syslog report can be sent to a data center management system that consolidates syslog \nreports from multiple systems. With this option, you can monitor your data center from a \nsingle location. \n\nIf your system is within warranty or if you have a hardware maintenance agreement, configure \nyour IBM Storwize V7000 system to send email events directly to IBM if an issue that requires \nhardware replacement is detected. This mechanism is known as*Call Home*. When this event \nis received, IBM automatically opens a problem report and, if appropriate, contacts you to \nhelp resolve the reported problem. \n\n**Important:**If you set up Call Home to IBM, ensure that the contact details that you \nconfigure are correct and kept updated. Personnel changes can cause delays in IBM \nmaking contact. \n\nCloud Call Home is specifically designed to work with new service teams and improves \nconnectivity and ultimately should improve customer support. \n\n**Note:**If the customer does not want to open the firewall, Cloud Call Home does not work \nand the customer can disable Cloud Call Home. Call Home is used instead. \n\n**13.7.1 Email notifications and the Call Home function**\n\nhe Call Home function of IBM Storwize V7000 uses the email notification that is sent to the \nspecific IBM support center. Therefore, the configuration is similar to sending emails to the \nspecific person or system owner. The following procedure summarizes how to configure email \nnotifications and emphasizes what is specific to Call Home: \n\n1. Prepare your contact information that you want to use for the email notification and verify \n\nthe accuracy of the data. From the GUI menu, click**Settings**→**Support**(see \nFigure 13-44 on page 711).", + "page_start": 731, + "page_end": 731, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", + "target_page": 5, + "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "DESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS \n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED \n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR \n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH \n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS. \n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will \n\nbe evaluated based on the price-earnings ratio (PER) and \n\nvolatility relative to our major competitors. PER is used to \n\nmeasure how successfully the IR team manages market \n\nexpectations about Nissan in order to maintain the Nissan \n\nshare price close to an intrinsic value. The other measure, \n\nvolatility, is used to measure the risk investors perceive \n\nwhen considering Nissan stock. If Nissan can successfully \n\nreduce volatility, the minimum return required by investors \n\nshould decline. The IR team believes that a strengthening \n\nof disclosure activities is required to improve both \n\nmeasures. The team plans to disclose not only financial \n\nresults but also more forward-looking information about \n\nNissan fundamentals such as technology and product. \n\nSuch forward-looking information helps investors to \n\nforecast future performance more precisely and reduces \n\nuncertainty about the future. As a consequence, Nissan will \n\nincrease the number of investor conferences, events, and \n\nteleconferences during fiscal 2005. \n\n**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. \n\n**Five-Year Share Performance**\n(Index: April 3, 2000=100) \n400 \nNissan \n300 \n\n200 \nTOPIX Transportation Equipment Index \n100 \nTOPIX \n80 Apr. \nMay June July Aug. Sept Oct. Nov Dec. \nJan. \n**2005**\n**’01** **’02** **’03** **’04** **’05**\n0 \n**2004**", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. \n\nIn light of these factors, our forecast for fiscal 2005 is as follows. This is based on a foreign \n\nexchange rate assumption for the year of ¥105 per dollar and ¥130 per euro: \n\n• Net revenue is predicted to be ¥9 trillion, up 4.9 percent. \n\n• Operating profit is expected to be ¥870 billion, up 1 percent. \n\n• Ordinary profit is expected to reach ¥860 billion, up 0.5 percent. \n\n• Net income is predicted to be ¥517 billion, up 0.9 percent. \n\n• Capital expenditures are expected to reach ¥540 billion, up 13.1 percent. \n\n• R&D expenses are forecast to reach ¥450 billion, or 5 percent of net sales, up 13.0 percent. \n\n• ROIC is expected to remain at or above 20 percent.", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Net Cash Flow (automotive)**\n(Billion Yen) \n\n+1,082.2 \nOperating \n–203.0 –450.7 \nactivities \nbefore tax Tax paid Investing \nactivities \n\n1,200 \n1,000 \nh \ns \na \nC 800 \n600 \n\n–26.0 \nTreasury \nstock \n–94.0 \nDividend \npaid \n400 \n\n–99.1 +10.0 \nOther \nFX rate \nfinancial \nimpact \nactivities \n\n**205.8**\n\nNet debt \nat end \nof FY03 \n**–13.6**\n200 \nNet debt \nat the end \nof FY04 \n0 \nt \nb \ne \nD \n-200 \n\n**Impact on Operating Profit**\n(Billion Yen) \n\n+284 \nVolume \n/mix \n1,100 \n\n–92 \nProduct \nenrichment \n–114 \nSales \nexpenses \nWarranty \nexpenses \n–41 \n1,000 \n\n+131 \nPurchasing \ncost \nreduction \n–44 –15 \nR&D \nexpenses \nG&A \nand \nothers \n900 \n\nManu- \nfacturing \nexpenses \n–25.7**861.2**\nFY04 \nOP \n\n**824.9**-78 \n\nFY03 \nOP \nForex 800 \n\n+31 \nScope of \nconsolidation \n700 \n\n**Net Income**\n\nNet non-operating expenses totaled ¥5.5 billion, ¥9.7 \n\nbillion lower than last year. This was primarily due to a ¥5.3 \n\nbillion decrease in financial costs and a ¥5.3 billion \n\nincrease in equity in earnings of unconsolidated \n\nsubsidiaries and affiliates, thanks mainly to Renault. Net \n\nextraordinary losses totaled ¥62.5 billion, ¥10.7 billion \n\nlower than last year, mainly due to the sale of the site of \n\nthe former Murayama plant. Net income before taxes came \n\nto ¥793.2 billion. Income taxes totaled ¥258.0 billion, with \n\nan effective consolidated tax rate of 33 percent. Minority \n\ninterests amounted to ¥22.9 billion, mainly from Yulon \n\nNissan Motor. As a result, net income reached ¥512.3 \n\nbillion, an increase of ¥8.6 billion. \n\nCurrent liabilities increased by 28.1 percent, or ¥872.2 \n\nbillion, to ¥3,974.7 billion. This increase included changes \n\nin the scope of consolidation of ¥144.4 billion and an \n\nincrease in short-term borrowings for sales financing of \n\n¥558.5 billion. \n\nIn 2004, total shareholder equity increased from \n\n¥2,024.0 billion to ¥2,465.8 billion. This gain was primarily \n\ndue to net income of ¥512.3 billion, offset by dividends \n\npaid totaling ¥101.2 billion. Consolidated shareholder \n\nequity represented 29 percent of total revenues and 25 \n\npercent of total assets. \n\n**Cash Flow**\n\nCash from operating activities was ¥369.4 billion, below \n\nthe previous year’s level of ¥797.4 billion. This drop was \n\nprimarily caused by a ¥331.2 billion increase in finance \n\n**FINANCIAL POSITION**\nreceivables in the U.S. and Japan. There were also \n\nincreases in inventory and income tax paid. \n\nCash used for investing activities increased by ¥108.9 \n\nbillion to ¥865.0 billion. This increase was mainly due to an \n\nincrease of leased vehicles in the U.S. \n\nCash from financing activities totaled ¥521.0 billion, \n\nincluding an increase in short-term borrowing of ¥666.2 \n\nbillion, offset by ¥94 billion for the payment of dividends \n\nand ¥26 billion for the acquisition of treasury stock. \n\nIn total, cash and cash equivalents increased by ¥95.6 \n\nbillion to ¥289.8 billion from fiscal 2004. \n\n**Balance Sheet**\n\nIn 2004, total consolidated assets increased by 25.3 \n\npercent to ¥9,848.5 billion. \n\nCurrent assets increased by 36.4 percent, or ¥1,372.4 \n\nbillion, to ¥5,139.4 billion. This increase included changes \n\nin the scope of consolidation by ¥271.1 billion and an \n\nincrease in sales finance receivables by ¥840.6 billion \n\nthanks to increased sales in the U.S. Fixed assets \n\nincreased by 15.1 percent, or ¥616.7 billion, to ¥4,708.0 \n\nbillion. Property, plant and equipment valuation increased \n\nby ¥593.6 billion, mainly due to capital expenditures of \n\n¥477.5 billion and an increase in leased vehicles.", + "page_start": 14, + "page_end": 14, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Nissan Motor Co, Ltd. and Consolidated Subsidiaries Fiscal years 2004.2003 and 2002
Millions of yen2004.31.202003Me. 31.20042002Met 31.2008
Net sales¥ 8.576.277¥ 7.429.219¥ 6.828.588
Cost of sales ( N = 166 #< 11 )6.351.2695.310.1724.872.324
Gross profit2.225.0082.119.0471.956.264
Selling, general and administrative expenses ( Notes 6ond 11 )1.363.8481.294.1921.219.034
Operating income861.160824.855737.230
Other income ( expenses ):Interest income14.93410.321
7.566Interest expense( 26.656 )( 27.290 )
( 25.060 )Equity in earnings of unconsolidatedsubsidiaries and affiliates36.790
11.62311.395Other, net ( Note 12 )( 92.995 )
( 83.012 )( 36.507 )( 67.927 )( 88.358 )
( 42.606 )Income before income taxes andminority interests793.233
736.497694.624Income taxes ( Nete 15 ):Current
179.226137.745113.185Deferred
78.83781.29585.513258.063
219.040198.698Minority interests( 22.889 )
( 13.790 )( 761 )Net income ( Note 18 )¥ 512.281
¥ 503.667¥495.165
", + "page_start": 75, + "page_end": 75, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**NISSAN Value-Up: Sustaining Performance**\n\nNissan’s position today is much different than it was six years ago or even three years ago. In \n\n1999, we were in crisis, and the Nissan Revival Plan was needed to revive our company and \n\nbuild a future. In April 2002, when NISSAN 180 began, we wanted to complete the revival \n\nprocess, with an emphasis on profitable growth. \n\nE \nC \nN \nA \nM \nR \nO \nF \nR \nE \nP \n\nNISSAN Value-Up is about sustaining performance. About taking all the gains we have \n\nmade in connecting with our customers, in growing volumes, in creating value, in earning profits, \n\nin improving management— and then building upon these gains. \n\nWith NISSAN Value-Up, you will not see a radical break from NISSAN 180. This plan is \n\nevolutionary, not revolutionary. We will take the core elements that got us to this point—namely, \n\nmore revenue, less cost, more quality and speed, and maximized Alliance benefit with Renault— \n\nand build upon them. \n\nNISSAN Value-Up has three critical commitments: \nProfit: Nissan will maintain the top level of operating profit margin among global automakers \n\nfor each of the three years of the plan. \n\nVolume: Nissan will achieve global sales of 4.2 million units measured in fiscal 2008. \nROIC: Nissan will achieve a 20 percent ROIC on average over the course of the plan, based \n\non the new formula that excludes cash on hand from the denominator. \n\nNISSAN Value-Up will oversee 28 new models, resulting in the start of production of 70 \n\nmodels worldwide, over two dozen more than the 44 production starts during NISSAN 180. Of \n\nthe 28 new models, 18 will be replacements for existing models and 10 will be completely new \n\n“conquest” models. We will enter more new segments, and we will introduce six models that will \n\ndelight customers by being completely innovative in their concept and benefits. \n\nWe will pursue four major breakthroughs while implementing NISSAN Value-Up: \n\n• Our Infiniti luxury brand will extend its reach into new markets such as China and Russia and \n\ncontinue to establish its credibility as a Tier-1 luxury player. \n\n• We will develop our Light Commercial Vehicle (LCV) business into a fully competitive global \n\noperation through new market and product entries. By 2007, we plan to increase our LCV \n\nvolume by 40 percent from fiscal 2004 to 434,000 units. During this period, operating margin \n\nis targeted to double from 4 percent to 8 percent. \n\n• We will take a more efficient global sourcing approach to maximize our opportunities and \n\nminimize our overall costs as we grow. Our engineering, production and purchasing functions \n\nwill continue their acceleration toward being fully integrated global operations. \n\n• We will continue to invest in new and emerging markets, including China, India and Russia.", + "page_start": 11, + "page_end": 11, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Making Light Commercial Profitable**\n\n\n\n“The auto industry has traditionally viewed light commercial vehicles—what we call \n\nLCVs—as factory-fillers; vehicles that were fine to turn out as long as they were \n\nmarginally profitable. The difference today is that we think Nissan can profitably market \n\nLCVs in every segment and territory. Over the last two and a half years, for example, \n\nwe’ve turned things around from a loss to an operating profit margin of 4 percent. That \n\nfigure already exceeds the industry average. Now we’re committed to bringing LCVs \n\ninto line with the other areas of Nissan’s business. By fiscal 2007, we plan to have an \n\noperating margin of eight percent and a 40 percent increase in volume to 434,000 units. \n\nThat will bring us into the top rank of LCV producers and to the top in profitability. \n\nOne big consideration is that the average model in our lineup today is nearly ten years old. \n\nCreating a breakthrough with a lineup this old is difficult, and we examined the worth of \n\ncontinuing in this line of business. In the end, we decided to stay in and aggressively pursue profit. \n\nWe came up with six strategies to make that happen: \n\n• Renew the portfolio. During NISSAN Value-Up, we will start and finish nearly nine new \n\nvehicle actions. \n• Reduce cost and increase value. We will accomplish these goals with the same \n\ncustomer-centered techniques used for passenger vehicles since the Nissan Revival Plan. \n• Enter new territories. The market in Japan is flat or trending down, and there are many \n\ncompetitors in Europe. But China is an emerging market, and we have a strong relationship \n\nwith Dongfeng, our partner there. \n• Pursue OEM deals. We’re open to cross-badging our vehicles under somebody else’s name.", + "page_start": 27, + "page_end": 27, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**11.1%**\nCommitment \n**4,200**\n**21.3%** **10.8%**\n**10.0%**\n**19.8%** **20.1%***\n\nTop level \noperating profit margin \namong global automakers \n**3,388**\nROIC \naverage of 20% \n**7.9%**\n+812 \n\n**2,597**\n+791 \n**12.7%**\n\nP \nE \nR \nF \nO \nR \nM \nA \nN \nC \nE \n\n**4.75%**\n\n**7.5%**\n\n**1.4%**\n**1.3%**\n\n**’99 ’00 ’01 ’02 ’03 ’04 ’05 ’06 ’07** **’99 ’00 ’01 ’02 ’03 ’04 ’05 ’06 ’07** **’01** **’04** **’08**\nNRP \nNISSAN \n180 NISSAN \nValue-Up \nNRP \nNISSAN \n180 NISSAN \nValue-Up \n\n*Same scope pf consolidation as P&L, excluding \nchange of cash compared to fiscal year 2003 \n\nRussia \nKorea \nJapan*\nChina \nMiddle \nEast \nTaiwan \n\n\n\n**Light Commercial Vehicles (LCV)**\n\n(Thousand units) (% of consolidated operating margin) \n750 10 \n**8.0%**\n600 8 \n\n**434**\n+40% \n450 6 \n**312**\n**234**\n**182**\n**4.0%** 300 4 \n**203**\n**187**\n**3.6%**\n**3.3%**\n150 2 \n**-0.5%** **1.4%**\n0 0 \n**’00** **’01** **’02** **’03** **’04** **’07**", + "page_start": 12, + "page_end": 12, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "(% of net revenue) \n5.8% \n**478**\n6 \n427 \n**5.6%**\n**398**\n4.8% \n354 \n5 \n**4.6%**\n300 \n4 \n\n3 \n**’04**\n\n**Corporate Rating**\n**Investment in Our Future**\n(Billion Yen) \nAa3 AA– \n5.5% \n500 \nA1 A+ \n5.3% \nA2 A \nR&I 378 \n400 A3 A– \n4.4% \n4.2% 326 \n4.1% Baa1 BBB+ \n4.0% \nS&P 3.8% \nBaa2 BBB \n262 \n300 \n239 244 \n3.4% 232 Baa3 BBB– \nMoody’s 206 \nBa1 BB+ \n200 \n**’99** **’00** **’01** **’02** **’03** **9/01 4/02 9/02 4/03 9/03 4/04 9/04 4/05 5/05**\nCanton plant investment included from fiscal year 2001 \n\n**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. \n\n**Dividend**\n\nAt the annual general meeting of shareholders on June 21, \n\n2005, the company proposed increasing its dividend to \n\n¥24 per share in 2004, up from ¥19 in 2003. In the first \n\nyear of the NISSAN Value-up dividend policy, the \n\nCompany plans to increase the per-share dividend to ¥29 \n\nin 2005. By the end of NISSAN Value-up in March 2008, \n\nNissan plans to pay an annual dividend of no less than \n\n¥40 per share. \n\n**Return on Invested Capital (ROIC)**\n\nNissan’s investments are made within the strict guidelines \n\nof its automotive operating ROIC. Based on these \n\nguidelines, Nissan reached 20.1 percent of ROIC on a \n\nconsistent basis as of fiscal 2003. \n\n**Dividend Policy**\n(Dividend per share, in yen) \n\n40 \n34 40 \n29 \n24 30 \n19 \n14 20 \n8 \n7 \n10 \n0 \n0 \n**’99** **’00** **’01** **’02** **’03** **’04** **’05*** **’06*** **’07***\n*Forecast", + "page_start": 15, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "How can CEDAR Oil be used with the AY11236 microscope?", + "target_page": 10, + "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece \n interpupillary slide adjustment. \n7. Observe using the right eyepiece adjusting the coarse and fine \n focus and adjust the diopter ring until image is clear and sharp. \n8. Observe with the left eyepiece and adjust the diopter ring until \n image is clear and sharp. \n9. Rotate the fine focus adjustment when using other objectives. \n NOTE: This instrument is equipped with patent objectives so \n the precision or parfocalization is very high. \n\n**ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the \n numerical aperture of the objective being used. \n2. To make sure that the objectives are imaging properly \n (especially the 40x and 100x), follow this procedure: \n\n1. Take off the eyepiece. \n2. Look through the eyepiece. \n 3. The smallest circle or light that you can see is the \n\n eyepiece's exit pupil. \n4. Adjust the aperture of the iris diaphragm in the \n condenser to 70% or 80% for the best contrast for \n observation (See Fig. 2.). \n\nAdjustable \nRing Tightening \nRing Mark \nSleeve Front \nSleeve \n\nExit Pupil \nof Objective \n\n\n\n\n\n**Fig. 1 - Objective Parts**\n\n10. If the image is in focus with the 10x objective, you can select \n other objectives and observe the specimen even if the fine \n adjustment knob has not been used by using the following \n method (See Fig. 1): \nAperture of \nDiaphragm \n\n1. Unscrew the 40x or 100x objective and remove from \n turret. \n2. Remove the mark sleeve. \n3. Turn the ring on the objective to adjust its parfocal \n distance. \n4. Re-insert the objective and compare with the 10x. \n5. Adjust until the 40x and 100x objectives image is clear. \n\n**Fig. 2 - Condenser Diaphram Aperture**\n\n**TROUBLESHOOTING**\n\n**USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the \n 100x objective is being used. NOTE: To maintain a good quality \n image, rotate the turret right and left several times to eliminate \n bubbles in the cedar oil. \n2. After finishing the observation, wipe off the cedar oil. \n3. Do not use the 40x objective until you have wiped off all of the \n cedar oil. \n\n\n \n \n \n \n [html]\n
ProblemPossible CauseSolution
1. Image not clear.1. Specimen is in incorrect2. Lans is dirty. 2. Lans is dirty. 3. Coldar oil first placed on metastasis of biomersion objective. 4. Butbles in Credar oilS. Codar oil on 40x objective. 6. Sris diaphragm open too wide.1. Re - position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on proportions. 4. Rotate turnet several times by the compared to eliminate bubbles. 5. Clean 40x sbjective. 6. Reduce size of iris diaphragm.
2. Poor illumination.1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.1. Re - position condenser. 2. Clean lens. 3. Re - position specimen so it is level.
3. Illumination not bright.1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.
4. Cannot focus at high magnification.1. Specimen is in incorrect position.1. Re - position specimen.
5. Objective lenses touch specimen.1. Stage is too high.1. Re - position stage.
", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]Model AY11240Model AY11238NameNameMicroscope StandMicroscope StandAchromatic ObjectiveAchromatic ObjectivePlain Concave Mirror10x Wide Field EyepiecePlastic Dust CoverPlastic Dust Cover10x Wide Field EyepieceSpare BulbLens Cleaning TissueLens Cleaning TissueSpecificationSpecificationInspection CertificateInspection CertificatePacking ListPacking List\n
QtyQty
11
4 ×14 ×1
10x110 ×1
40x ( s )140 × ( s )1
11
11
11
11
11
11
11
\n\n**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. \n\n\n \n \n \n \n [html]\n
Objective1UX
4 ×40 ×
10 ×100 ×
40 × ( s )400 ×
\n\n\n \n \n \n \n [html]Achromatic Objective\n
_SystemPlaqifillationApertureDistance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40x Spring Adjustable Focus0.650.57mm
\n\n**OPERATION**\n\n**Model AY11240**", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11240**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. \n3. Place the specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Adjust the stand to an angle that \n provides comfortable observation. \n5. Rotate and adjust concave mirror to \n light the field of view.**NOTE: Do not**\n**reflect the Sun with the mirror.**\n**This can cause serious eye injury**\n**or permanent eye damage.**\n6. Observe the specimen using the \n lowest magnification objective first. \n The 4x objective provides a larger \n field of view to search specimen.", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo \nmicroscope. It is constructed with two optical paths at the same \nangle. It is equipped with transmitted illumination and oblique \nillumination. By using this instrument, the user can observe and \nenlarge the right side stereo image. BARSKA Model AY11234 is a \nzoom trinocular stereo microscope. The object being viewed is \nenlarged through two identical sized sets of right and left eye \nlenses. The zoom provides different magnification and features an \ninversion system which allows the image to be viewed normally \nand right side up. \n\n**10**", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "FIG. 1: (Colour online) Images of strongly ramified dewetting structures obtained using Atomic Force \n\nMicroscopy in the case of (a) an aqueous collagen solution on graphite (courtesy of U. Thiele, M. Mertig \n\nand W. Pompe; see also Ref. [42]. Image size: 5µm×5µm); (b) poly(acrylic acid) in water spin-coated onto \n\na polystyrene substrate (reprinted with permission of John Wiley & Sons, Inc. from Ref. [23]; copyright \n\nJohn Wiley & Sons, Inc. 2002; Image size: 2.5µm×2.5µm); and in both (c) and (d), a solution of gold \n\nnanoparticles in toluene, spin-coated onto native oxide terminated silicon substrates (scale bars given in \n\npanels). In all the images the lighter areas correspond to the deposited solute and the dark areas to the \n\nempty substrate. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTable
TableTableTableTableTableTable
TableTableTableTableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "For the AY11230 microscope, what is the interpupillary adjustment?", + "target_page": 7, + "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece \n interpupillary slide adjustment. \n7. Observe using the right eyepiece adjusting the coarse and fine \n focus and adjust the diopter ring until image is clear and sharp. \n8. Observe with the left eyepiece and adjust the diopter ring until \n image is clear and sharp. \n9. Rotate the fine focus adjustment when using other objectives. \n NOTE: This instrument is equipped with patent objectives so \n the precision or parfocalization is very high. \n\n**ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the \n numerical aperture of the objective being used. \n2. To make sure that the objectives are imaging properly \n (especially the 40x and 100x), follow this procedure: \n\n1. Take off the eyepiece. \n2. Look through the eyepiece. \n 3. The smallest circle or light that you can see is the \n\n eyepiece's exit pupil. \n4. Adjust the aperture of the iris diaphragm in the \n condenser to 70% or 80% for the best contrast for \n observation (See Fig. 2.). \n\nAdjustable \nRing Tightening \nRing Mark \nSleeve Front \nSleeve \n\nExit Pupil \nof Objective \n\n\n\n\n\n**Fig. 1 - Objective Parts**\n\n10. If the image is in focus with the 10x objective, you can select \n other objectives and observe the specimen even if the fine \n adjustment knob has not been used by using the following \n method (See Fig. 1): \nAperture of \nDiaphragm \n\n1. Unscrew the 40x or 100x objective and remove from \n turret. \n2. Remove the mark sleeve. \n3. Turn the ring on the objective to adjust its parfocal \n distance. \n4. Re-insert the objective and compare with the 10x. \n5. Adjust until the 40x and 100x objectives image is clear. \n\n**Fig. 2 - Condenser Diaphram Aperture**\n\n**TROUBLESHOOTING**\n\n**USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the \n 100x objective is being used. NOTE: To maintain a good quality \n image, rotate the turret right and left several times to eliminate \n bubbles in the cedar oil. \n2. After finishing the observation, wipe off the cedar oil. \n3. Do not use the 40x objective until you have wiped off all of the \n cedar oil. \n\n\n \n \n \n \n [html]\n
ProblemPossible CauseSolution
1. Image not clear.1. Specimen is in incorrect2. Lans is dirty. 2. Lans is dirty. 3. Coldar oil first placed on metastasis of biomersion objective. 4. Butbles in Credar oilS. Codar oil on 40x objective. 6. Sris diaphragm open too wide.1. Re - position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on proportions. 4. Rotate turnet several times by the compared to eliminate bubbles. 5. Clean 40x sbjective. 6. Reduce size of iris diaphragm.
2. Poor illumination.1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.1. Re - position condenser. 2. Clean lens. 3. Re - position specimen so it is level.
3. Illumination not bright.1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.
4. Cannot focus at high magnification.1. Specimen is in incorrect position.1. Re - position specimen.
5. Objective lenses touch specimen.1. Stage is too high.1. Re - position stage.
", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**MODEL AY11230/AY11234**\n\n**Model AY11228**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage \n\n\n\n\n**Model AY11234**\n\n\n \n \n \n \n [html]\n
Model AY11232
FOCUSING
1. Turn the focusing knob away or to you until a clear image is viewed.2. If the image is unclear, adjust the height of the elevator up or down, then turn the focusing knob again
TableZOOM MAGNIFICATION
Age1. Turn the zoom magnification knob the desired magnification and field view.
ILLARY2. In most situations, it is recommenthat you focus at the lowest magnification, then move to a high
distance. distancemagnification and re - focus a necessary.
both eyes the3. If the image is not clear to both ey at the same time, the diopter ring need adjustment.
DIOPTER RING AD3USTMENTCover.
1. To adjust the eyepiece for viewingor without eyeglasses and for differences in acuity between
eleft eye knob untiland left eyes, follow the following steps :
Productiona. Observe an image through the
ng until the incide andeyepiece and bring a specific perinto focus using the focus knobb. By turning the diopter rring adjustment for the left eyepiecobring the same point into sharp
from thefocus.
Aging thec. Then bring the same point into focus through the right eyepiec
pve theby turning the right diopter ring
removed. With more than one viewer, eac viewer should note their own
Comparisondiopter ring position for the left
Sensorsand right eyepieces, then befor viewing set the diopter ring
Maximumadjustments to that setting.
CHANGING THE BULB1. Disconnect the power cord from thelectrical outlet.
2. When the bulb is cool, remove the oblique illuminator cap and remov the halogen bulb with cap.3. Replace with a new halogen bulb. 4. Open the window in the base plate and replace the halogen lamp or
fluorescent lamp of transmitted
\n\nIllumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. \n\n**CONSTRUCTION**", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11240**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. \n3. Place the specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Adjust the stand to an angle that \n provides comfortable observation. \n5. Rotate and adjust concave mirror to \n light the field of view.**NOTE: Do not**\n**reflect the Sun with the mirror.**\n**This can cause serious eye injury**\n**or permanent eye damage.**\n6. Observe the specimen using the \n lowest magnification objective first. \n The 4x objective provides a larger \n field of view to search specimen.", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]Model AY11240Model AY11238NameNameMicroscope StandMicroscope StandAchromatic ObjectiveAchromatic ObjectivePlain Concave Mirror10x Wide Field EyepiecePlastic Dust CoverPlastic Dust Cover10x Wide Field EyepieceSpare BulbLens Cleaning TissueLens Cleaning TissueSpecificationSpecificationInspection CertificateInspection CertificatePacking ListPacking List\n
QtyQty
11
4 ×14 ×1
10x110 ×1
40x ( s )140 × ( s )1
11
11
11
11
11
11
11
\n\n**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. \n\n\n \n \n \n \n [html]\n
Objective1UX
4 ×40 ×
10 ×100 ×
40 × ( s )400 ×
\n\n\n \n \n \n \n [html]Achromatic Objective\n
_SystemPlaqifillationApertureDistance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40x Spring Adjustable Focus0.650.57mm
\n\n**OPERATION**\n\n**Model AY11240**", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2866 \n\nimage \nand 640-nm diode lasers. Full thickness, tiled, confocal \nstacks with a 2- to 3-mm interval \nin the Z-axis were obtained \nthrough a 203 dry lens (0.8 NA) with the confocal aperture set to 1 \nAiry unit or less. All image capture was performed using Zen Blue \nEdition software (Carl Zeiss Microscopy GmbH, Jena, Germany), \nand analyses were performed using Zen Blue or FIJI.45 \n\n2.5. Image analysis \n\n\n \n \n \n \n [html]\n
Stateal areaWasTablefromgeriesTableSpecificationParametersTableSectionIllumeTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTabledifferentGeneTablestateSpecificTableParametersPatientsTabledataBurnTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", + "target_page": 10, + "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11240**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. \n3. Place the specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Adjust the stand to an angle that \n provides comfortable observation. \n5. Rotate and adjust concave mirror to \n light the field of view.**NOTE: Do not**\n**reflect the Sun with the mirror.**\n**This can cause serious eye injury**\n**or permanent eye damage.**\n6. Observe the specimen using the \n lowest magnification objective first. \n The 4x objective provides a larger \n field of view to search specimen.", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**SPECIFICATIONS**\n1. Length of mechanical tube: 160mm \n2. Conjugate distance between object and image: 195mm \n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion) \n4. Illumination: Input 110V or 200V; Output: 20W \n5. Fine adjustment range: .002mm \n6. Coarse Adjustment Range: 20mm \n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm \n8. Condenser Elevation Range: 15mm \n9. Iris diaphragm aperture: 2mm-30mm \n\n**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover \n\n\n \n \n \n \n [html]Achromatic Objective\n
ClassificationOptical SystemMagnificationNumerical ApertureWorking Distance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40 × Spring Adjustable Focus0.650.57mm
Oil Immer -100x Spring Adjustable1.250.18mm
\n\nSpare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm \n\n**Total Magnification**\n\n\n \n \n \n \n [html]Eyepiece\n
Magnification
10 ×
Objective4 ×
40 ×10 ×
100 ×40 × ( s )
400x100 × ( oil, s )
", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]Model AY11240Model AY11238NameNameMicroscope StandMicroscope StandAchromatic ObjectiveAchromatic ObjectivePlain Concave Mirror10x Wide Field EyepiecePlastic Dust CoverPlastic Dust Cover10x Wide Field EyepieceSpare BulbLens Cleaning TissueLens Cleaning TissueSpecificationSpecificationInspection CertificateInspection CertificatePacking ListPacking List\n
QtyQty
11
4 ×14 ×1
10x110 ×1
40x ( s )140 × ( s )1
11
11
11
11
11
11
11
\n\n**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. \n\n\n \n \n \n \n [html]\n
Objective1UX
4 ×40 ×
10 ×100 ×
40 × ( s )400 ×
\n\n\n \n \n \n \n [html]Achromatic Objective\n
_SystemPlaqifillationApertureDistance
Dry4x Adjustable Focus0.137.42mm
Dry10 ×0.257.14mm
Dry40x Spring Adjustable Focus0.650.57mm
\n\n**OPERATION**\n\n**Model AY11240**", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230**\nEyepiece \n\nRotating Head \n\nRevolving Turret \nStand \n\nObjectives \n\nStage \n\nCoarse \nAdjustment \nKnob \nFine \nAdjustment \nKnob \nStage Clip \nAdjustment \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch \n\nPower \nCord \n\nLamp \n\n**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n\n \n \n \n \n [html]\n
Model AY11234FOCUSING
1. Turn the focusing knob avou until a clear image isNumber of fluoring
2. If the image is unclear, ar height of the elevator upExpecimen agnification
then turn the focusing kConcentrations
ZOOM MAGNIFICATIONn can be
1. Turn the zoom magnificat the desired magnification view.PUPILLARY
2. In most situations, it is rethat you focus at the lowthe observer ' s lary distance. Illary distance
magnification, then move magnification and re - focu necessary.Authority expectations
3. If the image is not clear t at the same time, the did need adjustment.DIOPTER RING ADJUSTM
ctive cover. the working1. To adjust the eyepiece foor without eyeglasses and differences in acuity betw and left eyes, follow the steps :
focus knob until ar and sharp.a. Observe an image threyepiece and bring a sinto focus using the fob. By turning the diopter
Tablebring the same point if
remove the and removec. Then bring the same p focus through the righ by turning the right diff
cap.logen bulb. e base plate and
d. With more than one vi viewer should note the diopter ring position fc and right eyepieces, th viewing set the diopter adjustments to that se
\n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. \n\n1. The vertical tube can be used for \n instructional viewing or to \n\nphotograph \ndigital camera or \nunit. \n2. Loosen the retention screw, then rotate \n the adjustment ring to change the \n\n the image witrh a \n micro TV \n\n length of the vertical tube. \n3. Make sure that both the images in \n\n**13**", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**USING THE 5-HOLE DIAPHRAGM**\n\n\n\nDiopter \nAdjustment \n\n\n\n**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**\n\n**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. \n\n\n\n**CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "-0.1 \n\n(a) Fe TEY \n-0.2 \n\ny \nr \nt \ne \nm \nm \ny \ns \na \nD \nC \nM \nX \n\n0.004 \n\n0.000 \n\n(b) Mn TEY \n-0.004 \n\nFIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2449.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2866 \n\nimage \nand 640-nm diode lasers. Full thickness, tiled, confocal \nstacks with a 2- to 3-mm interval \nin the Z-axis were obtained \nthrough a 203 dry lens (0.8 NA) with the confocal aperture set to 1 \nAiry unit or less. All image capture was performed using Zen Blue \nEdition software (Carl Zeiss Microscopy GmbH, Jena, Germany), \nand analyses were performed using Zen Blue or FIJI.45 \n\n2.5. Image analysis \n\n\n \n \n \n \n [html]\n
Stateal areaWasTablefromgeriesTableSpecificationParametersTableSectionIllumeTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTabledifferentGeneTablestateSpecificTableParametersPatientsTabledataBurnTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "**MODEL AY11230/AY11234**\n\n**Model AY11228**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage \n\n\n\n\n**Model AY11234**\n\n\n \n \n \n \n [html]\n
Model AY11232
FOCUSING
1. Turn the focusing knob away or to you until a clear image is viewed.2. If the image is unclear, adjust the height of the elevator up or down, then turn the focusing knob again
TableZOOM MAGNIFICATION
Age1. Turn the zoom magnification knob the desired magnification and field view.
ILLARY2. In most situations, it is recommenthat you focus at the lowest magnification, then move to a high
distance. distancemagnification and re - focus a necessary.
both eyes the3. If the image is not clear to both ey at the same time, the diopter ring need adjustment.
DIOPTER RING AD3USTMENTCover.
1. To adjust the eyepiece for viewingor without eyeglasses and for differences in acuity between
eleft eye knob untiland left eyes, follow the following steps :
Productiona. Observe an image through the
ng until the incide andeyepiece and bring a specific perinto focus using the focus knobb. By turning the diopter rring adjustment for the left eyepiecobring the same point into sharp
from thefocus.
Aging thec. Then bring the same point into focus through the right eyepiec
pve theby turning the right diopter ring
removed. With more than one viewer, eac viewer should note their own
Comparisondiopter ring position for the left
Sensorsand right eyepieces, then befor viewing set the diopter ring
Maximumadjustments to that setting.
CHANGING THE BULB1. Disconnect the power cord from thelectrical outlet.
2. When the bulb is cool, remove the oblique illuminator cap and remov the halogen bulb with cap.3. Replace with a new halogen bulb. 4. Open the window in the base plate and replace the halogen lamp or
fluorescent lamp of transmitted
\n\nIllumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. \n\n**CONSTRUCTION**", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What event marks the beginning of the field of artificial intelligence?", + "target_page": 22, + "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] \n\n**History**\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. \nThe study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, \nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical \nreasoning.[319][320] This, along with concurrent discoveries in cybernetics, information theory and \nneurobiology, led researchers to consider the possibility of building an \"electronic brain\".[r] They \ndeveloped several areas of research that would become part of AI,[322] such as McCullouch and Pitts \ndesign for \"artificial neurons\" in 1943,[115] and Turing's influential 1950 paper 'Computing Machinery \nand Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was \nplausible.[323][320] \n\nThe field of AI research was founded at a workshop at Dartmouth College in 1956.[s][6] The attendees \nbecame the leaders of AI research in the 1960s.[t] They and their students produced programs that the \npress described as \"astonishing\":[u] computers were learning checkers strategies, solving word problems \nin algebra, proving logical theorems and speaking English.[v][7] Artificial intelligence laboratories were \nset up at a number of British and U.S. universities in the latter 1950s and early 1960s.[320] \n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in \ncreating a machine with general intelligence and considered this the goal of their field.[327] In 1965 \nHerbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can \ndo\".[328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating \n'artificial intelligence' will substantially be solved\".[329] They had, however, underestimated the difficulty \nof the problem.[w] In 1974, both the U.S. and British governments cut off exploratory research in \nresponse to the criticism of Sir James Lighthill[331] and ongoing pressure from the U.S. Congress to fund \nmore productive projects.[332] Minsky's and Papert's book*Perceptrons*was understood as proving that \nartificial neural networks would never be useful for solving real-world tasks, thus discrediting the \napproach altogether.[333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, \nfollowed.[9] \n\nIn the early 1980s, AI research was revived by the commercial success of expert systems,[334] a form of \nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for \nAI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired \nthe U.S. and British governments to restore funding for academic research.[8] However, beginning with \nthe collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer- \nlasting winter began.[10]", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] \n\nArtificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Harari, Yuval Noah (2023). \"AI and the future of humanity\" (https://www.youtube.com/watch?v= \nLWiM-LuRe6w).*YouTube*. Archived (https://web.archive.org/web/20240930110823/https://w \nww.youtube.com/watch?v=LWiM-LuRe6w) from the original on 30 September 2024. \nRetrieved 5 October 2024. \n\nHaugeland, John (1985).*Artificial Intelligence: The Very Idea*. Cambridge, Mass.: MIT Press. \n\nISBN 978-0-2620-8153-5.", + "page_start": 56, + "page_end": 56, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
q. Sometimes called a “ robopocalypse ”[ 299 ]
r. “ Electronic brain ” was the term used by the press around this time. EQTRECT3
s. Darriel Crevier wrote, \" the conterence is genorrally recognized as the official birthdate of the new science.\" 32.4 \" Russell and Nonyig called the conference \" the inception of artificial intelligence :\" 0.55
t. Russell and Nonigs wrote \" for the next 20 years the field would be clominated by these people and their students............................
u. Russell and Norvig wrote, “ It was astonishing wherever a computer did anything kind of smarteah ”...
v. The programs described are Arthur Samuel ' s checkers program for the IBM 70L Daniel Bobrow ' s STUDENT, Newell and Simon ' s Logic Theorica and Terry Winograrae ' s SHBDL1.
w. Russell and Nonvig write. “ in almost all cases, these early systems failed on more difficult problems ”[ 33 ]
x. Embodied approaches to ARTIT were championed by Hans Morave2 / 2RT and Rodney Brooks ( SSSIII ) and went by many names : Nouvelle ALTDevelopmental robotics [ 54 ]
y. Matters Worge arrate in The Adartic “ Wherenes for decaders, computer - science fields such as natural - target processing, compader vision, and robotics used externely different methods, now they all use a programming method calleie
z. Jack Clark wrote in Bloomberg : “ After a half - decade of quiet breakthroughts in artificial infeliogence, 2015 has been a landmark year. Computers are smater and learning baber than ever ”, and noted that the number of software projecte
aa. Nils Nilsson wrote in 256S : “ Simply put, there is wide disagreement in the field about what AI is all about 1999
ab. Dankei Crevier wrote that \" time has proven the accuracy and perceptiveness of some of Dreyfus ' s comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\"[ 7.9 ]
ac. Search presented thickefolistion of “ citrong all ” in 12090 EPH Toxaries ’ original fromtolation was “ The appropriately programmed computer really to a mind, in the sense that computers given the right programmes can be let - being an
", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia3.pdf" + }, + { + "text": "McCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for \n\nthe Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w \neb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). \nArchived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. \nhtml) on 26 August 2007. Retrieved 30 August 2007. \n\nMcCarthy, John (2007), \"From Here to Human-Level AI\",*Artificial Intelligence*, p. 171 \nMcCarthy, John (1999),*What is AI?*(http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde \nx.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi \ncial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved \n4 December 2022 \n\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\".*Ethics and Information*\n*Technology*.**9**(2): 153–164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo \nc/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% \n2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 \n49). \n\nMcGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). \n\nMcGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: \n\nPrentice-Hall \n\nMoravec, Hans (1988).*Mind Children*(https://archive.org/details/mindchildrenfutu00mora). \n\nHarvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 \n0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 \nJuly 2020. Retrieved 18 November 2019. \n\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new \ns/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a \nnd-anxiety).*The Economist*. Archived (https://web.archive.org/web/20180112214621/https:// \nwww.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une \nmployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved \n13 January 2018. \n\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among \nExperts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF).*AI Matters*.**1**(1): 9–11. \ndoi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). \nS2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. \narchive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) \nfrom the original on 15 January 2016.", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Edward Fredkin argues that \"artificial intelligence is the next step in evolution\", an idea first proposed by \nSamuel Butler's \"Darwin among the Machines\" as far back as 1863, and expanded upon by George \nDyson in his 1998 book*Darwin Among the Machines: The Evolution of Global Intelligence*.[398] \n\n\n\n**In fiction**\n\nThought-capable artificial beings have appeared as \nstorytelling devices since antiquity,[399] and have been a \npersistent theme in science fiction.[400] \n\nA common trope in these works began with Mary Shelley's \n*Frankenstein*, where a human creation becomes a threat to \nits masters. This includes such works as Arthur C. Clarke's \nand Stanley Kubrick's*2001: A Space Odyssey*(both 1968), \nwith HAL 9000, the murderous computer in charge of the \n*Discovery One*spaceship, as well as*The Terminator*(1984) \nand*The Matrix*(1999). In contrast, the rare loyal robots \nsuch as Gort from*The Day the Earth Stood Still*(1951) and \nBishop from*Aliens*(1986) are less prominent in popular culture.[401] \n\nThe word \"robot\" itself was coined by Karel \nČapek in his 1921 play*R.U.R.*, the title \nstanding for \"Rossum's Universal Robots\". \n\nIsaac Asimov introduced the Three Laws of Robotics in many stories, most notably with the \"Multivac\" \nsuper-intelligent computer. Asimov's laws are often brought up during lay discussions of machine \nethics;[402] while almost all artificial intelligence researchers are familiar with Asimov's laws through \npopular culture, they generally consider the laws useless for many reasons, one of which is their \nambiguity.[403] \n\nSeveral works use AI to force us to confront the fundamental question of what makes us human, showing \nus artificial beings that have the ability to feel, and thus to suffer. This appears in Karel Čapek's*R.U.R.*, \nthe films*A.I. Artificial Intelligence*and*Ex Machina*, as well as the novel*Do Androids Dream of Electric*\n*Sheep?*, by Philip K. Dick. Dick considers the idea that our understanding of human subjectivity is altered \nby technology created with artificial intelligence.[404] \n\n**See also**\n\nArtificial intelligence and elections – Use and impact of AI on political elections \nArtificial intelligence content detection – Software to detect AI-generated content \nBehavior selection algorithm – Algorithm that selects actions for intelligent agents \nBusiness process automation – Automation of business processes \nCase-based reasoning – Process of solving new problems based on the solutions of similar \npast problems \nComputational intelligence – Ability of a computer to learn a specific task from data or \nexperimental observation \nDigital immortality – Hypothetical concept of storing a personality in digital form \nEmergent algorithm – Algorithm exhibiting emergent behavior \nFemale gendering of AI technologies – Gender biases in digital technology", + "page_start": 27, + "page_end": 27, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Up to this point, most of AI's funding had gone to projects that used high-level symbols to represent \nmental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt \nthat this approach would be able to imitate all the processes of human cognition, especially perception, \nrobotics, learning and pattern recognition,[335] and began to look into \"sub-symbolic\" approaches.[336] \nRodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that \nmove and survive.[x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete \nand uncertain information by making reasonable guesses rather than precise logic.[86][341] But the most \nimportant development was the revival of \"connectionism\", including neural network research, by \nGeoffrey Hinton and others.[342] In 1990, Yann LeCun successfully showed that convolutional neural \nnetworks can recognize handwritten digits, the first of many successful applications of neural \nnetworks.[343] \n\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal \nmathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" \nfocus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, \neconomics and mathematics).[344] By 2000, solutions developed by AI researchers were being widely \nused, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as \nthe AI effect).[345] However, several academic researchers became concerned that AI was no longer \npursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they \nfounded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded \ninstitutions by the 2010s.[4] \n\nDeep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field.[11] \nFor many specific tasks, other methods were abandoned.[y] Deep learning's success was based on both \nhardware improvements (faster computers,[347] graphics processing units, cloud computing[348]) and \naccess to large amounts of data[349] (including curated datasets,[348] such as ImageNet). Deep learning's \nsuccess led to an enormous increase in interest and funding in AI.[z] The amount of machine learning \nresearch (measured by total publications) increased by 50% in the years 2015–2019.[306] \n\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine \nlearning conferences, publications vastly increased, funding became available, and many researchers re- \nfocussed their careers on these issues. The alignment problem became a serious field of academic \nstudy.[283] \n\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous \ninterest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program \ntaught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was \nreleased in 2020 by OpenAI and is capable of generating high-quality human-like text.[350] ChatGPT, \nlaunched on November 30, 2022, became the fastest-growing consumer software application in history, \ngaining over 100 million users in two months.[351] It marked what is widely regarded as AI's breakout \nyear, bringing it into the public consciousness.[352] These programs, and others, inspired an aggressive AI \nboom, where large companies began investing billions of dollars in AI research. According to AI Impacts, \nabout $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia3.pdf" + }, + { + "text": "FAccT ’21, March 3–10, 2021, Virtual Event, Canada \n\nAdvances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, \n2020. AAAI Press, 8968–8975. https://aaai.org/ojs/index.php/AAAI/article/ \nview/6428 \n\n[150] Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ R Salakhutdinov, \nand Quoc V Le. 2019. Xlnet: Generalized autoregressive pretraining for language \nunderstanding. In Advances in neural information processing systems. 5753–5763. \n[151] Ze Yang, Can Xu, Wei Wu, and Zhoujun Li. 2019. Read, Attend and Comment: \nA Deep Architecture for Automatic News Comment Generation. In Proceed- \nings of the 2019 Conference on Empirical Methods in Natural Language Process- \ning and the 9th International Joint Conference on Natural Language Processing \n(EMNLP-IJCNLP). Association for Computational Linguistics, Hong Kong, China, \n5077–5089. https://doi.org/10.18653/v1/D19-1512 \n\n[152] Meg Young, Lassana Magassa, and Batya Friedman. 2019. Toward Inclusive \nTech Policy Design: A Method for Underrepresented Voices to Strengthen Tech \nPolicy Documents. Ethics and Information Technology (2019), 1–15. \n[153] Ofir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe Wasserblat. 2019. Q8BERT: \n\nQuantized 8Bit BERT. arXiv:1910.06188 [cs.CL] \n\n[154] Nico Zazworka, Rodrigo O. Spínola, Antonio Vetro’, Forrest Shull, and Carolyn \nSeaman. 2013. A Case Study on Effectively Identifying Technical Debt. In \nProceedings of the 17th International Conference on Evaluation and Assessment \nin Software Engineering (Porto de Galinhas, Brazil) (EASE ’13). Association for \nComputing Machinery, New York, NY, USA, 42–47. https://doi.org/10.1145/ \n2460999.2461005 \n\n[155] Rowan Zellers, Yonatan Bisk, Roy Schwartz, and Yejin Choi. 2018. SWAG: \nA Large-Scale Adversarial Dataset for Grounded Commonsense Inference. In \nProceedings of the 2018 Conference on Empirical Methods in Natural Language \nProcessing. Association for Computational Linguistics, Brussels, Belgium, 93–104. \nhttps://doi.org/10.18653/v1/D18-1009 \n\n[156] Haoran Zhang, Amy X Lu, Mohamed Abdalla, Matthew McDermott, and \nMarzyeh Ghassemi. 2020. Hurtful words: quantifying biases in clinical contex- \ntual word embeddings. In Proceedings of the ACM Conference on Health, Inference, \nand Learning. 110–120. \n\n[157] Jieyu Zhao, Tianlu Wang, Mark Yatskar, Ryan Cotterell, Vicente Ordonez, and \nKai-Wei Chang. 2019. Gender Bias in Contextualized Word Embeddings. In \nProceedings of the 2019 Conference of the North American Chapter of the Associ- \nation for Computational Linguistics: Human Language Technologies, Volume 1 \n(Long and Short Papers). Association for Computational Linguistics, Minneapolis, \nMinnesota, 629–634. https://doi.org/10.18653/v1/N19-1064 \n\n[158] Li Zhou, Jianfeng Gao, Di Li, and Heung-Yeung Shum. 2020. The Design and \nImplementation of XiaoIce, an Empathetic Social Chatbot. Computational Lin- \nguistics 46, 1 (March 2020), 53–93. https://doi.org/10.1162/coli_a_00368 \n\nACKNOWLEDGMENTS \nThis paper represents the work of seven authors, but some were \nrequired by their employer to remove their names. The remaining \nlisted authors are extremely grateful to our colleagues for the effort \nand wisdom they contributed to this paper. \n\nIn addition, in drafting and revising this paper, we benefited \nfrom thoughtful comments and discussion from many people: Alex \nHanna, Amandalynne Paullada, Ben Hutchinson, Ben Packer, Bren- \ndan O’Connor, Dan Jurafsky, Ehud Reiter, Emma Strubell, Emily \nDenton, Gina-Anne Levow, Iason Gabriel, Jack Clark, Kristen How- \nell, Lucy Vasserman, Maarten Sap, Mark Díaz, Miles Brundage, Nick \nDoiron, Rob Munro, Roel Dobbe, Samy Bengio, Suchin Gururangan, \nVinodkumar Prabhakaran, William Agnew, William Isaac, and Yejin \nChoi and our anonymous reviewers.", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What would a superintelligence need?", + "target_page": 27, + "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Existential risk**\n\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This \ncould, as physicist Stephen Hawking stated, \"spell the end of the human race\".[265] This scenario has been \ncommon in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\" \n(or \"sentience\" or \"consciousness\") and becomes a malevolent character.[q] These sci-fi scenarios are \nmisleading in several ways. \n\nFirst, AI does not require human-like sentience to be an existential risk. Modern AI programs are given \nspecific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if \none gives*almost any*goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it \n(he used the example of a paperclip factory manager).[267] Stuart Russell gives the example of household \nrobot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you \ncan't fetch the coffee if you're dead.\"[268] In order to be safe for humanity, a superintelligence would have \nto be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\".[269] \n\nSecond, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an \nexistential risk. The essential parts of civilization are not physical. Things like ideologies, law, \ngovernment, money and the economy are built on language; they exist because there are stories that \nbillions of people believe. The current prevalence of misinformation suggests that an AI could use \nlanguage to convince people to believe anything, even to take actions that are destructive.[270] \n\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and \nunconcerned by risk from eventual superintelligent AI.[271] Personalities such as Stephen Hawking, Bill \nGates, and Elon Musk,[272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis \nHassabis, and Sam Altman, have expressed concerns about existential risk from AI. \n\nIn May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak \nout about the risks of AI\" without \"considering how this impacts Google.\"[273] He notably mentioned \nrisks of an AI takeover,[274] and stressed that in order to avoid the worst outcomes, establishing safety \nguidelines will require cooperation among those competing in use of AI.[275] \n\nIn 2023, many leading AI experts endorsed the joint statement that \"Mitigating the risk of extinction from \nAI should be a global priority alongside other societal-scale risks such as pandemics and nuclear \nwar\".[276] \n\nSome other researchers were more optimistic. AI pioneer Jürgen Schmidhuber did not sign the joint \nstatement, emphasising that in 95% of all cases, AI research is about making \"human lives longer and \nhealthier and easier.\"[277] While the tools that are now being used to improve lives can also be used by \nbad actors, \"they can also be used against the bad actors.\"[278][279] Andrew Ng also argued that \"it's a \nmistake to fall for the doomsday hype on AI—and that regulators who do will only benefit vested \ninterests.\"[280] Yann LeCun \"scoffs at his peers' dystopian scenarios of supercharged misinformation and \neven, eventually, human extinction.\"[281] In the early 2010s, experts argued that the risks are too distant in", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Finding a provably correct or optimal solution is intractable for many important problems.[15] Soft \ncomputing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are \ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in \nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with \nneural networks. \n\n**Narrow vs. general AI**\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and \nsuperintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these \nsolutions will lead indirectly to the field's long-term goals.[378][379] General intelligence is difficult to \ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific \nproblems with specific solutions. The sub-field of artificial general intelligence studies this area \nexclusively. \n\n**Machine consciousness, sentience, and mind**\n\nThe philosophy of mind does not know whether a machine can have a mind, consciousness and mental \nstates, in the same sense that human beings do. This issue considers the internal experiences of the \nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because \nit does not affect the goals of the field: to build machines that can solve problems using intelligence. \nRussell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way \nhumans are is not one that we are equipped to take on.\"[380] However, the question has become central to \nthe philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction. \n\n**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] \n\n**Computationalism and functionalism**\n\nComputationalism is the position in the philosophy of mind that the human mind is an information \nprocessing system and that thinking is a form of computing. Computationalism argues that the \nrelationship between mind and body is similar or identical to the relationship between software and \nhardware and thus may be a solution to the mind–body problem. This philosophical position was inspired \nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by \nphilosophers Jerry Fodor and Hilary Putnam.[383] \n\nPhilosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed \ncomputer with the right inputs and outputs would thereby have a mind in exactly the same sense human \nbeings have minds.\"[ac] Searle challenges this claim with his Chinese room argument, which attempts to", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Gibbs, Samuel (27 October 2014). \"Elon Musk: artificial intelligence is our biggest existential \n\nthreat\" (https://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligenc \ne-ai-biggest-existential-threat).*The Guardian*. Archived (https://web.archive.org/web/201510 \n30054330/http://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligen \nce-ai-biggest-existential-threat) from the original on 30 October 2015. Retrieved 30 October \n2015. \n\nGoffrey, Andrew (2008). \"Algorithm\". In Fuller, Matthew (ed.).*Software studies: a lexicon*(http \n\ns://archive.org/details/softwarestudiesl00full_007). Cambridge, Mass.: MIT Press. pp. 15 (htt \nps://archive.org/details/softwarestudiesl00full_007/page/n29)–20. ISBN 978-1-4356-4787-9. \nGoldman, Sharon (14 September 2022). \"10 years later, deep learning 'revolution' rages on, say \nAI pioneers Hinton, LeCun and Li\" (https://venturebeat.com/ai/10-years-on-ai-pioneers-hinto \nn-lecun-li-say-deep-learning-revolution-will-continue).*VentureBeat*. Archived (https://web.arc \nhive.org/web/20241005171338/https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-le \ncun-li-say-deep-learning-revolution-will-continue/) from the original on 5 October 2024. \nRetrieved 8 December 2023. \n\nGood, I. J. (1965),*Speculations Concerning the First Ultraintelligent Machine*(https://exhibits.st \nanford.edu/feigenbaum/catalog/gz727rg3869), archived (https://web.archive.org/web/20230 \n710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869) from the original \non 10 July 2023, retrieved 5 October 2024 \n\nGoodfellow, Ian; Bengio, Yoshua; Courville, Aaron (2016),*Deep Learning*(https://web.archive.or \ng/web/20160416111010/http://www.deeplearningbook.org), MIT Press., archived from the \noriginal (http://www.deeplearningbook.org) on 16 April 2016, retrieved 12 November 2017 \nGoodman, Bryce; Flaxman, Seth (2017). \"EU regulations on algorithmic decision-making and a \n'right to explanation' \".*AI Magazine*.**38**(3): 50. arXiv:1606.08813 (https://arxiv.org/abs/1606. \n08813). doi:10.1609/aimag.v38i3.2741 (https://doi.org/10.1609%2Faimag.v38i3.2741). \nS2CID 7373959 (https://api.semanticscholar.org/CorpusID:7373959). \n\nGovernment Accountability Office (13 September 2022). Consumer Data: Increasing Use Poses \nRisks to Privacy (https://www.gao.gov/products/gao-22-106096).*gao.gov*(Report). Archived \n(https://web.archive.org/web/20240913011410/https://www.gao.gov/products/gao-22-10609 \n6) from the original on 13 September 2024. Retrieved 5 October 2024. \n\nGrant, Nico; Hill, Kashmir (22 May 2023). \"Google's Photo App Still Can't Find Gorillas. And \n\nNeither Can Apple's\" (https://www.nytimes.com/2023/05/22/technology/ai-photo-labels-googl \ne-apple.html).*The New York Times*. Archived (https://web.archive.org/web/2024091415503 \n2/https://www.nytimes.com/2023/05/22/technology/ai-photo-labels-google-apple.html) from \nthe original on 14 September 2024. Retrieved 5 October 2024. \n\nGoswami, Rohan (5 April 2023). \"Here's where the A.I. jobs are\" (https://www.cnbc.com/2023/0 \n4/05/ai-jobs-see-the-state-by-state-data-from-a-stanford-study.html).*CNBC*. Archived (http \ns://web.archive.org/web/20230619015309/https://www.cnbc.com/2023/04/05/ai-jobs-see-the \n-state-by-state-data-from-a-stanford-study.html) from the original on 19 June 2023. \nRetrieved 19 June 2023. \n\nHarari, Yuval Noah (October 2018). \"Why Technology Favors Tyranny\" (https://www.theatlantic. \ncom/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330).*The Atlantic*. \nArchived (https://web.archive.org/web/20210925221449/https://www.theatlantic.com/magazi \nne/archive/2018/10/yuval-noah-harari-technology-tyranny/568330) from the original on 25 \nSeptember 2021. Retrieved 23 September 2021.", + "page_start": 56, + "page_end": 56, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
q. Sometimes called a “ robopocalypse ”[ 299 ]
r. “ Electronic brain ” was the term used by the press around this time. EQTRECT3
s. Darriel Crevier wrote, \" the conterence is genorrally recognized as the official birthdate of the new science.\" 32.4 \" Russell and Nonyig called the conference \" the inception of artificial intelligence :\" 0.55
t. Russell and Nonigs wrote \" for the next 20 years the field would be clominated by these people and their students............................
u. Russell and Norvig wrote, “ It was astonishing wherever a computer did anything kind of smarteah ”...
v. The programs described are Arthur Samuel ' s checkers program for the IBM 70L Daniel Bobrow ' s STUDENT, Newell and Simon ' s Logic Theorica and Terry Winograrae ' s SHBDL1.
w. Russell and Nonvig write. “ in almost all cases, these early systems failed on more difficult problems ”[ 33 ]
x. Embodied approaches to ARTIT were championed by Hans Morave2 / 2RT and Rodney Brooks ( SSSIII ) and went by many names : Nouvelle ALTDevelopmental robotics [ 54 ]
y. Matters Worge arrate in The Adartic “ Wherenes for decaders, computer - science fields such as natural - target processing, compader vision, and robotics used externely different methods, now they all use a programming method calleie
z. Jack Clark wrote in Bloomberg : “ After a half - decade of quiet breakthroughts in artificial infeliogence, 2015 has been a landmark year. Computers are smater and learning baber than ever ”, and noted that the number of software projecte
aa. Nils Nilsson wrote in 256S : “ Simply put, there is wide disagreement in the field about what AI is all about 1999
ab. Dankei Crevier wrote that \" time has proven the accuracy and perceptiveness of some of Dreyfus ' s comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\"[ 7.9 ]
ac. Search presented thickefolistion of “ citrong all ” in 12090 EPH Toxaries ’ original fromtolation was “ The appropriately programmed computer really to a mind, in the sense that computers given the right programmes can be let - being an
", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia3.pdf" + }, + { + "text": "that runs inputs through biologically inspired artificial neural networks for all of these types of \nlearning.[48] \n\nComputational learning theory can assess learners by computational complexity, by sample complexity \n(how much data is required), or by other notions of optimization.[49] \n\n**Natural language processing**\nNatural language processing (NLP)[50] allows programs to read, write and communicate in human \nlanguages such as English. Specific problems include speech recognition, speech synthesis, machine \ntranslation, information extraction, information retrieval and question answering.[51] \n\nEarly work, based on Noam Chomsky's generative grammar and semantic networks, had difficulty with \nword-sense disambiguation[f] unless restricted to small domains called \"micro-worlds\" (due to the \ncommon sense knowledge problem[29]). Margaret Masterman believed that it was meaning and not \ngrammar that was the key to understanding languages, and that thesauri and not dictionaries should be the \nbasis of computational language structure. \n\nModern deep learning techniques for NLP include word embedding (representing words, typically as \nvectors encoding their meaning),[52] transformers (a deep learning architecture using an attention \nmechanism),[53] and others.[54] In 2019, generative pre-trained transformer (or \"GPT\") language models \nbegan to generate coherent text,[55][56] and by 2023, these models were able to get human-level scores on \nthe bar exam, SAT test, GRE test, and many other real-world applications.[57] \n\n**Perception**\n\nMachine perception is the ability to use input from sensors (such as cameras, microphones, wireless \nsignals, active lidar, sonar, radar, and tactile sensors) to deduce aspects of the world. Computer vision is \nthe ability to analyze visual input.[58] \n\nincludes speech recognition,[59] \nThe field \nrecognition,[61]object tracking,[62] and robotic perception.[63] \n\nimage classification,[60] facial recognition, object \n\n\n\n**Social intelligence**\n\nAffective computing is a field that comprises systems that \nrecognize, interpret, process, or simulate human feeling, emotion, \nand mood.[65] For example, some virtual assistants are \nto banter \nto speak conversationally or even \nprogrammed \nhumorously; it makes them appear more sensitive to the emotional \ndynamics of human interaction, or to otherwise facilitate human– \ncomputer interaction. \n\nHowever, this tends to give naïve users an unrealistic conception \nof the intelligence of existing computer agents.[66] Moderate \nsuccesses related to affective computing include textual sentiment", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
g - machines - the - search - for - antificial - intelligence ), Destillations. Vol. 2, no. 2, pp. 14 – 21. Activied from the original ( https :// www. sciencehystory. org / distillations / magazinethhinking - machines - the - search - first - in
Robitzoki, Dan ( 5 : Eegraember 2012b ), “ Five experts share what scares them the most about Ai ” ( fibro.: Raurums consistical - iteliapence - experts feasiang ). Actived ( fittps ; Fields and hives or givelocal collaboration, contractiol
Rose, Stever ( 12 auly 2023 ). “ Al Utopia or dystopiat ”. The Guardian Weekly, pp. 42 – 43.
Russell, Stuart ( 2013 ), Human Compasible : Artificial Intellipence and the Problem of Control. United Studen : Vilong 1999 - 1 - 5 - 5 - 5295 - 5961 - 3 DUL1 L105354 - 532 [ Mps :// search. month. a. l. ongoits / 13894322 ]
Salmana, Mctaxe ( LD4 Aquest 233.1 “ Stepphere Heaving, EDr1Adult, and BEBCades Matral Attibual Interlappince ” ( Hapu / Asticular Trigus / Astractural GST / 2012 / 2002 / 2002 / 2002 / 2009 / 2009 / 2010 / 2008 / 2009 / 1008 / 800 / gets / 1000 / gen
Sample : lan ( 13 howembr 2117 ): Computer says networky making Asia ( accountable and transparent is crucial *) these class therapian conclusions / RTT / Tron / Efficiompate - up - no why raking - as loss be accountable and managem in countabi
Rothman. Devinis ( 7 Drotobes 7070 ): “ Englisho13 ( MEF, Funjlanations and the Mathernation Behind I ” [ Mipos. Shewix codemotion comfronagazinesia - millitries - englanable - eji ). Codemotion Anchieved ( Mitracs / levels and / orgivedo
Scaesellai, Brian ( ZXG ), “ Theory of mind for a humanoid robot ”. Autonomous Robots 12 ( 1 ) 1.13 – 24 – 24 doi : 12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.13.12.18.18.18.18.16.13.10.13.10.29.29.49.9, 9.9, 9.9, 9.9, 9.9, 9.1
Schmittudes, J, DDSST These Learning in Hearand Networks : Jo Cherviewa : Neurol Networks. KL in EN - 2.7, eY, BASA 7F6S9 ( Mgs : 0.49.0. 93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.06 - 0.06 -
Schmidhuber, Jirgen ( DDZ2 ). “ Arrostated History of Modern AI and Despo Learning ” ( Ithtacs // oeco lesion Is abia, chi - sienzen )). Archived ( Ithps : Ulweb archives organish / 2000712724449000 ( Ethnologies ) e. general ( Ethnologial or
Sexarker, John ( 13500 ), \" Mind, Brains and Programme \" ( Meta -),\"( Mata -) cogarettes, urganT,\" DDD20.1, ES12.52, S23.48, pfl ) ( PFP2F, ↑ Masional and Brain Sismonyl, 37.47.47.34.7, 34.17.48.15.127.19.151.127.1921.282.55100017,
Seeke, John 15090, Mind Janquage and society ( https :// attps :// archieve. grobeskel / chrondlanguaaenor / cl3Deter ); Netw Y009 ; Basks. GBV : F79 - 3 - 4955 = 452 ; 2, OCLC 22287 ( fttps ); Test ); Therefritation : clinics : CS35 ( fetally ); Ac
", + "page_start": 62, + "page_end": 62, + "source_file": "wikipedia3.pdf" + }, + { + "text": "4.11 Primitive and Defined Classes (Necessary and Sufficient Axioms) \nAll of the classes that we have created so far have only used necessary axioms to describe them. \nNecessary axioms can be read as,*If something is a member of this class then it is necessary to fulfil these*\n*conditions*. With necessary axioms alone, we*cannot*say that:*If something fulfils these conditions then it*\n*must be a member of this class*. \n\nLet’s illustrate this with an example. We will create a subclass of Pizza called CheesyPizza, which \nwill be a Pizza that has at least one kind of CheeseTopping. \n\n**Exercise 20: Create the CheesyPizza class**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select Pizza in the class hierarchy on the Classes tab. \n\n2. Select the Add Subclass icon (see figure 4.4). Name the new subclass CheesyPizza. \n\n3. Make sure CheesyPizza is selected. Click on the Add icon (+) next to the SubClass Of field in the \nDescription view. \n\n4. Select the Class expression editor tab. Type in the new axiom: hasTopping some CheeseTopping. \nRemember you can use to auto-complete each word in the axiom, e.g., type hasT and \nthen to auto-complete the rest. If you haven’t typed enough for Protégé to \nunambiguously choose one entity or Description Logic keyword you will be prompted with a menu of \npossible completions. Click OK to enter the new restriction axiom.", + "page_start": 38, + "page_end": 38, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] \n\n**Superintelligence and the singularity**\n\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the \nbrightest and most gifted human mind.[379] If research into artificial general intelligence produced \nsufficiently intelligent software, it might be able to reprogram and improve itself. The improved software \nwould be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and \nVernor Vinge called a \"singularity\".[395] \n\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped \ncurve, slowing when they reach the physical limits of what the technology can do.[396] \n\n**Transhumanism**\n\nRobot designer Hans Moravec, cyberneticist Kevin Warwick and inventor Ray Kurzweil have predicted \nthat humans and machines may merge in the future into cyborgs that are more capable and powerful than \neither. This idea, called transhumanism, has roots in the writings of Aldous Huxley and Robert \nEttinger.[397]", + "page_start": 26, + "page_end": 26, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "Where can I find the Inspect tool to evaluate the safety of our models?", + "target_page": 21, + "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5x2xWorking Distance ( mm )
1561024430WF10 ×/ 20mm
7x - 45x3.5x - 2.5x5.3x - 33.8x10.5 × 167.5x14 ×- 90xField of View Objective Dia. ( mm )
28.6 – 4.457.2 - 8.838.1 - 5.919.0 – 2.914.3 – 2.2WF12.5x / 18mm
8.8 ×– 56x4.4 × 2886.6 ×– 42x13.2 × L84x17.6 × LLLField of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15 ×/ 16mm
10.5 × 67.5x5.3x - 33.8x7.9 ×– 58.6x15.7 × L101x21 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.230.5 - 4.815.3 – 2411.5 – 1.8WF20 ×/ 12mm
14 ×- 90 ×7x - 45 ×10.5 × 67.5x21 ×- 135 ×28 ×- 180 >Field of View Objective Dia. ( mm )
17.0 – 2.734.0 - 5.422.7 - 3.611.3 – 1.88.5 - 1.4WF25x / 9mm
17.5 × 112.5 :8.8x - 56.3x13 ×- 84.4 ×26.3 × 1169 ×35x - 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 – 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**\n\n\n \n \n \n \n [html]Objective Zoom ScaleAccessory Large Objective-95Total MagnificationTotal MagnificationTotal MagnificationTotal MagnificationTotal Magnification\n
0.5x0.75x1.5 ×2 ×Working Distance ( mm )
1561024430WF10x / 20mm
7 ×- 45 ×3.5 ×- 22.5x5.3 ×- 33.8 ×0.5 ×- 57.5x14 ×- 90 ×Field of View Objective Dia. ( mm )
28.6 - 4.457.2 - 8.838.1 - 5.919.0 - 2.914.3 - 2.2WF12.5 ×/ 18mm
8.8 ×- 56x4.4x - 28x6.6x - 42x8.3. 2x - 84x17.6 × 112 ×Field of View Objective Dia. ( mm )
25.7 - 4.051.4 - 834.3 - 5.317.1 - 2.712.9 - 2.0WF15x / 16mm
10.5 × d5.3 ×- 33.8x7.9 ×– 58.6x5.7 × 101821 ×- 135xField of View Objective Dia. ( mm )
22.9 - 3.645.8 - 7.530.5 - 4.815.3 - 2411.5 - 1.8WF20x / 12mm
14 ×- 90 ×7 ×- 45 ×10.5 × 67.5 ×21 ×- 135x28 ×- 180 ×Field of View Objective Dia. ( mm )
17.0 - 234.0 - 5.422.7 – 3.611.3 - 1.88.5 - 1.4WF25x / 9mm
17.5 × 4112.538.8 ×- 56.3 ×13 ×- 84.4 ×16.3 × 169x35 ×- 225xField of View Objective Dia. ( mm )
12.9 - 2.025.8 - 4.017.2 - 2.78.6 - 1.36.5 - 1.0
\n\n**SELECTING THE ILLUMINATION**\n\n**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Figure 13-34 Messages in the event log \n\n2. Select**Show All**→**Recommended Actions**to display the most important events to be \nresolved (see Figure 13-35). The Recommended Actions tab shows the highest priority \nmaintenance procedure that must be run. Use the troubleshooting wizard so that IBM \nStorwize V7000 system can determine the proper order of maintenance procedures. \n\nFigure 13-35 Recommended Actions \n\nIn this example, the Array MDisk is not protected by sufficient spares and is listed (service \nerror code 1690). Click**Run Fix**. At any time and from any GUI window, you can directly go \nto this menu by clicking the**Status Alerts**icon at the top of the GUI (see Figure 13-36 on \npage 705).", + "page_start": 725, + "page_end": 725, + "source_file": "sg247938.pdf" + }, + { + "text": "Print ISBN 978-92-9479-934-0 doi: 10.2802/26873 \n\nPDF ISBN 978-92-9479-935-7 doi: 10.2802/56459 \n\n© European Agency for Safety and Health at Work, 2023 \n\nReproduction is authorised provided the source is acknowledged. \n\nFor any use or reproduction of photos or other material that is not under the copyright of the European Agency for Safety and \nHealth at Work, permission must be sought directly from the copyright holders. \n\nThe photographs used in this publication illustrate a range of work activities. They do not necessarily show good practices or \ncompliance with legislative requirements. \n\nFor one-click access to websites and references please consult the online version of this publication \nhttps://osha.europa.eu/en/publications/occupational-safety-and-health-europe-state-and-trends-2023", + "page_start": 1, + "page_end": 1, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "C Supplementary materials for models \n\nWe present in this section the model characteristics \nwe collected for the 46 evaluated models. \n\nFor evaluating prompt-based models such as \nintfloat/e5-mistral-instruct-7b, we provide the \nprompts we used in Table 8. \n\nD Evaluation results \n\nThis section presents the results obtained for each \nmodel on each task. To be relevant, we used the \nsame metrics as in MTEB, which varies from one \ntype of task to another:", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv4.pdf" + }, + { + "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11228\n
Model AY11232NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x obj.)]
110 × Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 ea. spare )12.10W Halogen Lamp 12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**SPECIFICATIONS**\n\n\n\n\n\n\n \n \n \n \n [html]Model AY11230\n
Model AY11234NameQtyName
QtyBinocular Body ( incl. 2x, 4x obj.)]1Binocular Body ( incl. 2x, 4x ob ).)
110x Wide Field Eyepiece210x Wide Field Eyepiece
2Eyeshade2Eyeshade
210.10W Halogen Lamp12.10W Halogen Lamp w / cup1 earnings12.10W Halogen Lamp12.10W Halogen Lamp w / cup
1 ea. spare )Fuse 2A ( spare )1Fuse 2A ( spare )
1Lens Cleaning Tissue1Lens Cleaning Tissue
1Dust Cover1Dust Cover
1Black / White Working Stage1Specifications
1Specifications1Packing Slip
1Packing Slip1Quality Inspection Certificate
1Quality Inspection Certificate
\n\n**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
\n\n**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "FE!4 MODEL AT VARIOUS \nMACH NUMBERS \na-O0 pee \n\n\n\n\n\n\n\n\n\nM*1.2", + "page_start": 238, + "page_end": 238, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
OperationAge in materials or v
pr, the product must
Table1.
Theper Return Mercha
theCall BARSKA at ( 90
PatientsTable
AllThere intervention
Speciesof the owner. tool
\n\n**MICROSCOPE**\n**USER MANUAL**\n\n\n\n\n\n\n\n**MODEL AY11238**\n40X,100X,400X \nCOMPOUND MONOCULAR **MODEL AY11240**\n40X,100X,400X \nCOMPOUND MONOCULAR **MODEL AY11228**\n20X,40X \nSTEREO BINOCULAR \n\nSome states do not allow the exclusion or limitation of incidental or consequential damages or limitation on how \nlong an implied warranty lasts, so the above limitations and exclusions may not apply to you. \n\nThis warranty gives you specific legal rights, and you may also have other rights which vary from state to state. \n\nBARSKA reserves the right to modify or discontinue, without prior notice to you, any model or style microscope. \n\nIf warranty problems arise, or if you need assistance in using your microscope contact: \n\nBARSKA \nCustomer Service Department \nTel. (909) 445-8168 \nFax. (909) 445-8169 \ne-mail: service@barska.com \n\nMonday-Friday 8:30AM-5:30PM PST \n\nNOTE: This warranty is valid to U.S.A. customers who have purchased this product from an authorized BARSKA \ndealer in the U.S.A. \n\n\n\n**MODEL AY11230**\n20X,40X \nSTEREO TRINOCULAR \n\n\n\n**MODEL AY11232**\n7X-45X \nSTEREO ZOOM", + "page_start": 0, + "page_end": 0, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "FATIGUE CRACKS IN STRUCTURAL SAMPLE \nATTACHMENT FITTING FATiGUE FAILURES \n\nFigure 5.7. Examples of Fatigue Failures", + "page_start": 363, + "page_end": 363, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", + "target_page": 9, + "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime \n\nmay be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. \n\n However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have \n\n1 At the time of writing, data was unavailable for the period after November 2013. \n2 \n3 787 if adjusted for the missing month. \nIt is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. \n\nNew opiate and crack-cocaine users: characteristics and trends", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. \n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the \narrestee data showed that a proportion of these are likely to offend over a long period of time. \nBut also, there was some evidence of a shift to older initiates, which may require a slightly \ndifferent treatment approach.", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "initiated use at an older age. Currently it is not possible to determine whether this is a \nreporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users. \n\n The report has several important policy implications. Even though numbers of new \ninitiates involved with crime have dropped to the low thousands, putting downward \npressure on crime, identification and early diversion to treatment remains paramount. \nFrontier Economics have estimated that the average4 lifetime crime cost of an injecting \ndrug user is £445,000, so the potential for social harm – even from a small number of \nindividuals – remains large and potentially long-lasting. This means local areas need to \nmanage both the (relatively large) stock of current users, and the (much smaller) flow of \nnew initiates, whose treatment needs may be different. There is no evidence of any new \nepidemic in this country, but given the impact of the epidemic of the 80s and early 90s on \ncrime, ongoing monitoring of recent trends is required to spot early signs of any emerging \nproblems. \n\n**Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use \nin driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates \nexist of the total number of opiate/crack-cocaine users (OCUs) in England (Hay et al., 2013), \nthere are no estimates for the number of new OCUs each year (throughout this paper the \nnumber of new OCUs is also referred to as**‘incidence’**). This is important for three main \nreasons. \n\ni)**Stock and flows:**Simply knowing the stock of OCUs tells us nothing about the flows in \nand out – i.e. if the stock were constant each year that could mean that no one starts \nusing these drugs and no one quits or it could mean all existing users quit but that they \nare wholly replaced by new users, or any similar scenario in between. Clearly the policy \nresponse would need to be quite different for each of these cases, so knowing the true \nsituation is important. \n\nii)**Early-warning system:**Research by the Home Office and others has shown that there \nis generally a lag between the start of a heroin/crack epidemic and the point at which it \nbecomes visible on administrative datasets. Closing this gap is important for policy, and \npart of the reason for its existence is the lack of incidence estimates. Evidence also \nsuggests epidemics spread from area to area, so it is important to monitor local as well \nas national trends. \n\niii)**The social harm that can arise:**Though research suggests that not all OCUs resort to \n\nacquisitive crime to help finance their drug use, numerous studies show that a \nproportion consistently do and these individuals can be extremely prolific offenders \n(Morgan, 2014). One study by Frontier Economics estimated that the average lifetime \ncost to society of an injecting drug user was £445,000 from crime alone. Hence \nanalysing and identifying new OCUs is a policy priority (Frontier Economics, 2010). \n\nThere are two inter-connected reasons why regular national incidence estimates have not been \nattempted before5. The first is that data on this issue are sparse given the ‘hidden’ nature of \nopiate/crack markets and that date of first use is not something that gets recorded at the \nmoment it actually occurs. The second reason, which flows from the first, is that current \n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few \n\nindividuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to \nacquisitive crime at all (Morgan, 2014). \n\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at \nvarious different levels of geography, see for example: De Angelis et al., 2004, Millar et al., 2001 and Hickman et al., 2001.", + "page_start": 3, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "New opiate and crack-cocaine users: characteristics and trends 4", + "page_start": 3, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", + "page_start": 26, + "page_end": 26, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "involved opiate/crack users will quit (or die) before being arrested and tested; 3) DIP’s geographical coverage is not 100 per \ncent; 4) Some may evade arrest through the entire series; and 5) Evidence suggests OCUs cycle in and out of periods of \nregular use and offending rather than offend at a high rate continuously. But clearly the gradual capture of the pre-existing \npopulation creates a big enough bias such that we cannot read the figures for new positive testers simply as an incidence \ntrend for crime-involved opiate/crack users. \n\nNew opiate and crack-cocaine users: characteristics and trends 17", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This section uses treatment data from the National Database Treatment Monitoring System \n(NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the \nnumbers of people presenting to services with problem drug misuse and information about the \ndrug treatment they receive. All drug treatment agencies in England provide a basic level of \ninformation to the NDTMS on their activities each month. The data for this report included all \nunique individuals presenting to treatment with opiates or crack-cocaine listed as their primary \ndrug between 2005 and 2014. All individuals whose age of first use was listed as below ten or \nbefore 2005 were then excluded. Excluding individuals who started using opiates/crack before \n2005 resulted in a large number of records being left out, due to the fact that the majority of the \ntreatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack \nuse surged in the UK. However, this exclusion is necessary for the incidence methodology, as \nexplained later in this section. The remaining dataset included 52,829 individuals, as shown in \nTable 10. \n\n**Table 10: Descriptive statistics from the NDTMS data.**\n\n\n \n \n \n \n [html]\n
Heason for exclusionNumber of individuals excluded
Total number of individuals analysedInitial sample prior to exclusion0
243.588No age at first use recorded or age was below 10 or higher than age at first treatment443
243.145Year of first use before 2005190.316
52.829Percentage of total sample initiating 2005 – 14n / a
21.7 %
\n\nThe majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 8: Comparison of new DIP and treatment cohorts, by age**\n\n\n\nThe DIP cohort has a far older age profile even than the 2014 cohort of treatment initiates, who \nthemselves have a far older age-of-initiation profile than previous treatment cohorts. As such, it \nseems highly unlikely that all, or even most, of the 4,281 positive testers in 2013 are new \ninitiates. \n\nOf course, even if just the small number of DIP testers (78716) who were aged under 25 in 2013 \nwere considered to be new initiates, this would still need to be multiplied up by three factors to \nprovide an estimate for total new initiates: i) the non-arrest rate (to account for the fact that only \na proportion of crime-involved initiates will get arrested in a given year); ii) the fact that DIP’s \ncoverage (in terms of age, geography and PNC-referenced individuals) is not 100 per cent; iii) \nthe likelihood that up to half of all new initiates will not be involved with crime at all. As an \nillustration, multiplying up 787 by these factors produces a figure close to 10,000.17 \n\nThese calculations are speculative and based on a number of assumptions. They are intended \nas a sense-check on the results for the next section. The fragility of the modelling should not \ndetract from the simple fact that the absolute number of new positive testers in 2013 is low \nrelative to the estimated size of the total population. This alone suggests that numbers of new \nusers in 2013 is markedly lower than in previous years. \n\n16 The figure in Table 8 is 721, but adjusting for the missing month of data this becomes 787. \n17 Assuming an arrest rate of 17% (see appendix), and that 50% of OCUs do not commit acquisitive crime (Gossop et al., \n2003) and the coverage figures shown in the appendix. \n\nNew opiate and crack-cocaine users: characteristics and trends 21", + "page_start": 20, + "page_end": 20, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005**\n**and 2013, by age of individual at first presentation.**\n\n\n\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableNo. of and how parameters
", + "page_start": 28, + "page_end": 28, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", + "target_page": 22, + "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "This section uses treatment data from the National Database Treatment Monitoring System \n(NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the \nnumbers of people presenting to services with problem drug misuse and information about the \ndrug treatment they receive. All drug treatment agencies in England provide a basic level of \ninformation to the NDTMS on their activities each month. The data for this report included all \nunique individuals presenting to treatment with opiates or crack-cocaine listed as their primary \ndrug between 2005 and 2014. All individuals whose age of first use was listed as below ten or \nbefore 2005 were then excluded. Excluding individuals who started using opiates/crack before \n2005 resulted in a large number of records being left out, due to the fact that the majority of the \ntreatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack \nuse surged in the UK. However, this exclusion is necessary for the incidence methodology, as \nexplained later in this section. The remaining dataset included 52,829 individuals, as shown in \nTable 10. \n\n**Table 10: Descriptive statistics from the NDTMS data.**\n\n\n \n \n \n \n [html]\n
Heason for exclusionNumber of individuals excluded
Total number of individuals analysedInitial sample prior to exclusion0
243.588No age at first use recorded or age was below 10 or higher than age at first treatment443
243.145Year of first use before 2005190.316
52.829Percentage of total sample initiating 2005 – 14n / a
21.7 %
\n\nThe majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime \n\nmay be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. \n\n However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have \n\n1 At the time of writing, data was unavailable for the period after November 2013. \n2 \n3 787 if adjusted for the missing month. \nIt is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. \n\nNew opiate and crack-cocaine users: characteristics and trends", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", + "page_start": 26, + "page_end": 26, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. \n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the \narrestee data showed that a proportion of these are likely to offend over a long period of time. \nBut also, there was some evidence of a shift to older initiates, which may require a slightly \ndifferent treatment approach.", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "initiated use at an older age. Currently it is not possible to determine whether this is a \nreporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users. \n\n The report has several important policy implications. Even though numbers of new \ninitiates involved with crime have dropped to the low thousands, putting downward \npressure on crime, identification and early diversion to treatment remains paramount. \nFrontier Economics have estimated that the average4 lifetime crime cost of an injecting \ndrug user is £445,000, so the potential for social harm – even from a small number of \nindividuals – remains large and potentially long-lasting. This means local areas need to \nmanage both the (relatively large) stock of current users, and the (much smaller) flow of \nnew initiates, whose treatment needs may be different. There is no evidence of any new \nepidemic in this country, but given the impact of the epidemic of the 80s and early 90s on \ncrime, ongoing monitoring of recent trends is required to spot early signs of any emerging \nproblems. \n\n**Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use \nin driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates \nexist of the total number of opiate/crack-cocaine users (OCUs) in England (Hay et al., 2013), \nthere are no estimates for the number of new OCUs each year (throughout this paper the \nnumber of new OCUs is also referred to as**‘incidence’**). This is important for three main \nreasons. \n\ni)**Stock and flows:**Simply knowing the stock of OCUs tells us nothing about the flows in \nand out – i.e. if the stock were constant each year that could mean that no one starts \nusing these drugs and no one quits or it could mean all existing users quit but that they \nare wholly replaced by new users, or any similar scenario in between. Clearly the policy \nresponse would need to be quite different for each of these cases, so knowing the true \nsituation is important. \n\nii)**Early-warning system:**Research by the Home Office and others has shown that there \nis generally a lag between the start of a heroin/crack epidemic and the point at which it \nbecomes visible on administrative datasets. Closing this gap is important for policy, and \npart of the reason for its existence is the lack of incidence estimates. Evidence also \nsuggests epidemics spread from area to area, so it is important to monitor local as well \nas national trends. \n\niii)**The social harm that can arise:**Though research suggests that not all OCUs resort to \n\nacquisitive crime to help finance their drug use, numerous studies show that a \nproportion consistently do and these individuals can be extremely prolific offenders \n(Morgan, 2014). One study by Frontier Economics estimated that the average lifetime \ncost to society of an injecting drug user was £445,000 from crime alone. Hence \nanalysing and identifying new OCUs is a policy priority (Frontier Economics, 2010). \n\nThere are two inter-connected reasons why regular national incidence estimates have not been \nattempted before5. The first is that data on this issue are sparse given the ‘hidden’ nature of \nopiate/crack markets and that date of first use is not something that gets recorded at the \nmoment it actually occurs. The second reason, which flows from the first, is that current \n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few \n\nindividuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to \nacquisitive crime at all (Morgan, 2014). \n\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at \nvarious different levels of geography, see for example: De Angelis et al., 2004, Millar et al., 2001 and Hickman et al., 2001.", + "page_start": 3, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "methods for calculating incidence are complicated and imperfect. It should be acknowledged in \nadvance that this paper does not fully resolve these issues. It is merely intended as a first step, \nto obtain workable estimates upon which to base policy until more sophisticated methods are \ndeveloped. That said, every effort is made in this analysis to sense-check the results against \nother available datasets. The datasets used and the structure of the paper is as follows. \n\ni)**Drug Interventions Programme (DIP) data.**In part one, we produce general \n\ndescriptive statistics from these data, which capture individuals who test positive for \nopiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of \nthese data over time, we draw only broad conclusions, some of which act as a sense- \ncheck for the main results from part two. \n\nii)**Data on presentations to treatment from the National Drug Treatment Monitoring**\n**System (NDTMS).**In part two, we use two models based on previous research papers \nto calculate OCU incidence at the national level between 2005 and 2013. Most of the \nmain conclusions come from this section.", + "page_start": 4, + "page_end": 4, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "cocaine. From this information it is possible to create a distribution, for all presentations, of the \nlag-time between initiation and their first presentation at treatment. This might show – for \nexample – that only ten per cent of all individuals presenting to treatment do so in the first year \nof use, but that 25 per cent present within two years, and so on. This means that for each year, \nwe can estimate the number of individuals who have begun an opiate-crack career but who \nhave yet to come to treatment. Adding these to the numbers who began in that year and have \ncome to treatment gives our total incidence estimate for each year. \n\nThe first model uses NDTMS data for the cohort starting use in 2005 (n=8,960), the lag-time \ndistribution for those initiating use in 2005 and presenting to treatment between 2005 and \n201418 is shown below. \n\n**Table 11: Time-to-treatment distribution for those initiating use in 2005 and presenting to**\n**treatment between 2005 and 2014.19**\n\n\n \n \n \n \n [html]\n
Lag time to treatment ( years )0 - 11 - 22 - 33 - 44 - 55 - 66 - 77 - 88 - 99 - 10
Percentage15 %17 %17 %14 %10 %9 %6 %5 %4 %4 %
Cumulative percentage15 %31 %49 %62 %73 %82 %88 %92 %96 %100 %
\n\nTable 11 shows that 15 per cent of the individuals who started use in 2005 and had presented \nfor treatment by 2014, presented within one year of initiation. A further 17 per cent presented \nbetween one and two years after initiation, prior to coming to treatment, meaning that overall 31 \nper cent of the sample said they came to treatment within two years of first using opiates/crack. \n(The fact this is not 32% is simply due to rounding). \n\nAs a basis for the total lag-to-treatment distribution, the main limitation with the above analysis \nis that it assumes all individuals coming to treatment do so within ten years. Examining data \nfrom earlier cohorts suggests this is inaccurate, as a small proportion of OCUs will continue to \nuse these drugs for a long time, sometimes two decades or more, before seeking treatment, \nand some never will. However, we cannot use an earlier cohort for the distribution because this \nis equivalent to using out-of-date data. The average lag-to-treatment is likely to have reduced \nover time given the expansion of treatment places and the influence of DIP. Using old data will \nmiss this and bias the estimates. Even using the 2005 cohort’s distribution contains the \nassumption that the time-to-treatment lag has not altered significantly between 2005 and \n2013/14. So, to try and obtain the most accurate model, we used the figures from the 2005 \ncohort for the first ten years, as above, on the basis that this covers the majority of individuals \nand for that we want the most up-to-date data possible whilst maintaining a long enough time \nperiod. We then index the trend at that point to an older cohort, and use data from that cohort to \nmodel the ‘tail’ of the distribution – i.e. those who take longer than ten years to reach \ntreatment.20 The result is a 20-year lag-to-treatment distribution, shown in Table 12 below. \n\n18 Data for 2014 was available until October 2014. This was converted to annual figures by multiplying up by 1.2 to account for \nthe missing months in a linear fashion.", + "page_start": 22, + "page_end": 22, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "18 Data for 2014 was available until October 2014. This was converted to annual figures by multiplying up by 1.2 to account for \nthe missing months in a linear fashion. \n\n19 The percentages from this table can be calculated from the numbers in Table 13. \n20 In reality there is always a trade-off in this methodology between the up-to-dateness of the cohort used to measure the lag- \nto-treatment and the number of years of lag measured, i.e. we could use a more recent cohort, say 2008. But that would \nmean excluding all those who take longer than seven years to come to treatment, an even larger proportion. We are \nindebted to Tim Millar for providing the dataset used to model the ‘tail’ of the distribution. It contained a longer time series of \n\nNew opiate and crack-cocaine users: characteristics and trends 23", + "page_start": 22, + "page_end": 22, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "cocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the \nfact that DIP ceased to be a nationally funded programme in April 2013. \n\nThese data do show, however, that from 2006 onwards, between a third and half of all \nacquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those \ntests (depending on the year) resulted in a positive result for opiates-only or for both opiates and \ncocaine (hereafter labelled `positive-for-both’). \n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that \nthe primary group of interest in this report are opiate and crack-cocaine users. To capture this \ngroup, cocaine-only tests must be excluded because DIP tests cannot distinguish between \npowder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous \nevidence has demonstrated that while there is much overlap between heroin and crack-cocaine \ncohorts (i.e. many of those who use heroin also use crack-cocaine), powder-cocaine users have \na quite different profile and are far less likely to be involved with acquisitive crime. Excluding the \ncocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who \nare not also using opiates or crack), but it also means we may miss some crack-cocaine-only \nusers, hence the figures may under-estimate the true population of OCUs slightly. \n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). \n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004–2013 (all positive tests including repeats \nby the same individual) \n\n\n \n \n \n \n [html]AgeYear of birth\n
Number of tests364.537Number of tests364.537
Mean32Mean1977
Median31Median1977
Mode28Mode1979
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born", + "page_start": 8, + "page_end": 8, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", + "target_page": 18, + "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. \n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s.", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "cocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the \nfact that DIP ceased to be a nationally funded programme in April 2013. \n\nThese data do show, however, that from 2006 onwards, between a third and half of all \nacquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those \ntests (depending on the year) resulted in a positive result for opiates-only or for both opiates and \ncocaine (hereafter labelled `positive-for-both’). \n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that \nthe primary group of interest in this report are opiate and crack-cocaine users. To capture this \ngroup, cocaine-only tests must be excluded because DIP tests cannot distinguish between \npowder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous \nevidence has demonstrated that while there is much overlap between heroin and crack-cocaine \ncohorts (i.e. many of those who use heroin also use crack-cocaine), powder-cocaine users have \na quite different profile and are far less likely to be involved with acquisitive crime. Excluding the \ncocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who \nare not also using opiates or crack), but it also means we may miss some crack-cocaine-only \nusers, hence the figures may under-estimate the true population of OCUs slightly. \n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). \n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004–2013 (all positive tests including repeats \nby the same individual) \n\n\n \n \n \n \n [html]AgeYear of birth\n
Number of tests364.537Number of tests364.537
Mean32Mean1977
Median31Median1977
Mode28Mode1979
Minimum18Minimum1960
Maximum53Maximum1995
\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born", + "page_start": 8, + "page_end": 8, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime \n\nmay be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. \n\n However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have \n\n1 At the time of writing, data was unavailable for the period after November 2013. \n2 \n3 787 if adjusted for the missing month. \nIt is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. \n\nNew opiate and crack-cocaine users: characteristics and trends", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. \n\nWe also looked at trends at the local level, given that previous epidemics have started in very \nspecific areas and have taken several years to spread nationally. This means that the start of an \nepidemic can be hidden in the national data because it has not reached enough areas to \nregister. \n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment \nbefore. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously. \n\nNew opiate and crack-cocaine users: characteristics and trends 27", + "page_start": 26, + "page_end": 26, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "population there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this \npopulation) accounted for just over ten per cent of all positive tests (30,471 tests in total). These \nindividuals provided between 16 and 57 positive tests over the period 2004 to 2013. \n\n**Figure 4: Proportion of positive tests by number of times an individual tested positive.**", + "page_start": 12, + "page_end": 12, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "cent (25,000/150,000).14 It is then possible to model how many of the original population of \ncrime-involved OCUs would be likely to test positive in any given year. For example, if there \nwere 150,000 crime-involved OCUs in 2008, the chances of one of that group having a first test \nin 2013, providing they remained a crime-involved OCU throughout the period 2004–2013 is \ngiven by: \n\n(1*–*probability of arrest)^8 = chance of not getting caught between 2004 and 2012 \n\nMultiplied by: \n\nProbability that they do get arrested in 2013 \n\nThis can then be calculated for a range of plausible values for the initial number of OCUs, and \nhence range of arrest rates, to give a range of plausible values for the number of new testers in \n2013 who were actually longer-term users. The results of this modelling suggest that we would \nexpect about 2,400–7,000 new positive tests from individuals who are actually longer-term \nOCUs.15 So the fact we only see 4,281 in the real data suggests that genuinely new initiates \nmay be a minority within this figure, as many (probably most) will be from the original cohort. \n\nThis is further reinforced by the next set of analyses, which break down the data on new positive \ntests per year by age. Table 8 shows how numbers of unique individuals testing positive for the \nfirst time break down by year and by age group. The age breakdowns are shown first in \nabsolute numbers and in the second table as a proportion of all those with a first test in that \nyear. \n\n**Table 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and**\n**by year of first test.**\n\n\n \n \n \n \n [html]\n
Year of first lestAge 18 - 24Age 25 - 29Age 30 - 34Age 35 – 39Age 40 overTotal
20043.1503.3192.9381.95888112.246
20052.3912.8322.5481.79197710.539
20063.6353.7683.2752.4911.58014.749
20073.1823.3592.8692.1781.80313.391
20082.9123.1972.8572.4252.23813.629
20092.7112.5942.3041.9982.04811.655
20102.2872.1802.1051.7442.07510.391
20111.7721.5191.6221.2741.7267.913
20121.1361.1791.3001.0301.3776.022
20137218509387041.0684.281
Total23.89724.79722.75617.59315.773104.816
", + "page_start": 18, + "page_end": 18, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. \n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the \narrestee data showed that a proportion of these are likely to offend over a long period of time. \nBut also, there was some evidence of a shift to older initiates, which may require a slightly \ndifferent treatment approach.", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Table 7: Number of unique individuals testing positive for opiates-only or positive-for-both,**\n**by year of first positive test.**\n\n\n \n \n \n \n [html]Number of arraper infortabel with police poteinpide coctededape year\n
First test year2004200520062007200820092010201120122013Adjusted 2013
200412.2463.1713.2993.0902.9922.5732.3111.7661.5131.0921.191
200510.5393.0202.5392.4782.0831.8441.3501.156862940
200614.7503.8963.2802.7012.5071.8191.6101.1401.244
200713.3913.0632.2912.0911.5671.3349541.041
200813.6292.6702.2631.6121.3669781.067
200911.6552.2111.4311.125847924
201010.3911.3851.052733800
20117.9131.017643701
20126.022823898
20134.2814.670
Total12.24613.71021.06922.91625.44223.97323.61818.84316.19512.35313.476
\n\nThere are several observations to be drawn from these tables. First, it is clear that a proportion \nof opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of \nindividuals who tested positive for opiates at charge in 2004 also tested positive nearly a \ndecade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive \nin 2013, 1,092 (8.9%) had also tested positive almost a decade earlier. \n\nSecond, in relation to incidence, these numbers also allow for some back-of-the-envelope \nmodelling to address the extent to which the figure of 4,281 individuals, who are new positive \ntesters in 2013, is an under- or over-estimate of the number of new OCUs in total. Taking the \nfigures for 2008, when DIP was fully up and running, we know that around 25,000 unique \nindividuals had positive tests that year. This can be combined with available estimates of the \ntotal OCU population (Hay et al., 2013) and the proportion who are likely to be offending \n(Gossop et al., 2003; Morgan, 2014) to give an approximate arrest rate. i.e. if there were about \n150,000 crime-involved OCUs through the period, this implies an arrest rate of about 17 per \nNew opiate and crack-cocaine users: characteristics and trends 18", + "page_start": 17, + "page_end": 17, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Modelling methodology \n\nThis brief section outlines the modelling process behind the conclusion in section one, which \nstates that we might expect somewhere between 2,400 and 7,000 individuals from the original \ncohort of users in 2004 to be captured within the 2013 figure of new DIP arrestees (who test \npositive for opiates-only or who are positive-for-both). \n\nWe begin by putting in a plausible range of crime-involved OCUs through the period. This \ncombines the total OCU estimates published by Hay et al., (ranging from around 320,000 OCUs \ndown to around 295,000 in recent years) with available estimates of the percentage who are \nlikely to be committing acquisitive crime. The latter was found to be almost exactly 50% in the \nNTORS study (Gossop et al., 2003). As such, a range of between 170,000 and 100,000 crime- \ninvolved OCUs is likely to include all plausible values (see first row of table below). \n\nWe then calculate the rate at which that population is likely to be arrested and test positive by \nusing the number of individuals testing positive from 2008 (25,433), when DIP was fully up and \nrunning. This gives the second row of the table. Combining the values in the first two rows and \napplying the probability formula given in the main body of the text gives the third row: the \nprobability of first positive DIP test in 2013. Note that this assumes all these individuals continue \nto offend through the period, which may not be the case, hence final results are probably an \nupper bound. The final row simply multiples the figure in the first row by the figure in the third to \ngive our estimate of the original cohort who might appear in the 2013 DIP figures as new.", + "page_start": 41, + "page_end": 41, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "involved opiate/crack users will quit (or die) before being arrested and tested; 3) DIP’s geographical coverage is not 100 per \ncent; 4) Some may evade arrest through the entire series; and 5) Evidence suggests OCUs cycle in and out of periods of \nregular use and offending rather than offend at a high rate continuously. But clearly the gradual capture of the pre-existing \npopulation creates a big enough bias such that we cannot read the figures for new positive testers simply as an incidence \ntrend for crime-involved opiate/crack users. \n\nNew opiate and crack-cocaine users: characteristics and trends 17", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "Who led the Fronde des princes?", + "target_page": 4, + "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. \n\n\n\n**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV \n\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in \nEurope, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies \nin the East and West Indies; and Holland with all its possessions in the four corners of the world where it has \ngreat establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, \nDenmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states \nsecretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting \nand covering their trade.[65] \n\nVauban was pessimistic about France's so-called friends and allies: \n\nFor lukewarm, useless, or impotent friends, France has the Pope, who is indifferent; the King of England \n[James II] expelled from his country; the Grand Duke of Tuscany; the Dukes of Mantua, Modena, and Parma [all \nin Italy]; and the other faction of the Swiss. Some of these are sunk in the softness that comes of years of \npeace, the others are cool in their affections....The English and Dutch are the main pillars of the Alliance; they \nsupport it by making war against us in concert with the other powers, and they keep it going by means of the \nmoney that they pay every year to... Allies.... We must therefore fall back on privateering as the method of \nconducting war which is most feasible, simple, cheap, and safe, and which will cost least to the state, the more \nso since any losses will not be felt by the King, who risks virtually nothing....It will enrich the country, train many \ngood officers for the King, and in a short time force his enemies to sue for peace.[66] \n\n**Edict of Fontainebleau**", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TableTablePPComponentsof
0.00TableParameterP
\n\n\n\n1655 portrait of Louis, the Victor of \nthe Fronde, portrayed as the god \nJupiter \n\nAll these events were witnessed by Louis and \nlargely explained his later distrust of Paris and the higher aristocracy.[27] \"In one sense, \nLouis's childhood came to an end with the outbreak of the Fronde. It was not only that life \nbecame insecure and unpleasant – a fate meted out to many children in all ages – but that \nLouis had to be taken into the confidence of his mother and Mazarin on political and \nmilitary matters of which he could have no deep understanding\".[28] \"The family home \nbecame at times a near-prison when Paris had to be abandoned, not in carefree outings to \nother chateaux but in humiliating flights\".[28] The royal family was driven out of Paris \ntwice in this manner, and at one point Louis XIV and Anne were held under virtual arrest \nin the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a \nconsequent determination to move out of the ancient capital as soon as possible, never to \nreturn.[29] \n\n\n\nJust as the first*Fronde*(the*Fronde parlementaire*of 1648–1649) ended, a second one (the \n*Fronde des princes*of 1650–1653) began. Unlike that which preceded it, tales of sordid \nintrigue and half-hearted warfare characterized this second phase of upper-class \ninsurrection. To the aristocracy, this rebellion represented a protest for the reversal of their \npolitical demotion from vassals to courtiers. It was headed by the highest-ranking French \nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of \nMontpensier, known as*la Grande Mademoiselle*; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of \nConti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and \nFrançois, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, \nand Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld. \n\nPortrait by Justus van Egmont \nbetween the years 1649–1652. \n\nQueen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. \nIn addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The*Frondeurs*claimed \nto act on Louis's behalf, and in his real interest, against his mother and Mazarin. \n\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's \nstepfather by a secret marriage to Queen Anne.[30] However, Louis's coming-of-age and subsequent coronation deprived them of \nthe*Frondeurs*' pretext for revolt. The*Fronde*thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly \nfrom exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of \nAnne, who was no longer regent.[31]", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia5.pdf" + }, + { + "text": "People in France were complaining about the expansion of royal authority, the high rate of \ntaxation, and the reduction of the authority of the Parlement de Paris and other regional \nrepresentative entities. Paris erupted in rioting as a result, and Anne was forced, under \nintense pressure, to free Broussel. Moreover, on the night of 9–10 February 1651, when \nLouis was twelve, a mob of angry Parisians broke into the royal palace and demanded to \nsee their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning \nsleep, were appeased, and then quietly departed.[25] The threat to the royal family \nprompted Anne to flee Paris with the king and his courtiers. \n\nEurope after the Peace of \nWestphalia in 1648 \n\nShortly thereafter, the conclusion of the Peace of Westphalia allowed Condé's army to \nreturn to aid Louis and his court. Condé's family was close to Anne at that time, and he \nagreed to help her attempt to restore the king's authority.[26] The queen's army, headed by", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia5.pdf" + }, + { + "text": "famous throughout Europe. Composers and musicians such as Jean-Baptiste Lully, Jacques \nChampion de Chambonnières, and François Couperin thrived. In 1661, Louis founded the \nAcadémie Royale de Danse, and in 1669, the Académie d'Opéra, important driving events \nin the evolution of ballet. He also attracted, supported and patronized such artists as André \nCharles Boulle, who revolutionised marquetry with his art of inlay, today known as \n\"Boulle work\". Always on the lookout for new talent, the king launched music \ncompetitions: in 1683, Michel-Richard de Lalande thus became deputy master of the Royal \nChapel, composing his*Symphonies for the Soupers du Roy*along with 77 large scale \n*Grand Motets*. \n\nOver the course of four building campaigns, Louis converted a hunting lodge \ncommissioned by Louis XIII into the spectacular Palace of Versailles. Except for the \ncurrent Royal Chapel (built near the end of his reign), the palace achieved much of its \ncurrent appearance after the third building campaign, which was followed by an official \nmove of the royal court to Versailles on 6 May 1682. Versailles became a dazzling, awe- \ninspiring setting for state affairs and the reception of foreign dignitaries. At Versailles, the \nking alone commanded attention. \n\n\n\n\n\nSeveral reasons have been suggested for the \ncreation of the extravagant and stately palace, as \nwell as the relocation of the monarchy's seat. The \nmemoirist Saint-Simon speculated \nthat Louis \nviewed Versailles as an isolated power centre where \ntreasonous cabals could be more readily discovered and foiled.[62] There has also been \nspeculation that the revolt of the*Fronde*caused Louis to hate Paris, which he abandoned \nfor a country retreat, but his sponsorship of many public works in Paris, such as the \nestablishment of a police force and of street-lighting,[111] lend little credence to this theory. \nAs a further example of his continued care for the capital, Louis constructed the*Hôtel des*\n*Invalides*, a military complex and home to this day for officers and soldiers rendered \ninfirm either by injury or old age. While pharmacology was still quite rudimentary in his \nday, the*Invalides*pioneered new treatments and set new standards for hospice treatment. \nThe conclusion of the Treaty of Aix-la-Chapelle in 1668 also induced Louis to demolish \nParis's northern walls in 1670 and replace them with wide tree-lined boulevards.[112] \n\nThe*Cour royale*and the*Cour de*\n*marbre*at Versailles \n\nBust of Louis XIV by Gianlorenzo \nBernini \n\nLouis also renovated and improved the Louvre and other royal residences. Gian Lorenzo \nBernini was originally to plan additions to the Louvre; however, his plans would have meant the destruction of much of the \nexisting structure, replacing it with an Italian summer villa in the centre of Paris. Bernini's plans were eventually shelved in \nfavour of the elegant Louvre Colonnade designed by three Frenchmen: Louis Le Vau, Charles Le Brun, and Claude Perrault. With \nthe relocation of the court to Versailles, the Louvre was given over to the arts and the public.[113] During his visit from Rome, \nBernini also executed a renowned portrait bust of the king. \n\n**Image and depiction**\n\nFew rulers in world history have commemorated themselves in as grand a manner as Louis.[114] He cultivated his image as the \nSun King (*le Roi Soleil*), the centre of the universe \"without equal\". Louis used court ritual and the arts to validate and augment \nhis control over France. With his support, Colbert established from the beginning of Louis's personal reign a centralised and \ninstitutionalised system for creating and perpetuating the royal image. The King was thus portrayed largely in majesty or at war, \nnotably against Spain. This portrayal of the monarch was to be found in numerous media of artistic expression, such as painting, \nsculpture, theatre, dance, music, and the almanacs that diffused royal propaganda to the population at large.", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia5.pdf" + }, + { + "text": "negotiations in 1709 and 1710. France retained Île-Saint-Jean and Île Royale, and Louis acquired a few minor European \nterritories, such as the Principality of Orange and the Ubaye Valley, which covered transalpine passes into Italy. Thanks to Louis, \nhis allies the Electors of Bavaria and Cologne were restored to their prewar status and returned their lands.[102] \n\n\n\n**Personal life**\n\n**Marriages and children**\n\nLouis and his wife Maria Theresa of Spain had six children from the marriage contracted \nfor them in 1660. However, only one child, the eldest, survived to adulthood: Louis,*le*\n*Grand Dauphin*, known as*Monseigneur*. Maria Theresa died in 1683, whereupon Louis \nremarked that she had never caused him unease on any other occasion. \n\nDespite evidence of affection early on in their marriage, Louis was never faithful to Maria \nTheresa. He took a series of mistresses, both official and unofficial. Among the better \ndocumented are Louise de La Vallière (with whom he had five children; 1661–1667), \nBonne de Pons d'Heudicourt (1665), Catherine Charlotte de Gramont (1665), Françoise- \nAthénaïs, Marquise de Montespan (with whom he had seven children; 1667–1680), Anne \nde Rohan-Chabot (1669–1675), Claude de Vin des Œillets (one child born in 1676), \nIsabelle de Ludres (1675–1678), and Marie Angélique de Scorailles (1679–1681), who died at age \n19 in childbirth. Through these liaisons, he produced numerous illegitimate children, most of \nwhom he married to members of cadet branches of the royal family. \n\nWedding of Louis and Maria \nTheresa \n\nLouis proved relatively more faithful to his second wife, Françoise d'Aubigné, Marquise de \nMaintenon. He first met her through her work caring for his children by Madame de Montespan, \nnoting the care she gave to his favourite, Louis Auguste, Duke of Maine.[103] The king was, at \nfirst, put off by her strict religious practice, but he warmed to her through her care for his \nchildren.[103] \n\nWhen he legitimized his children by Madame de Montespan on 20 December 1673, Françoise \nd'Aubigné became the royal governess at Saint-Germain.[103] As governess, she was one of very \nfew people permitted to speak to him as an equal, without limits.[103] It is believed that they were \nmarried secretly at Versailles on or around 10 October 1683[104] or January 1684.[105] This \nmarriage, though never announced or publicly discussed, was an open secret and lasted until his \ndeath.[106] \n\nDual Cypher of King \nLouis XIV & Queen Marie \nThérèse \n\n\n\n**Piety and religion**\n\nLouis was a pious and devout king who saw himself as the head and protector of the \nCatholic Church in France. He made his devotions daily regardless of where he was, \nfollowing the liturgical calendar regularly.[107] Under the influence of his very religious \nsecond wife, he became much stronger in the practice of his Catholic faith.[108] This \nincluded banning opera and comedy performances during Lent.[108] \n\nTowards the middle and the end of his reign, the centre for the King's religious \nobservances was usually \nthe Chapelle Royale at Versailles. Ostentation was a \ndistinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and \nspecial ceremonies.[109] Louis established the Paris Foreign Missions Society, but his \nfor undermining \ninformal alliance with \nChristendom.[110] \n\nthe Ottoman Empire was criticised \n\n**Patronage of the arts**\n\nLouis generously supported the royal court of France and those who worked under him. He brought the Académie Française \nunder his patronage and became its \"Protector\". He allowed Classical French literature to flourish by protecting such writers as \nMolière, Racine, and La Fontaine, whose works remain influential to this day. Louis also patronised the visual arts by funding and \ncommissioning artists such as Charles Le Brun, Pierre Mignard, Antoine Coysevox, and Hyacinthe Rigaud, whose works became", + "page_start": 15, + "page_end": 15, + "source_file": "wikipedia5.pdf" + }, + { + "text": "was persuaded to change his fiscal policy. Though willing enough to tax the nobles, Louis \nfeared the political concessions which they would demand in return. Only towards the \nclose of his reign under the extreme exigency of war, was he able, for the first time in \nFrench history, to impose direct taxes on the aristocracy. This was a step toward equality \nbefore the law and toward sound public finance, though it was predictably diminished by \nconcessions and exemptions won by the insistent efforts of nobles and bourgeois.[35] \n\nLouis and Colbert also had wide-ranging plans to grow French commerce and trade. \nColbert's mercantilist administration established new \nindustries and encouraged \nmanufacturers and inventors, such as the Lyon silk manufacturers and the Gobelins \ntapestry manufactory. He invited manufacturers and artisans from all over Europe to \nFrance, such as Murano glassmakers, Swedish ironworkers, and Dutch shipbuilders. He \naimed to decrease imports while increasing French exports, hence reducing the net outflow \nof precious metals from France. \n\nEngraving of Louis XIV \n\nLouis instituted reforms in military administration through Michel le Tellier and his son \nFrançois-Michel le Tellier, successive Marquis de Louvois. They helped to curb the \nindependent spirit of the nobility, imposing order on them at court and in the army. Gone were the days when generals protracted \nwar at the frontiers while bickering over precedence and ignoring orders from the capital and the larger strategic picture, with the \nold military aristocracy (*noblesse d'épée*, nobility of the sword) monopolizing senior military positions and the higher ranks. \nLouvois modernized the army and reorganised it into a professional, disciplined, well-trained force. He was devoted to the \nsoldiers' material well-being and morale, and even tried to direct campaigns. \n\n\n\n**Relations with the major colonies**\n\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France \nwas a patchwork of legal systems, with as many traditional legal regimes as there were \nprovinces, and two co-existing legal systems—customary law in the north and Roman civil \nlaw in the south.[36] The*Grande Ordonnance de Procédure Civile*of 1667, the*Code*\n*Louis*, was a comprehensive legal code imposing a uniform regulation of civil procedure \nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death \nrecords in the state's registers, not the church's, and it strictly regulated the right of the \n*Parlements*to remonstrate.[37] The*Code Louis*later became the basis for the Napoleonic \ncode, which in turn inspired many modern legal codes. \n\nLouis and his family portrayed as \nRoman gods in a 1670 painting by \nJean Nocret. L to R: Louis's aunt, \nHenriette-Marie; his brother, \nPhilippe, duc d'Orléans; the Duke's \ndaughter, Marie Louise d'Orléans, \nand wife, Henriette-Anne Stuart; the \nQueen-mother, Anne of Austria; \nthree daughters of Gaston \nd'Orléans; Louis XIV; the Dauphin \nLouis; Queen Marie-Thérèse;*la*\n*Grande Mademoiselle*. \n\nOne of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils:", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "important both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's \nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish \nthrone would ultimately be delivered to the House of Bourbon.[32] \n\n**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] \n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "illegitimate son Louis-Auguste de Bourbon, Duke of Maine.[129] Orléans, however, had Louis's will annulled by the*Parlement of*\n*Paris*after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of \nthe rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.[130] \n\n**Line of succession in 1715**\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson, \nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish \nSuccession, which lasted for 13 years after the death of Charles II of Spain in 1700.[131] \n\n*Louis XIII (1601–1643)*\n\n**Louis XIV***(1638–1715)*\n*Louis, Grand Dauphin (1661–1711)*\n\n*Louis, Duke of Burgundy (1682–1712)*\n*Louis, Duke of Brittany (1707–1712)*\n**(1)**Louis, Duke of Anjou (1710–1774) \n\nPhilip V of Spain (1683–1746) \n*Charles, Duke of Berry (1686–1714)*\n*Philippe I, Duke of Orléans (1640–1701)*\n\n**(2)**Philippe II, Duke of Orléans (1674–1723) \n**(3)**Louis, Duke of Chartres (1703–1752) \n\nFurther down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of \nthe House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin \nof French King Louis XIII (the father of Louis XIV) in the male line. \n\n**Legacy**\n\n**Reputation**\n\nAccording to Philippe de Courcillon's*Journal*, Louis on his deathbed advised his heir with these words: \n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for \nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the \nburdens of your subjects.[132] \n\nSome historians point out that it was a customary demonstration of piety in those days to \nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed \ndeclarations in assessing his accomplishments. Rather, they focus on military and \ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This, \nthey contend, ended the threat of an aggressive Spain that historically interfered in \ndomestic French politics. These historians also emphasise the effect of Louis's wars in \nexpanding France's boundaries and creating more defensible frontiers that preserved \nFrance from invasion until the Revolution.[132] \n\nTerritorial expansion of France \nunder Louis XIV (1643–1715) is \ndepicted in orange. \n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] \nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and \ncommerce, and sponsored the founding of an overseas empire. Moreover, the significant \nreduction in civil wars and aristocratic rebellions during his reign are seen by these \nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised \nFrance and marked the birth of the modern French state. They regard the political and military victories as well as numerous \ncultural achievements as how Louis helped raise France to a preeminent position in Europe.[133] Europe came to admire France \nfor its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, \ngoods, and deportment. French became the universal language of the European elite. \n\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted \nFrance. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting \nevidence, they cite the literature of the time, such as the social commentary in Montesquieu's*Persian Letters*.[134]", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia5.pdf" + }, + { + "text": "She appointed Cardinal Mazarin as chief minister, giving him the daily administration of \npolicy. She continued the policies of her late husband and Cardinal Richelieu, despite their \npersecution of her, in order to win absolute authority in France and victory abroad for her \nson. Anne protected Mazarin by exiling her followers the Duke of Beaufort and Marie de \nRohan, who conspired against him in 1643.[17] \nLouis XIV as a young child, \nunknown painter \n\nThe best example of Anne's loyalty to France was her treatment of one of Richelieu's men, \nthe Chancellor Pierre Séguier. Séguier had brusquely interrogated Anne in 1637 (like a \n\"common criminal\", as she recalled) following the discovery that she was giving military secrets to her father in Spain, and Anne \nwas virtually under house arrest for years. By keeping the effective Séguier in his post, Anne sacrificed her own feelings for the \ninterests of France and her son Louis.", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Fouquet's downfall gave Colbert a free hand to reduce the national debt through more \nefficient taxation. The principal taxes included the*aides*and*douanes*(both customs \nduties), the*gabelle*(salt tax), and the*taille*(land tax). The*taille*was reduced at first, and \ncertain tax-collection contracts were auctioned instead of being sold privately to a \nfavoured few. Financial officials were required to keep regular accounts, revising \ninventories and removing unauthorized exemptions: up to 1661 only 10 per cent of income \nfrom the royal domain reached the king. Reform had to overcome vested interests: the \n*taille*was collected by officers of the Crown who had purchased their post at a high price, \nand punishment of abuses necessarily lowered the value of the purchase. Nevertheless, \nColbert achieved excellent results, with the deficit of 1661 turning into a surplus by 1666, \nwith interest on the debt decreasing from 52 million to 24 million livres. The*taille*was \nreduced to 42 million in 1661 and 35 million in 1665, while revenue from indirect taxation \nprogressed from 26 million to 55 million. The revenues of the royal domain were raised from 80,000 livres in 1661 to 5.5 million \nin 1671. In 1661, the receipts were equivalent to 26 million British pounds, of which 10 million reached the treasury. The \nexpenditure was around 18 million pounds, leaving a deficit of 8 million. In 1667, the net receipts had risen to 20 million pounds \nsterling, while expenditure had fallen to 11 million, leaving a surplus of 9 million pounds. \n\nMembers of the*Académie des*\n*sciences*with Louis in 1667; in the \nbackground appears the new Paris \nObservatory. \n\nMoney was the essential support of the reorganized and enlarged army, the panoply of Versailles, and the growing civil \nadministration. Finance had always been the weakness of the French monarchy: tax collection was costly and inefficient; direct \ntaxes dwindled as they passed through the hands of many intermediate officials; and indirect taxes were collected by private \ncontractors called tax farmers who made a handsome profit. The state coffers leaked at every joint. \n\nThe main weakness arose from an old bargain between the French crown and nobility: the king might raise taxes on the nation \nwithout consent if only he exempted the nobility. Only the \"unprivileged\" classes paid direct taxes, which came to mean the \npeasants only, as most bourgeois finagled exemptions in one way or another. The system laid the whole burden of state expenses \non the backs of the poor and powerless. After 1700, with the support of Louis's pious secret wife Madame de Maintenon, the king", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What was one of Louis XIV's most ill-famed decrees?", + "target_page": 6, + "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "was persuaded to change his fiscal policy. Though willing enough to tax the nobles, Louis \nfeared the political concessions which they would demand in return. Only towards the \nclose of his reign under the extreme exigency of war, was he able, for the first time in \nFrench history, to impose direct taxes on the aristocracy. This was a step toward equality \nbefore the law and toward sound public finance, though it was predictably diminished by \nconcessions and exemptions won by the insistent efforts of nobles and bourgeois.[35] \n\nLouis and Colbert also had wide-ranging plans to grow French commerce and trade. \nColbert's mercantilist administration established new \nindustries and encouraged \nmanufacturers and inventors, such as the Lyon silk manufacturers and the Gobelins \ntapestry manufactory. He invited manufacturers and artisans from all over Europe to \nFrance, such as Murano glassmakers, Swedish ironworkers, and Dutch shipbuilders. He \naimed to decrease imports while increasing French exports, hence reducing the net outflow \nof precious metals from France. \n\nEngraving of Louis XIV \n\nLouis instituted reforms in military administration through Michel le Tellier and his son \nFrançois-Michel le Tellier, successive Marquis de Louvois. They helped to curb the \nindependent spirit of the nobility, imposing order on them at court and in the army. Gone were the days when generals protracted \nwar at the frontiers while bickering over precedence and ignoring orders from the capital and the larger strategic picture, with the \nold military aristocracy (*noblesse d'épée*, nobility of the sword) monopolizing senior military positions and the higher ranks. \nLouvois modernized the army and reorganised it into a professional, disciplined, well-trained force. He was devoted to the \nsoldiers' material well-being and morale, and even tried to direct campaigns. \n\n\n\n**Relations with the major colonies**\n\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France \nwas a patchwork of legal systems, with as many traditional legal regimes as there were \nprovinces, and two co-existing legal systems—customary law in the north and Roman civil \nlaw in the south.[36] The*Grande Ordonnance de Procédure Civile*of 1667, the*Code*\n*Louis*, was a comprehensive legal code imposing a uniform regulation of civil procedure \nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death \nrecords in the state's registers, not the church's, and it strictly regulated the right of the \n*Parlements*to remonstrate.[37] The*Code Louis*later became the basis for the Napoleonic \ncode, which in turn inspired many modern legal codes. \n\nLouis and his family portrayed as \nRoman gods in a 1670 painting by \nJean Nocret. L to R: Louis's aunt, \nHenriette-Marie; his brother, \nPhilippe, duc d'Orléans; the Duke's \ndaughter, Marie Louise d'Orléans, \nand wife, Henriette-Anne Stuart; the \nQueen-mother, Anne of Austria; \nthree daughters of Gaston \nd'Orléans; Louis XIV; the Dauphin \nLouis; Queen Marie-Thérèse;*la*\n*Grande Mademoiselle*. \n\nOne of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils:", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "important both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's \nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish \nthrone would ultimately be delivered to the House of Bourbon.[32] \n\n**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] \n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "From 1647 to 1711, the three chief physicians to the king (Antoine Vallot, Antoine \nd'Aquin, and Guy-Crescent Fagon) recorded all of his health problems in the*Journal de*\n*Santé du Roi*(*Journal of the King's Health*), a daily report of his health. On 18 November \n1686, Louis underwent a painful operation for an anal fistula that was performed by the \nsurgeon Charles Felix de Tassy, who prepared a specially shaped curved scalpel for the \noccasion. The wound took more than two months to heal.[124] \n\nLouis XIV (seated) with his son*le*\n*Grand Dauphin*(to the left), his \ngrandson Louis, Duke of Burgundy \n(to the right), his great-grandson \nLouis Duke of Anjou, and Madame \nde Ventadour, Anjou's governess, \nwho commissioned this painting; \nbusts of Henry IV and Louis XIII are \nin the background. \n\nLouis died of gangrene at Versailles on 1 September 1715, four days before his 77th \nbirthday, after 72 years on the throne. Enduring much pain in his last days, he finally \n\"yielded up his soul without any effort, like a candle going out\", while reciting the psalm \n*Deus, in adjutorium me festina*(*O Lord, make haste to help me*).[125] His body was laid to \nrest in Saint-Denis Basilica outside Paris. It remained there undisturbed for about 80 years \nuntil revolutionaries exhumed and destroyed all of the remains found in the Basilica.[126] \nIn 1848, at Nuneham House, a piece of Louis's mummified heart, taken from his tomb and \nkept in a silver locket by Lord Harcourt, Archbishop of York, was shown to the Dean of \nWestminster, William Buckland, who ate a part of it.[127] \n\nCardinal Armand Gaston Maximilien de Rohan gave Last Rites (confession, viaticum, and \nunction) to king Louis XIV.[128] \n\n\n\n**Succession**\n\n*The Death of Louis XIV at the*\n*Palace of Versailles*, Thomas Jones \nBarker, 1835-1840 \n\nLouis outlived most of his immediate legitimate family. His last surviving legitimate son, \nLouis, Dauphin of France, died in 1711. Barely a year later, the Duke of Burgundy, the \neldest of the Dauphin's three sons and then heir-apparent to Louis, followed his father. \nBurgundy's elder son, Louis, Duke of Brittany, joined them a few weeks later. Thus, on his \n\ndeathbed, Louis's heir-apparent was his five-year-old great-grandson, Louis, Duke of Anjou, Burgundy's younger son. \n\nLouis foresaw an underaged successor and sought to restrict the power of his nephew Philip II, Duke of Orléans, who, as his \nclosest surviving legitimate relative in France, would probably become regent to the prospective Louis XV. Accordingly, the king \ncreated a regency council as Louis XIII had in anticipation of Louis XIV's own minority, with some power vested in his", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "He did say, \"Every time I appoint someone to a vacant position, I make a hundred unhappy and one ungrateful.\"[146][147] Louis is \nrecorded by numerous eyewitnesses as having said on his deathbed: \"*Je m'en vais, mais l'État demeurera toujours.*\" (\"I depart, but \nthe State shall always remain.\")[148] \n\n**Notes**\n\nUpon his accession to the throne Louis assumed the royal coat of arms of France & \nNavarre.[149] \n**Adopted**\n1643–1715 \n**Crest**\nThe Royal crown of France \n**Helm**\nAn opened gold helmet, with blue and gold mantling. \n**Escutcheon**\n\n*Azure, three fleurs-de-lis Or (for France) impaling Gules on a chain in cross saltire and orle*\n*Or an emerald Proper (for Navarre)*. \n**Supporters**\n\nThe two supporters are two angels, acting as heralds for the two realms. The dexter angel \ncarries a standard with the arms of France, and wears a tabard with the same arms. The \nsinister angel also carries a standard and wears a tabard, but that of Navarre. Both are \nstanding on puffs of cloud. \n**Motto**\n\nThe motto is written in gold on a blue ribbon:**MONTJOIE SAINT DENIS**the war cry of \nFrance, Saint Denis was also the abbey where the oriflamme was kept. \n**Orders**\n\nThe escutcheons are surrounded first by the chain of the Order of Saint Michael and by the \nchain of the Order of the Holy Spirit, both were known as the*ordres du roi*. \n\n**Other elements**\n\nAbove all is a*pavilion armoyé*with the Royal crown. From it, is a royal blue mantle with a \nsemis of fleurs-de-lis Or, lined on the inside with ermine. \n**Banner**\n\n Royal standard of the king \n\n**Order of Saint Louis**\n\nOn 5 April 1693, Louis also founded the Royal and Military Order of Saint Louis (French:*Ordre Royal et Militaire de Saint-*\n*Louis*), a military order of chivalry.[150][151] He named it after Louis IX and intended it as a reward for outstanding officers. It is \nnotable as the first decoration that could be granted to non-nobles and is roughly the forerunner of the*Légion d'honneur*, with \nwhich it shares the red ribbon (though the*Légion d'honneur*is awarded to military personnel and civilians alike). \n\n**Ancestry**\n\n**Ancestors of Louis XIV**\n\n8. Antoine of Navarre[154] \n\n4. Henry IV of France[152] \n\n9. Jeanne III of Navarre[154] \n\n2. Louis XIII of France \n\n10. Francesco I de' Medici, Grand Duke of Tuscany[155] \n\n5. Marie de' Medici[152] \n\n11. Joanna of Austria[155] \n\n1.**Louis XIV of France**", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Alternatively, Louis's critics attribute the social upheaval culminating in the French Revolution to his failure to reform French \ninstitutions while the monarchy was still secure. Other scholars counter that there was little reason to reform institutions that \nlargely worked well under Louis. They also maintain that events occurring almost 80 years after his death were not reasonably \nforeseeable to Louis and that in any case, his successors had sufficient time to initiate reforms of their own.[135] \n\nLouis has often been criticised for his vanity. The memoirist Saint-Simon, who claimed \nthat Louis slighted him, criticised him thus: \n\nThere was nothing he liked so much as flattery, or, to put it more plainly, \nadulation; the coarser and clumsier it was, the more he relished it. \n\n\n\nFor his part, Voltaire saw Louis's vanity as the cause for his bellicosity: \n\nIt is certain that he passionately wanted glory, rather than the conquests \nthemselves. In the acquisition of Alsace and half of Flanders, and of all of \nFranche-Comté, what he really liked was the name he made for himself.[136] \n\nNonetheless, Louis has also received praise. The anti-Bourbon Napoleon described him not only as \"a great king\", but also as \"the \nonly King of France worthy of the name\".[137] Leibniz, the German Protestant philosopher, commended him as \"one of the \ngreatest kings that ever was\".[138] And Lord Acton admired him as \"by far the ablest man who was born in modern times on the \nsteps of a throne\".[139] The historian and philosopher Voltaire wrote: \"His name can never be pronounced without respect and \nwithout summoning the image of an eternally memorable age\".[140] Voltaire's history,*The Age of Louis XIV*, named Louis's reign \nas not only one of the four great ages in which reason and culture flourished, but the greatest ever.[141][142] \n\n**Quotes**\n\nNumerous quotes have been attributed to Louis XIV by legend. \n\nThe well-known \"I am the state\" (*\"L'État, c'est moi.\"*) was reported from at least the late 18th century.[143] It was widely repeated \nbut also denounced as apocryphal by the early 19th century.[144][b][145]", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia5.pdf" + }, + { + "text": "illegitimate son Louis-Auguste de Bourbon, Duke of Maine.[129] Orléans, however, had Louis's will annulled by the*Parlement of*\n*Paris*after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of \nthe rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.[130] \n\n**Line of succession in 1715**\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson, \nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish \nSuccession, which lasted for 13 years after the death of Charles II of Spain in 1700.[131] \n\n*Louis XIII (1601–1643)*\n\n**Louis XIV***(1638–1715)*\n*Louis, Grand Dauphin (1661–1711)*\n\n*Louis, Duke of Burgundy (1682–1712)*\n*Louis, Duke of Brittany (1707–1712)*\n**(1)**Louis, Duke of Anjou (1710–1774) \n\nPhilip V of Spain (1683–1746) \n*Charles, Duke of Berry (1686–1714)*\n*Philippe I, Duke of Orléans (1640–1701)*\n\n**(2)**Philippe II, Duke of Orléans (1674–1723) \n**(3)**Louis, Duke of Chartres (1703–1752) \n\nFurther down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of \nthe House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin \nof French King Louis XIII (the father of Louis XIV) in the male line. \n\n**Legacy**\n\n**Reputation**\n\nAccording to Philippe de Courcillon's*Journal*, Louis on his deathbed advised his heir with these words: \n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for \nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the \nburdens of your subjects.[132] \n\nSome historians point out that it was a customary demonstration of piety in those days to \nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed \ndeclarations in assessing his accomplishments. Rather, they focus on military and \ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This, \nthey contend, ended the threat of an aggressive Spain that historically interfered in \ndomestic French politics. These historians also emphasise the effect of Louis's wars in \nexpanding France's boundaries and creating more defensible frontiers that preserved \nFrance from invasion until the Revolution.[132] \n\nTerritorial expansion of France \nunder Louis XIV (1643–1715) is \ndepicted in orange. \n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] \nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and \ncommerce, and sponsored the founding of an overseas empire. Moreover, the significant \nreduction in civil wars and aristocratic rebellions during his reign are seen by these \nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised \nFrance and marked the birth of the modern French state. They regard the political and military victories as well as numerous \ncultural achievements as how Louis helped raise France to a preeminent position in Europe.[133] Europe came to admire France \nfor its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, \ngoods, and deportment. French became the universal language of the European elite. \n\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted \nFrance. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting \nevidence, they cite the literature of the time, such as the social commentary in Montesquieu's*Persian Letters*.[134]", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Louis XIV**\n\n**Louis XIV**(Louis-Dieudonné; 5 September 1638 – 1 September 1715), also \nknown as**Louis the Great**(*Louis le Grand*) or the**Sun King**(*le Roi Soleil*), \nwas King of France from 1643 until his death in 1715. His verified reign of 72 \nyears and 110 days is the longest of any sovereign.[1][a] An emblematic \ncharacter of the Age of Absolutism in Europe,[3] Louis XIV's legacy is widely \ncharacterized by French colonial expansion, the conclusion of Eighty Years' \nWar involving the Habsburgs, and his architectural bequest, marked by \ncommissioned works of art and buildings. His pageantry, opulent lifestyle and \nornate cultivated image earned him enduring admiration. Louis XIV raised \nFrance to be the exemplar nation-state of the early modern period, and \nestablished a cultural prestige which lasted through the subsequent centuries, \nand continues today. \n\n**Louis XIV**\n\n\n \n \n \n \n [html]lavish whom• The Marquis of Louvois ( 1683 – 1691 )\n
King of France ( more...)Reign14 May 1643 – 1 September 1715
Coronation7 June 1654 Reims CathedralPredecessor
< underline > Louis XIII SuccessorLouis XV
RegentAnne of Austria ( 1643 – 1651 )Chief ministers See list
Control• Cardinal Mazarin ( 1643 – 1661 )• Jean – Baptiste Colbert ( 1661 – 1683 )
Born
5 September 1638Chateau de Saint - Germain - en - Laye, Saint - Germain - en - Laye, FranceDied
1 September 1715 ( aged 76 ) Palace of Versailles,Versailles, FranceBurial
9 September 1715Basilica of Saint - DenisSpouses
Maria Theresa of Spain ( m, 1660 ; died 1683 )Francoise d ’ Aubigne, Marguise de Maintenon ( nrivate )( m, 1683 )
\n\n**Early years**", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Fouquet's downfall gave Colbert a free hand to reduce the national debt through more \nefficient taxation. The principal taxes included the*aides*and*douanes*(both customs \nduties), the*gabelle*(salt tax), and the*taille*(land tax). The*taille*was reduced at first, and \ncertain tax-collection contracts were auctioned instead of being sold privately to a \nfavoured few. Financial officials were required to keep regular accounts, revising \ninventories and removing unauthorized exemptions: up to 1661 only 10 per cent of income \nfrom the royal domain reached the king. Reform had to overcome vested interests: the \n*taille*was collected by officers of the Crown who had purchased their post at a high price, \nand punishment of abuses necessarily lowered the value of the purchase. Nevertheless, \nColbert achieved excellent results, with the deficit of 1661 turning into a surplus by 1666, \nwith interest on the debt decreasing from 52 million to 24 million livres. The*taille*was \nreduced to 42 million in 1661 and 35 million in 1665, while revenue from indirect taxation \nprogressed from 26 million to 55 million. The revenues of the royal domain were raised from 80,000 livres in 1661 to 5.5 million \nin 1671. In 1661, the receipts were equivalent to 26 million British pounds, of which 10 million reached the treasury. The \nexpenditure was around 18 million pounds, leaving a deficit of 8 million. In 1667, the net receipts had risen to 20 million pounds \nsterling, while expenditure had fallen to 11 million, leaving a surplus of 9 million pounds. \n\nMembers of the*Académie des*\n*sciences*with Louis in 1667; in the \nbackground appears the new Paris \nObservatory. \n\nMoney was the essential support of the reorganized and enlarged army, the panoply of Versailles, and the growing civil \nadministration. Finance had always been the weakness of the French monarchy: tax collection was costly and inefficient; direct \ntaxes dwindled as they passed through the hands of many intermediate officials; and indirect taxes were collected by private \ncontractors called tax farmers who made a handsome profit. The state coffers leaked at every joint. \n\nThe main weakness arose from an old bargain between the French crown and nobility: the king might raise taxes on the nation \nwithout consent if only he exempted the nobility. Only the \"unprivileged\" classes paid direct taxes, which came to mean the \npeasants only, as most bourgeois finagled exemptions in one way or another. The system laid the whole burden of state expenses \non the backs of the poor and powerless. After 1700, with the support of Louis's pious secret wife Madame de Maintenon, the king", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis XIV was born on 5 September 1638 in the Château de Saint-Germain-en- \nLaye, to Louis XIII and Anne of Austria. He was named Louis Dieudonné \n(Louis the God-given)[7] and bore the traditional title of French heirs apparent: \n*Dauphin*.[8] At the time of his birth, his parents had been married for 23 years. \nHis mother had experienced four stillbirths between 1619 and 1631. Leading \ncontemporaries thus regarded him as a divine gift and his birth a miracle of \nGod.[9] \n\nLouis's relationship with his mother was uncommonly affectionate for the time. \nContemporaries and eyewitnesses claimed that the Queen would spend all her \ntime with Louis.[10] Both were greatly interested in food and theatre, and it is \nhighly likely that Louis developed these interests through his close relationship \nwith his mother. This long-lasting and loving relationship can be evidenced by \nexcerpts in Louis's journal entries, such as: \n\n\"Nature was responsible for the first knots which tied me to my \nmother. But attachments formed later by shared qualities of the \nspirit are far more difficult to break than those formed merely by \nblood.\"[11] \n\n\n \n \n \n \n [html]\n
Louis, Grand Dauphin
Marie Therese, Madame
Royale
Philippe Charles, Duke of
< underline > Anjou
INegitimate :
Marie Anne, Princess of Conti
Louis, Count of Vermandois
Louis Auguste, Duke of Maine
Louis Cesar, Count of Vexin
Louise Francoise, Princess of
Conde
Louise Marie Anne,
Mademoiselle de Tours
Louise, Baroness of La
Queue
Francoise Marie, Duchess of
Orleans
Louis Alexandre, Count of
Toulouse
\n\nIt was his mother who gave Louis his belief in the absolute and divine power of \nhis monarchical rule.[12] \n\nDuring his childhood, he was taken care of by the governesses Françoise de \nLansac and Marie-Catherine de Senecey. In 1646, Nicolas V de Villeroy \nbecame the young king's tutor. Louis XIV became friends with Villeroy's young \nchildren, particularly François de Villeroy, and divided his time between the \nPalais-Royal and the nearby Hotel de Villeroy. \n\n**House**\n\n**Father**\n\n**Mother**\n\n**Religion**\n\n**Signature**\n**Minority and the*Fronde***\n\n\n\n**Accession**\n\nSensing imminent death in the spring of 1643, King Louis XIII decided to put his affairs in \norder for his four-year-old son Louis XIV. Not trusting the judgement of his Spanish wife \nQueen Anne, who would normally have become the sole regent of France, the king \ndecreed that a regency council would rule on his son's behalf, with Anne at its head.[13] \n\nLouis XIII died on 14 May 1643. On 18 May[14] Queen Anne had her husband's will \nannulled by the*Parlement de Paris*, a judicial body of nobles and high-ranking clergy,[15] \nand she became sole regent. She exiled her husband's ministers Chavigny and Bouthilier \nand appointed the Count of Brienne as her minister of foreign affairs.[16] Anne kept the \ndirection of religious policy strongly in hand until her son's majority in 1661.", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", + "target_page": 13, + "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "succeeded to his father's throne.[90] The signatories, however, omitted to consult the ruler \nof these lands, and Charles II was passionately opposed to the dismemberment of his \nempire. In 1699, he re-confirmed his 1693 will that named Joseph Ferdinand as his sole \nsuccessor.[91] \n\nSix months later, Joseph Ferdinand died. Therefore, in 1700, Louis and William III \nconcluded a fresh partitioning agreement, the Treaty of London. This allocated Spain, the \nLow Countries, and the Spanish colonies to the Archduke. The Dauphin would receive all \nof Spain's Italian territories.[92] Charles II acknowledged that his empire could only remain \nundivided by bequeathing it entirely to a Frenchman or an Austrian. Under pressure from \nhis German wife, Maria Anna of Neuburg, Charles II named Archduke Charles as his sole \nheir. \n\n\n\n\n\n**Acceptance of the will of Charles II and consequences**\n\nOn his deathbed in 1700, Charles II of Spain \nunexpectedly \nclear \ndemonstration of French military superiority for \nmany decades before this time, the pro-French \nfaction at the court of Spain, and even Pope \nInnocent XII convinced him that France was more likely to preserve his empire intact. He \nthus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided \nit remained undivided. Anjou was not in the direct line of French succession, thus his \naccession would not cause a Franco-Spanish union.[92] If Anjou refused, the throne would \nbe offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, \nit would go to Archduke Charles, then to the distantly related House of Savoy if Charles \ndeclined it.[93] \n\nchanged his will. The \n\nPhilip V of Spain \n\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish \npossessions and avoid a general war, or accept Charles II's will and alienate much of \nEurope. He may initially have been inclined to abide by the partition treaties, but the \nDauphin's insistence persuaded him otherwise.[94] Moreover, Louis's foreign minister, \nJean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would \nalmost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He \nemphasised that, should it come to war, William III was unlikely to stand by France since \nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\".[91] Indeed, in the event of war, it might be \npreferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, \nDuke of Anjou, thus became Philip V, King of Spain. \n\nLouis in 1701 \n\nMost European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted \nreasonably or arrogantly.[95] He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly, \nhe may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were \ncertainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure \nDutch recognition of Philip V. In 1701, Philip transferred the*asiento*(the right to supply slaves to Spanish colonies) to France, as \na sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of \nJames II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and \nthe Dutch Republic.[96] With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and \ndeclared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies.[97] \n\n**Commencement of fighting**", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia5.pdf" + }, + { + "text": "In July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied \narmy led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the \nattention of these troops. This led to the bombardment of Brussels, in which more than 4,000 \nbuildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three \nweeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the \nbombardment \"as barbarous as it was useless\".[85] \n\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret \nbilateral talks began, but to no avail.[86] Louis tried to break up the alliance against him by dealing \nwith individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the \nTreaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the \npeace table, and negotiations for a general peace began in earnest, culminating in the Peace of \nRyswick of 1697.[87] \n\nMarshal de Luxembourg \n\n**Peace of Ryswick**\n\nThe Peace of Ryswick ended the War of the League of Augsburg and disbanded the Grand Alliance. By manipulating their \nrivalries and suspicions, Louis divided his enemies and broke their power. \n\nThe treaty yielded many benefits for France. Louis secured permanent French sovereignty over all of Alsace, including \nStrasbourg, and established the Rhine as the Franco-German border (as it is to this day). Pondichéry and Acadia were returned to \nFrance, and Louis's*de facto*possession of Saint-Domingue was recognised as lawful. However, he returned Catalonia and most of \nthe Reunions. \n\nFrench military superiority might have allowed him to press for more advantageous terms. Thus, his generosity to Spain with \nregard to Catalonia has been read as a concession to foster pro-French sentiment and may ultimately have induced King Charles II \nto name Louis's grandson Philip, Duke of Anjou, heir to the Spanish throne.[88] In exchange for financial compensation, France \nrenounced its interests in the Electorate of Cologne and the Palatinate. Lorraine, which had been occupied by the French since \n1670, was returned to its rightful Duke Leopold, albeit with a right of way to the French military. William and Mary were \nrecognised as joint sovereigns of the British Isles, and Louis withdrew support for James II. The Dutch were given the right to \ngarrison forts in the Spanish Netherlands that acted as a protective barrier against possible French aggression. Though in some \nrespects the Treaty of Ryswick may appear a diplomatic defeat for Louis since he failed to place client rulers in control of the \nPalatinate or the Electorate of Cologne, he did fulfil many of the aims laid down in his 1688 ultimatum.[89] In any case, peace in \n1697 was desirable to Louis, since France was exhausted from the costs of the war. \n\n**War of the Spanish Succession**\n\n\n \n \n \n \n [html]\n
Comparison
Causes and build - up to the war
By the time of the Peace of Ryswick, the Spanish succession haywars. King Charles. II ruled a vast empire comprising Spair Spanish colonies. He produced no children, however, and conse
", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia5.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Causes and build - up to the warBy the time of the Presee of Ryswick, the Spatiels had been a source of concerns in Earspean beaders for well or years. King Che / ey... If noled a vast empire comprising Spain, Naples, Sic33y, Milan, the Spanids Netherlands, and nSpanish col
\n\nThe principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived \nfrom Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest \ndaughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two \ngenerations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the \nrenunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no \nrenunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's \nyoungest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the \nbalance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife \nMargaret Theresa of Spain (the younger daughter of Philip IV). \n\nIn an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided \nSpain's Italian territories between Louis's son*le Grand Dauphin*and Archduke Charles, with the rest of the empire awarded to \nJoseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia5.pdf" + }, + { + "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. \n\n\n\n**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV \n\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in \nEurope, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies \nin the East and West Indies; and Holland with all its possessions in the four corners of the world where it has \ngreat establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, \nDenmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states \nsecretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting \nand covering their trade.[65] \n\nVauban was pessimistic about France's so-called friends and allies: \n\nFor lukewarm, useless, or impotent friends, France has the Pope, who is indifferent; the King of England \n[James II] expelled from his country; the Grand Duke of Tuscany; the Dukes of Mantua, Modena, and Parma [all \nin Italy]; and the other faction of the Swiss. Some of these are sunk in the softness that comes of years of \npeace, the others are cool in their affections....The English and Dutch are the main pillars of the Alliance; they \nsupport it by making war against us in concert with the other powers, and they keep it going by means of the \nmoney that they pay every year to... Allies.... We must therefore fall back on privateering as the method of \nconducting war which is most feasible, simple, cheap, and safe, and which will cost least to the state, the more \nso since any losses will not be felt by the King, who risks virtually nothing....It will enrich the country, train many \ngood officers for the King, and in a short time force his enemies to sue for peace.[66] \n\n**Edict of Fontainebleau**", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "The French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St \nGermain for a time, where no one, except a few intimates, was allowed to disturb him.[47] French military advantages allowed \nthem however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual \nexhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the \nScanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of Saint- \nGermain-en-Laye, Fontainebleau and Lund imposed on Denmark–Norway and Brandenburg.[48] Yet Louis's two primary goals, \nthe destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed.[49] \n\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In \n1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too \nmuch with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military \nforce alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary \ntreaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his \nrights and obligations under those treaties. \n\nCities and territories, such as Luxembourg and Casale, were prized for their strategic \npositions on the frontier and access to important waterways. Louis also sought \nStrasbourg, an important strategic crossing on the left bank of the Rhine and theretofore \na Free Imperial City of the Holy Roman Empire, annexing it and other territories in \n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and \nwas thus not ceded to France in the Peace of Westphalia. \n\n**Silver coin of Louis XIV, dated**\n**1674**\n\n\n\n\n \n \n \n \n [html]\n
Strategy, negative minimally, By nch occupationObverse. The Latin inscription isLVDOVICVS xIIID ( EI ) GRA ( TIA ) (“ LouisReverse. The Latin inscription is rRAN ( cuE ) ET NAVARRAE REX 1674
Size and power c opinion wasXIV, by the grace of God *).(“ King of France j and of Navarre, 1674 ”).
\n\n\n\n**Non-European relations and the colonies**\n\nFrench colonies multiplied in Africa, the Americas, and Asia during Louis's reign, and \nFrench explorers made important discoveries in North America. In 1673, Louis Jolliet and \nJacques Marquette discovered the Mississippi River. In 1682, René-Robert Cavelier, Sieur \nde La Salle, followed the Mississippi to the Gulf of Mexico and claimed the vast \nMississippi basin in Louis's name, calling it*Louisiane*. French trading posts were also \nestablished in India, at Chandernagore and Pondicherry, and in the Indian Ocean at Île \nBourbon. Throughout these regions, Louis and Colbert embarked on an extensive program \nof architecture and urbanism meant to reflect the styles of Versailles and Paris and the \n'gloire' of the realm.[52] \n\nThe Persian embassy to Louis XIV \nsent by Soltan Hoseyn in 1715. \n*Ambassade de Perse auprès de*\n*Louis XIV*, studio of Antoine Coypel.", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia5.pdf" + }, + { + "text": "The Nine Years' War, which lasted from 1688 to 1697, initiated a period of decline in \nLouis's political and diplomatic fortunes. It arose from two events in the Rhineland. First, \nin 1685, the Elector Palatine Charles II died. All that remained of his immediate family \nwas Louis's sister-in-law, Elizabeth Charlotte. German law ostensibly barred her from \nsucceeding to her brother's lands and electoral dignity, but it was unclear enough for \narguments in favour of Elizabeth Charlotte to have a chance of success. Conversely, the \nprincess was demonstrably entitled to a division of the family's personal property. Louis \npressed her claims to land and chattels, hoping the latter, at least, would be given to her.[76] \nThen, in 1688, Maximilian Henry of Bavaria, Archbishop of Cologne, an ally of France, \ndied. The archbishopric had traditionally been held by the Wittelsbachs of Bavaria, but the \nBavarian claimant to replace Maximilian Henry, Prince Joseph Clemens of Bavaria, was at \nthat time not more than 17 years old and not even ordained. Louis sought instead to install \nhis own candidate, Wilhelm Egon von Fürstenberg, to ensure the key Rhenish state \nremained an ally.[77] \n\nIn light of his foreign and domestic policies during the early 1680s, which were perceived \nas aggressive, Louis's actions, fostered by the succession crises of the late 1680s, created \nconcern and alarm in much of Europe. This led to the formation of the 1686 League of \nAugsburg by the Holy Roman Emperor, Spain, Sweden, Saxony, and Bavaria. Their stated \nintention was to return France to at least the borders agreed to in the Treaty of \nNijmegen.[78] Emperor Leopold I's persistent refusal to convert the Truce of Ratisbon into \na permanent treaty fed Louis's fears that the Emperor would turn on France and attack the \nReunions after settling his affairs in the Balkans.[79] \n\n\n\nAnother event Louis found threatening was England's Glorious Revolution of 1688. \nAlthough King James II was Catholic, his two Anglican daughters, Mary and Anne, \nensured the English people a Protestant succession. But when James II's son James Francis \nEdward Stuart was born, he took precedence in succession over his sisters. This seemed to \nherald an era of Catholic monarchs in England. Protestant lords called on the Dutch Prince \nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's \nwarning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest \nto him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-in- \nlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus \ntransforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to \nEngland to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to \nthe German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. \nThis military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army \nof sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation \nof the Palatinate\").[80] \n\nLouis in 1690", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia5.pdf" + }, + { + "text": "negotiations in 1709 and 1710. France retained Île-Saint-Jean and Île Royale, and Louis acquired a few minor European \nterritories, such as the Principality of Orange and the Ubaye Valley, which covered transalpine passes into Italy. Thanks to Louis, \nhis allies the Electors of Bavaria and Cologne were restored to their prewar status and returned their lands.[102] \n\n\n\n**Personal life**\n\n**Marriages and children**\n\nLouis and his wife Maria Theresa of Spain had six children from the marriage contracted \nfor them in 1660. However, only one child, the eldest, survived to adulthood: Louis,*le*\n*Grand Dauphin*, known as*Monseigneur*. Maria Theresa died in 1683, whereupon Louis \nremarked that she had never caused him unease on any other occasion. \n\nDespite evidence of affection early on in their marriage, Louis was never faithful to Maria \nTheresa. He took a series of mistresses, both official and unofficial. Among the better \ndocumented are Louise de La Vallière (with whom he had five children; 1661–1667), \nBonne de Pons d'Heudicourt (1665), Catherine Charlotte de Gramont (1665), Françoise- \nAthénaïs, Marquise de Montespan (with whom he had seven children; 1667–1680), Anne \nde Rohan-Chabot (1669–1675), Claude de Vin des Œillets (one child born in 1676), \nIsabelle de Ludres (1675–1678), and Marie Angélique de Scorailles (1679–1681), who died at age \n19 in childbirth. Through these liaisons, he produced numerous illegitimate children, most of \nwhom he married to members of cadet branches of the royal family. \n\nWedding of Louis and Maria \nTheresa \n\nLouis proved relatively more faithful to his second wife, Françoise d'Aubigné, Marquise de \nMaintenon. He first met her through her work caring for his children by Madame de Montespan, \nnoting the care she gave to his favourite, Louis Auguste, Duke of Maine.[103] The king was, at \nfirst, put off by her strict religious practice, but he warmed to her through her care for his \nchildren.[103] \n\nWhen he legitimized his children by Madame de Montespan on 20 December 1673, Françoise \nd'Aubigné became the royal governess at Saint-Germain.[103] As governess, she was one of very \nfew people permitted to speak to him as an equal, without limits.[103] It is believed that they were \nmarried secretly at Versailles on or around 10 October 1683[104] or January 1684.[105] This \nmarriage, though never announced or publicly discussed, was an open secret and lasted until his \ndeath.[106] \n\nDual Cypher of King \nLouis XIV & Queen Marie \nThérèse \n\n\n\n**Piety and religion**\n\nLouis was a pious and devout king who saw himself as the head and protector of the \nCatholic Church in France. He made his devotions daily regardless of where he was, \nfollowing the liturgical calendar regularly.[107] Under the influence of his very religious \nsecond wife, he became much stronger in the practice of his Catholic faith.[108] This \nincluded banning opera and comedy performances during Lent.[108] \n\nTowards the middle and the end of his reign, the centre for the King's religious \nobservances was usually \nthe Chapelle Royale at Versailles. Ostentation was a \ndistinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and \nspecial ceremonies.[109] Louis established the Paris Foreign Missions Society, but his \nfor undermining \ninformal alliance with \nChristendom.[110] \n\nthe Ottoman Empire was criticised \n\n**Patronage of the arts**\n\nLouis generously supported the royal court of France and those who worked under him. He brought the Académie Française \nunder his patronage and became its \"Protector\". He allowed Classical French literature to flourish by protecting such writers as \nMolière, Racine, and La Fontaine, whose works remain influential to this day. Louis also patronised the visual arts by funding and \ncommissioning artists such as Charles Le Brun, Pierre Mignard, Antoine Coysevox, and Hyacinthe Rigaud, whose works became", + "page_start": 15, + "page_end": 15, + "source_file": "wikipedia5.pdf" + }, + { + "text": "important both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's \nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish \nthrone would ultimately be delivered to the House of Bourbon.[32] \n\n**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] \n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "and Lionne, however, made the renunciation conditional on \nthe full payment of a Spanish dowry of 500,000 écus.[40] \nThe dowry was never paid and would later play a part \npersuading his maternal first cousin Charles II of Spain to \nleave his empire to Philip, Duke of Anjou (later Philip V of \nSpain), the grandson of Louis XIV and Maria Theresa. \n\nThe War of Devolution did not focus on the payment of the \ndowry; rather, the lack of payment was what Louis XIV \nused as a pretext \nfor nullifying Maria Theresa's \nrenunciation of her claims, allowing the land to \"devolve\" \nto him. In Brabant (the location of the land in dispute), \nchildren of \ntraditionally were not \ndisadvantaged by their parents' remarriages and still \ninherited property. Louis's wife was Philip IV's daughter by \nhis first marriage, while the new king of Spain, Charles II, was his son by a subsequent \nmarriage. Thus, Brabant allegedly \"devolved\" to Maria Theresa, justifying France to attack \nthe Spanish Netherlands. \n\nLouis XIV in 1670, \nengraved portrait by Robert \nNanteuil \nfirst marriages \n\nThe future Philip V being introduced \nas King of Spain by his grandfather, \nLouis XIV \n\n\n\n**Relations with the Dutch**\n\nDuring the Eighty Years' War with Spain, France supported the Dutch Republic as part \nof a general policy of opposing Habsburg power. Johan de Witt, Dutch Grand \nPensionary from 1653 to 1672, viewed this as crucial for Dutch security and a \ncounterweight against his domestic Orangist opponents. Louis provided support in the \n1665-1667 Second Anglo-Dutch War but used the opportunity to launch the War of \nDevolution in 1667. This captured Franche-Comté and much of the Spanish \nNetherlands; French expansion in this area was a direct threat to Dutch economic \ninterests.[41] \n\nThe Battle of Tolhuis, Louis XIV crosses \nthe Lower Rhine at Lobith on 12 June \n1672; Rijksmuseum Amsterdam \n\nThe Dutch opened talks with Charles II of England on a common diplomatic front \nagainst France, leading to the Triple Alliance, between England, the Dutch and \nSweden. The threat of an escalation and a secret treaty to divide Spanish possessions \nwith Emperor Leopold, the other major claimant to the throne of Spain, led Louis to relinquish many of his gains in the 1668 \nTreaty of Aix-la-Chapelle.[42] \n\n\n\nLouis placed little reliance on his agreement with Leopold and as it was now clear French and Dutch aims were in direct conflict, \nhe decided to first defeat the Republic, then seize the Spanish Netherlands. This required breaking up the Triple Alliance; he paid \nSweden to remain neutral and signed the 1670 Secret Treaty of Dover with Charles, an Anglo-French alliance against the Dutch \nRepublic. In May 1672, France invaded the Republic, supported by Münster and the Electorate of Cologne.[43] \n\nRapid French advance led to a coup that toppled De Witt and brought William III to power. \nLeopold viewed French expansion into the Rhineland as an increasing threat, especially after \nthey seized the strategic Duchy of Lorraine in 1670. The prospect of Dutch defeat led Leopold \nto an alliance with Brandenburg-Prussia on 23 June, followed by another with the Republic on \n25th.[44] Although Brandenburg was forced out of the war by the June 1673 Treaty of Vossem, \nin August an anti-French alliance was formed by the Dutch, Spain, Emperor Leopold and the \nDuke of Lorraine.[45]", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia5.pdf" + }, + { + "text": "The French alliance was deeply unpopular in England, and only more so after the \ndisappointing battles against Michiel de Ruyter's fleet. Charles II of England made peace with \nthe Dutch in the February 1674 Treaty of Westminster. However, French armies held \nsignificant advantages over their opponents; an undivided command, talented generals like \nTurenne, Condé and Luxembourg and vastly superior logistics. Reforms introduced by \nLouvois, the Secretary of War, helped maintain large field armies that could be mobilised \nmuch more quickly, allowing them to mount offensives in early spring before their opponents \nwere ready.[46] \n\nLouis XIV, 1670, by Claude \nLefèbvre", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", + "target_page": 5, + "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "– 31.[ 48 ]Schulte A, Degenbeck J, Aue A, Schinder - Ute M, Schioti F, Schneider M, Monoranu CM, Bishner M, Pharn M, Antonadeis G, Blunn R, Rithnei HL, Human dorsal root ganglia after plexus injury ; elther preservation or loss of the multicellular uni[ 49 ]Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, BlumR, Aus A, Unbiased analysis of the dorsal root ganglion after peripheral nerve injury : ro neuronal loss, no gliosis, but satellite glial cell plasticity, PAIN 2023 ; 164 : 728 -[ 50 ]Shi TuS, Tandrup T, Bergman E, Xu ZOD, Ulthake B, Hiskteit T. Effect of peripheral nerve injury on dorsal root ganglion neurons in the C57 BL / SJ", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "Peripheral nerve injury results in a biased loss of \nsensory neuron subpopulations \nAndrew H. Coopera, Allison M. Barryb, Paschalina Chrysostomidoua, Romane Loligniera, Jinyi Wanga, \nMagdalena Redondo Canalesa, Heather F. Tittertona, David L. Bennettb, Greg A. Weira,*\n\nAbstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. \n\n1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgDChR2-YFP L4 \nDRGs 4 weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue \nsections. Scale bars 5 100 mm. (C) Quantification of total number of MrgD-YFP1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. \nTwo-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach \nused to generate data presented in (E–G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to \ninjury. White boxes represent regions enlarged in (F). Scale bars 5 100 mm (E) or 20 mm (F). (G) The proportion of FB-labelled DRG neurons decreased after spared \nnerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; side 3 injury interaction: \nF1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests:*P , 0.05,**P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, \nFastBlue; RM, repeated measures.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed2.pdf" + }, + { + "text": "2.9. Statistical analysis \nData are expressed as mean 6 SEM unless otherwise specified, \nand P values of less than 0.05 were considered significant. Power \ncalculations were performed using G*Power 3.1.9.7.15 A \nquantitative Venn diagram was created using BioVenn.25 All \nother statistical analyses were performed in Prism 10 (GraphPad \nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way \nRM ANOVAs (repeated measures analysis of variance), where \nappropriate. Normality was assessed by the Shapiro–Wilk test. If \nˇS´ıd ´ak or \nthe main analysis of variance effect was significant, \nTukey multiple comparisons tests were performed. To compare \npopulation distributions of soma cross-sectional area or volume, \nKolmogorov–Smirnov tests were performed. \n\nAs a third complementary approach, we applied semiauto- \nmated volumetric analyses of nuclei size following tissue clearing. \nIn this study, whole DRGs were cleared 4 weeks after SNItrans for \nnuclei counting in “complete” tissue (Figs. 2E–H). Nuclei were \nlabelled by TDP-43, in line with the study by West et al.,67 and \nwere quantified using Imaris software (Fig. 2F, Video 1). We \nobserved a slight but significant rightward shift in nuclear spot \nvolume population distribution 4 weeks after SNItrans (Fig. 2G). In \naddition, there was a significant reduction in the number of small \nbut not medium or large nuclear spots, in support of a loss of \nsmall-diameter neuron populations (Fig. 2H). \n\n3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent \n\nTo assess the gross loss of neurons from DRG following nerve \ninjury, we generated the AvilFlpO;Atf3CreERT2;RC::FLTG mouse \nline in which na¨ıve and axotomized sensory neurons were \ndifferentially labelled. In this mouse line, all neurons express \nin the na¨ıve state and switch to \ntdTomato (Flp-dependent) \nexpressing green fluorescent protein (GFP) upon axonal damage \nand concurrent tamoxifen treatment (Flp- and Cre-dependent) \n(Figs. 1A and B). Following pilot experiments to optimize \ntamoxifen dosing regimen, this approach was both highly efficient \nand specific (with the caveat that it was necessary to wait for \nseveral days after nerve injury for Cre-induced GFP expression): \n14 days after SNItrans surgery, GFP was expressed by 99.1 6 \n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we \nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons \n(Figs. S2A–D, http://links.lww.com/PAIN/C84). We then used \na stereological approach to quantify the total number of neurons \nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as \nto injury. One week after SNItrans, we \nwell as contralateral", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2864 \n\n2.2. Spared nerve transection and crush surgeries \nneuron loss after nerve injury and to test the hypothesis that loss is \nnot equally distributed across molecular populations. \n\n2. Methods \n\n2.1. Animals \n\nMice were housed in groups in humidity- and temperature-controlled \nrooms with free access to food and water, on a 12-hour light–dark \ncycle, and with environmental enrichment. Animal procedures were \nperformed under a UK Home Office Project Licence and in \naccordance with the UK Home Office (Scientific Procedures) Act \n(1986). All studies were approved by the Ethical Review Process \nApplications Panel of the University of Glasgow or Oxford and conform \nto the ARRIVE guidelines. Experiments were performed on adult male \nand female mice aged 7 to 16 weeks at the start of the experiments. All \nexperimental cohorts contained a mix of male and female mice, apart \nfrom the cohort of MrgprdCreERT2;Ai32 mice that underwent SNIcrush \nsurgery, which was exclusively female. Details of transgenic lines are \nprovided in Table 1. Tamoxifen was administered by i.p. injection of \n20 mg/mL tamoxifen (Sigma-Aldrich) dissolved in wheat germ oil \n(doses described in Table 1). There were 2 instances where animals \nwere excluded from data analysis: One (cyan fluorescent protein) \nThy1-CFP died of unknown causes not related to the procedure and \nbefore the experimental endpoint, and one MrgDCreERT2;Ai32 \nexhibited no fluorophore expression and was therefore deemed to \nhave been incorrectly genotyped. Group sizes were based on the \nextent of neuronal \nloss 28d following sciatic nerve transection \nidentified by Shi et al.50 Given a 5 0.05, power 5 0.8, and an effect \nsize of 4.81, power analysis projects that a group size of 3 mice would \nbe needed. \n\nSpared nerve injury (transection of the common peroneal and \ntibial branches of \nthe sciatic nerve; SNItrans) and common \nperoneal and tibial crush injury (SNIcrush), in which nerve axons \nwere severed but \nthe epineurium remained intact, were \nperformed as previously described.12 Anesthesia was induced \nwith 3% to 5% isoflurane and then maintained at 1.5% to 2% as \nrequired. Analgesia, consisting of carprofen (10 mg/kg) and \nbuprenorphine (0.05 mg/kg) (Glasgow) or carprofen (5 mg/kg) \nand local bupivacaine (2 mg/kg) (Oxford) was provided perioper- \natively. The left hindpaw was secured with tape in hip abduction, \nand the operative field (lateral surface of the thigh) was shaved. \nOphthalmic ointment was applied to the eyes, and the shaved \narea was swabbed with chlorhexidine solution. A longitudinal \nincision was made in the skin at the lateral mid-thigh. Using blunt \ndissection, an opening was made through the biceps femoris, \nexposing the sciatic nerve and the 3 peripheral branches (sural, \ntibial, and common peroneal nerves). For SNItrans, the common \nperoneal and tibial nerves were ligated using a 6-0 Vicryl suture \n(Ethicon, Raritan, NJ), and a 1- to 2-mm piece distal to the suture \nwas removed using spring scissors. For SNIcrush, the exposed \ntibial and common peroneal nerves were clamped using a pair of \nfine hemostats (Fine Science Tools, Heidelberg, Germany) closed \nleaving the nerve branches intact but \nto their second clip, \ntranslucent. The muscle was closed with one 6-0 Vicryl suture \n(Ethicon), and the skin incision was closed with one 10 mm \nwound clip (Alzet, Cupertino, CA). Animals were monitored daily \nfor self-mutilation, and no animals required sacrifice due to tissue \ndamage.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed2.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2872 \n\ninjury (Fig. S6A–C, http://links.lww.com/PAIN/C84), indicating \nthat any loss of neurons within specific neuronal subpopulations \nwas not biased towards soma size. Collectively, these data show \nthat unrepaired axonal damage to peripheral sensory neurons \ninduces a partial loss of Trpm81 and CGRP1 subpopulations, \nbut no major loss of myelinated afferents. \nBased on our findings of preferential \n\ndeveloped transgenic recombinase driver lines, we have \nshown that \nloss is biased across molecularly defined \nsubpopulations. Nonpeptidergic nociceptive neurons are \nparticularly susceptible to loss, with almost all Mrgprd1 \naxotomized afferents lost following an unrepaired transection \ninjury (SNItrans) and roughly half lost following a model which \ncontrastingly allows for nerve regenerations (SNIcrush). \nFinally, we have observed that the vulnerability of Mrgprd1 \nneurons extends to the in vitro setting and provide data to \nsupport \nloss is driven by a lack of \nthe hypothesis that \nneurotrophic support following injury. \n\nloss of nonpeptidergic \nnociceptors, we re-analyzed a previous population-specific \ntranscriptomic dataset of mouse DRG neurons following nerve \ninjury for potential upregulation of cell death pathways (Fig. S7, \nhttp://links.lww.com/PAIN/C84).3 We found that early after injury \n(3 days post-SNItrans), nonpeptidergic (MrgDCreERT2-expressing) \nneurons showed enhanced enrichment of GO terms associated \nwith apoptosis, in contrast to a broad population of nociceptors \n(labelled with Scn10aCreERT2), peptidergic nociceptors (Calca- \nCreERT2), C-LTMRs (ThCreERT2), and Ab-RA (rapidly adapting) and \nAd-LTMRs (Ad/Ab-LTMR, Ntrk2CreERT2;AdvillinFlpO), \nin which \nthere was less or no enrichment of cell death pathways. By \n4 weeks, only C-LTMR and Ad/Ab-LTMR subtypes show any \noverrepresentation of cell death pathways (in the populations \nstudied). Both injury-specific and apoptotic signatures in non- \npeptidergic neurons were no longer significantly enriched, \nconsistent with a loss of axotomized nonpeptidergic afferents \nby this late timepoint postinjury. These data suggest \nthat \napoptotic pathways are upregulated acutely after injury in a cell- \ntype-specific manner. \n\nThe question of whether DRG neurons die following traumatic \ninjury has been addressed by several groups over the last few \ndecades. Despite contrasting findings on the extent, timing, and \nform that loss takes, most studies have observed frank loss of \nDRG neurons.6,38,46,53 However, more recent studies using \nrecombinase driver lines and novel machine-learning approaches \nhave cast doubt on this consensus.44,49 Our data strongly \nsupport the loss hypothesis and suggest that approximately 60% \nof axotomized afferents die within 2 weeks of SNI. The \ndiscrepancy between our findings and other recent studies may \nbe partly explained by the sampling method used to estimate \nneuronal numbers. For example, Schulte et al.49 developed \na novel machine-learning approach and found no reduction in \nneuron density across serial sections of rat DRG following SNI, \nand they inferred from this that frank loss did not occur. Our \nresults are congruous, in that we also observed no reduction in \nneuron density. However, we found a substantial loss in the total \nneuron-containing volume of injured DRG, which underlies our \ncontrasting conclusion of \nfrank loss. Of note, morphological \nvolumetric analysis and MRI have also previously demonstrated \nvolume loss in both rodent and human DRG following nerve \ninjury.35,65,66 These findings occur despite a major increase of \nnonneuronal cells in the injured DRG30 and support the notion \nthat the total DRG neuron number is decreased.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What are the EU's key nature conservation commitments for 2030?", + "target_page": 6, + "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. \n\nIn all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. \n\nThe Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. \n\n\n \n \n \n \n [html]\n
1.
Differentiations
Employees
", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. \n\nThe Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately.", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "build on the headline ambition to ensure that by 2050**all of the world’s ecosystems are**\n**restored, resilient, and adequately protected.**The world should commit to the net-gain \nprinciple to give nature back more than it takes. As part of this, the world should commit \nto no human-induced extinction of species, at minimum where avoidable. \n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to \nensure that**Europe's biodiversity will be on the path to recovery by 2030**for the \nbenefit of people, the planet, the climate and our economy, in line with the 2030 Agenda \nfor Sustainable Development and with the objectives of the Paris Agreement on Climate \nChange. It addresses the five main drivers of biodiversity loss, sets out an enhanced \ngovernance framework to fill remaining gaps, ensures the full implementation of EU \nlegislation, and pulls together all existing efforts. This strategy is enterprising and \nincentivising in spirit and action. It reflects the fact that**protecting and restoring nature**\n**will need more than regulation alone**. It will require action by citizens, businesses, \nsocial partners and the research and knowledge community, as well as strong \npartnerships between local, regional, national and European level. This strategy is in line \nwith the ambitions and commitment set out in President von der Leyen’s Political \nGuidelines and in the European Green Deal. \n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central \nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to \nfuture zoonosis outbreaks and \ninvestment \nto provide \nopportunities for restoring the EU’s economy. \n\nimmediate business and \n\nAll new initiatives and proposals will be underpinned by the Commission’s better \nregulation tools. Based on public consultations and on the identification of the \nenvironmental, social and economic impacts, impact assessments will contribute to \nensuring that all initiatives achieve their objectives in the most effective and least \nburdensome way and live up to a green oath to “do no harm”. \n\n**2. PROTECTING AND RESTORING NATURE IN THE EUROPEAN UNION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore \nhabitats and species. But protection has been incomplete, restoration has been small- \nscale, and the implementation and enforcement of legislation has been insufficient17. \n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection \nand restoration of nature. This should be done by improving and**widening our network**\n**of protected areas**and by developing an ambitious**EU Nature Restoration Plan**. \n\n**2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally \nprotected areas, including those under strict protection, is not sufficiently large to \nsafeguard biodiversity. Evidence shows that the targets defined under the Convention on \nBiological Diversity are insufficient to adequately protect and restore nature18. Global \n\n17 Mid-term review of the EU Biodiversity Strategy to 2020 (COM(2015) 478 and SWD(2015) 187); \nFitness Check of the EU Nature Legislation (Birds and Habitats Directives) (SWD(2016) 472); Fitness \nCheck of the EU Water Legislation (SWD(2019) 439). \n\n\n \n \n \n \n [html]\n
while scTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "encouraging cooperation in**education for environmental sustainability**in 2021. This \nwill provide guidance for schools and teachers on how to cooperate and exchange \nexperiences across Member States on biodiversity teaching. The Commission will also \nprovide support materials and facilitate the exchange of good practices in EU networks of \nteacher-training programmes. \n\n**4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to \nmeet the United Nations Sustainable Development Goals. It will be mainstreamed \nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal \ndiplomacy’, and forthcoming green alliances76. The Commission will work closely with \nthe European Parliament and Member States to ensure a high level of EU ambition and \nmobilise all efforts for the good of the world’s biodiversity. \n\n**4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global \nefforts under the United Nations Convention on Biological Diversity have largely been \ninsufficient. Nature cannot afford any half measures or lack of ambition. \n\nIn this spirit, the EU is ready to lead all efforts – working with like-minded partners in**a**\n**high-ambition coalition on biodiversity**– to agree an ambitious new global framework \nfor post-2020 at the upcoming 15th Conference of the Parties to the Convention on \nBiological Diversity. \n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: \n\n Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "efforts are needed and the EU itself needs to do more and better for nature and build a \ntruly**coherent Trans-European Nature Network**. \n\nEnlarging protected areas is also an economic imperative. Studies on marine systems \nestimate that every euro invested in marine protected areas would generate a return of at \nleast €319. Similarly, the Nature Fitness Check20 showed that the benefits of Natura 2000 \nare valued at between €200-300 billion per year. The investment needs of the network are \nexpected to support as many as 500,000 additional jobs21. \n\nFor the good of our environment and our economy, and to support the EU’s recovery \nfrom the COVID-19 crisis, we need to protect more nature. In this spirit,**at least 30% of**\n**the land and 30% of the sea should be protected in the EU**. This is a minimum of an \nextra 4% for land and 19% for sea areas as compared to today22. The target is fully in line \nwith what is being proposed23 as part of the post-2020 global biodiversity framework \n(see Section 4). \n\nWithin this, there should be specific focus on areas of very high biodiversity value or \npotential. These are the most vulnerable to climate change and should be granted special \ncare in the form of strict protection24. Today, only 3% of land and less than 1% of marine \nareas are strictly protected in the EU. We need to do better to protect these areas. In this \nspirit, at least one third of protected areas – representing**10% of EU land and 10% of**\n**EU sea – should be strictly protected**. This is also in line with the proposed global \nambition. \n\nAs part of this focus on strict protection, it will be crucial to define, map, monitor and \n**strictly protect all the EU’s remaining primary and old-growth forests**25. It will also \nbe important to advocate for the same globally and ensure that EU actions do not result in \ndeforestation in other regions of the world. Primary and old-growth forests are the richest \nforest ecosystems that remove carbon from the atmosphere, while storing significant \ncarbon stocks. Significant areas of other carbon-rich ecosystems, such as peatlands, \ngrasslands, wetlands, mangroves and seagrass meadows should also be strictly protected, \ntaking into account projected shifts in vegetation zones. \n\nMember States will be responsible for designating the additional protected and strictly \nprotected areas26. Designations should either help to complete the Natura 2000 network \nor be under national protection schemes. All protected areas will need to have clearly \ndefined conservation objectives and measures. The Commission, working with Member \n\n19 Brander et al. (2015), The benefits to people of expanding Marine Protected Areas. \n20 Fitness Check of the EU Nature Legislation (SWD(2016) 472). \n21 Member States’ Prioritised Action Frameworks 2020; Mutafoglu et al. (2017), Natura 2000 and Jobs: \nScoping Study. \n\n22 Latest EU-27 statistics (European database of nationally designated protected areas) v. 2019, and \nNatura 2000 dataset ‘end 2018’. Today, 26% of the EU’s land area is already protected, with 18% as \npart of Natura 2000 and 8% under national schemes. Of EU seas, 11% are protected, with 8% in Natura \n2000 and 3% under additional national protection. To note: offshore wind projects will be possible if in \ncompliance with relevant environmental and nature protection legislation. \n23 Zero draft of the post-2020 global biodiversity framework (CBD/WG2020/2/3), available at \nhttps://www.cbd.int/conferences/post2020/wg2020-02/documents. \n24 Strict protection does not necessarily mean the area is not accessible to humans, but leaves natural \n\nprocesses essentially undisturbed to respect the areas’ ecological requirements. \n\n25 https://www.cbd.int/forest/definitions.shtml; Natura 2000 and Forests. \n26 Additional Natura 2000 designations will be implemented with support from EU funds and \nenforcement as appropriate. \n\n4", + "page_start": 4, + "page_end": 4, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "legislation and guidance on**green public procurement**, the Commission will integrate \ncriteria and monitoring to boost nature-based solutions. \n\n*3.3.3. Measuring and integrating the value of nature*\n\nBiodiversity considerations need to be better integrated into public and business decision- \nmaking at all levels. Building on existing work74, the Commission will develop in 2021 \nmethods, criteria and standards to describe the essential features of biodiversity, its \nservices, values, and sustainable use. \n\nThese will include**measuring the environmental footprint of products and**\n**organisations on the environment**, including through life-cycle approaches and natural \ncapital accounting. In this context, the Commission will support the establishment of an \ninternational natural capital accounting initiative. \n\n*3.3.4. Improving knowledge, education and skills*\n\nThe fight against biodiversity loss must be underpinned by sound science. Investing in \nresearch, innovation and knowledge exchange will be key to gathering the best data and \ndeveloping the best nature-based solutions. Research and innovation can test and develop \nhow to prioritise ‘green’ over ‘grey’ solutions and help the Commission to support \ninvestments in nature-based solutions, such as in old-industrialised, low-income or disaster- \nhit areas. \n\nThe new Skills Agenda will play a key role in the transition to a green economy and the \nfight against biodiversity loss, focusing on training and reskilling of the workforce across \na wide range of sectors. \n\nThe future Horizon Europe programme will include a**long-term strategic research**\n**agenda for biodiversity,**including a science policy mechanism for research-based \noptions for ratcheting up the implementation of biodiversity commitments**,**with \nincreased funding. Horizon Europe’s Missions75 will significantly contribute to filling \nknowledge gaps and finding solutions to improve the health of ecosystems and their \ncontribution to human health. \n\nIn parallel, the Commission will promote and facilitate partnerships, including a \ndedicated Biodiversity Partnership, to make the bridge between science, policy and \npractice and make nature-based solutions a reality on the ground. The Commission will \nalso establish in 2020**a new Knowledge Centre for Biodiversity**in close cooperation \nwith the European Environment Agency. The Centre will: (i) track and assess progress \nby the EU and its partners including in relation to implementation of biodiversity related \ninternational instruments; (ii) foster cooperation and partnership, including between \nclimate and biodiversity scientists; and (iii) underpin policy development. Moreover, the \nCommission will increase its support to the Intergovernmental science-policy Platform on \nBiodiversity and Ecosystem Services. \n\n74 SWD(2019) 305. \n75 Missions on adaptation to climate change including societal transformation, on healthy oceans, seas \ncoastal and inland waters, on climate-neutral and smart cities, and on soil health and food. \n\n18", + "page_start": 18, + "page_end": 18, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive \n\nalien species. \n\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction \n\nofthe use of fertilisers by at least 20%. \n\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. \n12. No chemical pesticides are used in sensitive areas such as EU urban green areas. \n13. The negative impacts on sensitive species and habitats, including on the seabed \nthrough fishing and extraction activities, are substantially reduced to achieve good \nenvironmental status. \n\n14. The by-catch of species is eliminated or reduced to a level that allows species \n\nrecovery and conservation. \n\n**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised.", + "page_start": 15, + "page_end": 15, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. \n\nThe Commission will further promote tax systems and pricing that reflect environmental \ncosts, including biodiversity loss. This should encourage changes in national fiscal \nsystems to shift the tax burden from labour to pollution, under-priced resources, and \nother environmental externalities. The ‘**user pays’ and ‘polluter pays’ principles**have \nto be applied to prevent and correct environmental degradation. \n\nPublic authorities’ purchasing power represents 14% of EU GDP and can serve as a \npowerful driver of demand for the products and services of companies that invest in or \ncontribute to nature-based solutions. To tap into this potential, when proposing further \n\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17", + "page_start": 17, + "page_end": 17, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "As regards the Birds and Habitats Directives, enforcement will focus on**completing the**\n**Natura 2000 network**, the effective management of all sites, species-protection \nprovisions, and species and habitats that show declining trends. The Commission will \nalso ensure that environment-related legislation with an impact on biodiversity62 is better \nimplemented, enforced and – where necessary – reviewed and revised. \n\nThe Commission will strive to**improve compliance assurance**, working closely with \nMember States and European networks of environmental agencies, inspectors, auditors, \npolice, prosecutors and judges. \n\nIn addition, the Commission will support civil society’s role as a compliance watchdog \nand will engage with Member States to improve access to justice in national courts in \nenvironmental matters for individuals and NGOs. It will also broaden standing for NGOs \nby proposing**a revision of the Aarhus Regulation63**. \n\n**3.3. Building on an integrated and whole-of-society approach**\n\n*3.3.1. Business for biodiversity*\n\nIn the partnership spirit of this strategy, all parts of the economy and society will have to \nplay their role. Industry and business have an impact on nature, but they also produce the \nimportant innovations, partnerships and expertise that can help address biodiversity loss. \n\nTo ensure environmental and social interests are fully embedded into business strategies, \nthe Commission will put forward a new initiative in 2021 on**sustainable corporate**\n**governance**. This initiative, which may take the form of a legislative proposal, will \naddress human rights and environmental duty of care and due diligence across economic \nvalue chains in a proportionate way according to different sizes of entreprises64. This will \nhelp ensure that shareholder and stakeholder interests are fully aligned with the \nobjectives set out in this strategy. In addition, in 2020, the Commission launched a \nreview of the reporting obligations of businesses under the**Non-Financial Reporting**\n**Directive**65, with a view to improving the quality and scope of non-financial disclosures, \nincluding on environmental aspects such as biodiversity. \n\nThrough its existing platforms66, the Commission will help to build a**European**\n**Business for Biodiversity**movement, taking inspiration from recent initiatives67 and \nmaking this movement an integral part of the European Climate Pact. Particular attention \nwill be paid to measures to incentivise and eliminate barriers for the take-up of nature- \nbased solutions, as these can lead to significant business and employment opportunities \nin various sectors68 and are the key to innovation for economic or societal needs that rely \non nature. \n\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental \nAssessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime \n(2008/99/EC). \n\n63 https://ec.europa.eu/environment/aarhus/ \n64 Study on due diligence requirements through the supply chain – Final Report. \n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and \ndiversity information by certain large undertakings. \n\n66 Such as the EU Business @ Biodiversity Platform (B@B). \n67 See for example Business for Nature or One Planet Business for Biodiversity. \n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy. \n\n16", + "page_start": 16, + "page_end": 16, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", + "target_page": 16, + "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. \n\nThe Commission will further promote tax systems and pricing that reflect environmental \ncosts, including biodiversity loss. This should encourage changes in national fiscal \nsystems to shift the tax burden from labour to pollution, under-priced resources, and \nother environmental externalities. The ‘**user pays’ and ‘polluter pays’ principles**have \nto be applied to prevent and correct environmental degradation. \n\nPublic authorities’ purchasing power represents 14% of EU GDP and can serve as a \npowerful driver of demand for the products and services of companies that invest in or \ncontribute to nature-based solutions. To tap into this potential, when proposing further \n\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17", + "page_start": 17, + "page_end": 17, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. \n\nIn all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. \n\nThe Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. \n\n\n \n \n \n \n [html]\n
1.
Differentiations
Employees
", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "encouraging cooperation in**education for environmental sustainability**in 2021. This \nwill provide guidance for schools and teachers on how to cooperate and exchange \nexperiences across Member States on biodiversity teaching. The Commission will also \nprovide support materials and facilitate the exchange of good practices in EU networks of \nteacher-training programmes. \n\n**4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to \nmeet the United Nations Sustainable Development Goals. It will be mainstreamed \nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal \ndiplomacy’, and forthcoming green alliances76. The Commission will work closely with \nthe European Parliament and Member States to ensure a high level of EU ambition and \nmobilise all efforts for the good of the world’s biodiversity. \n\n**4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global \nefforts under the United Nations Convention on Biological Diversity have largely been \ninsufficient. Nature cannot afford any half measures or lack of ambition. \n\nIn this spirit, the EU is ready to lead all efforts – working with like-minded partners in**a**\n**high-ambition coalition on biodiversity**– to agree an ambitious new global framework \nfor post-2020 at the upcoming 15th Conference of the Parties to the Convention on \nBiological Diversity. \n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive \n\nalien species. \n\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction \n\nofthe use of fertilisers by at least 20%. \n\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. \n12. No chemical pesticides are used in sensitive areas such as EU urban green areas. \n13. The negative impacts on sensitive species and habitats, including on the seabed \nthrough fishing and extraction activities, are substantially reduced to achieve good \nenvironmental status. \n\n14. The by-catch of species is eliminated or reduced to a level that allows species \n\nrecovery and conservation. \n\n**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised.", + "page_start": 15, + "page_end": 15, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "legislation and guidance on**green public procurement**, the Commission will integrate \ncriteria and monitoring to boost nature-based solutions. \n\n*3.3.3. Measuring and integrating the value of nature*\n\nBiodiversity considerations need to be better integrated into public and business decision- \nmaking at all levels. Building on existing work74, the Commission will develop in 2021 \nmethods, criteria and standards to describe the essential features of biodiversity, its \nservices, values, and sustainable use. \n\nThese will include**measuring the environmental footprint of products and**\n**organisations on the environment**, including through life-cycle approaches and natural \ncapital accounting. In this context, the Commission will support the establishment of an \ninternational natural capital accounting initiative. \n\n*3.3.4. Improving knowledge, education and skills*\n\nThe fight against biodiversity loss must be underpinned by sound science. Investing in \nresearch, innovation and knowledge exchange will be key to gathering the best data and \ndeveloping the best nature-based solutions. Research and innovation can test and develop \nhow to prioritise ‘green’ over ‘grey’ solutions and help the Commission to support \ninvestments in nature-based solutions, such as in old-industrialised, low-income or disaster- \nhit areas. \n\nThe new Skills Agenda will play a key role in the transition to a green economy and the \nfight against biodiversity loss, focusing on training and reskilling of the workforce across \na wide range of sectors. \n\nThe future Horizon Europe programme will include a**long-term strategic research**\n**agenda for biodiversity,**including a science policy mechanism for research-based \noptions for ratcheting up the implementation of biodiversity commitments**,**with \nincreased funding. Horizon Europe’s Missions75 will significantly contribute to filling \nknowledge gaps and finding solutions to improve the health of ecosystems and their \ncontribution to human health. \n\nIn parallel, the Commission will promote and facilitate partnerships, including a \ndedicated Biodiversity Partnership, to make the bridge between science, policy and \npractice and make nature-based solutions a reality on the ground. The Commission will \nalso establish in 2020**a new Knowledge Centre for Biodiversity**in close cooperation \nwith the European Environment Agency. The Centre will: (i) track and assess progress \nby the EU and its partners including in relation to implementation of biodiversity related \ninternational instruments; (ii) foster cooperation and partnership, including between \nclimate and biodiversity scientists; and (iii) underpin policy development. Moreover, the \nCommission will increase its support to the Intergovernmental science-policy Platform on \nBiodiversity and Ecosystem Services. \n\n74 SWD(2019) 305. \n75 Missions on adaptation to climate change including societal transformation, on healthy oceans, seas \ncoastal and inland waters, on climate-neutral and smart cities, and on soil health and food. \n\n18", + "page_start": 18, + "page_end": 18, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. \n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership \n\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection \nand shall be based on the precautionary principle. \n\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)). \n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the \nWorld’s Forests (COM(2019) 352). \n\n82 Including international financing where biodiversity is the principal objective and where it is a \nsignificant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States \nfinancial reports submitted to the Convention on Biological Diversity in 2015 and 2018. \n\n21", + "page_start": 21, + "page_end": 21, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. \n\nThe Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately.", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "As regards the Birds and Habitats Directives, enforcement will focus on**completing the**\n**Natura 2000 network**, the effective management of all sites, species-protection \nprovisions, and species and habitats that show declining trends. The Commission will \nalso ensure that environment-related legislation with an impact on biodiversity62 is better \nimplemented, enforced and – where necessary – reviewed and revised. \n\nThe Commission will strive to**improve compliance assurance**, working closely with \nMember States and European networks of environmental agencies, inspectors, auditors, \npolice, prosecutors and judges. \n\nIn addition, the Commission will support civil society’s role as a compliance watchdog \nand will engage with Member States to improve access to justice in national courts in \nenvironmental matters for individuals and NGOs. It will also broaden standing for NGOs \nby proposing**a revision of the Aarhus Regulation63**. \n\n**3.3. Building on an integrated and whole-of-society approach**\n\n*3.3.1. Business for biodiversity*\n\nIn the partnership spirit of this strategy, all parts of the economy and society will have to \nplay their role. Industry and business have an impact on nature, but they also produce the \nimportant innovations, partnerships and expertise that can help address biodiversity loss. \n\nTo ensure environmental and social interests are fully embedded into business strategies, \nthe Commission will put forward a new initiative in 2021 on**sustainable corporate**\n**governance**. This initiative, which may take the form of a legislative proposal, will \naddress human rights and environmental duty of care and due diligence across economic \nvalue chains in a proportionate way according to different sizes of entreprises64. This will \nhelp ensure that shareholder and stakeholder interests are fully aligned with the \nobjectives set out in this strategy. In addition, in 2020, the Commission launched a \nreview of the reporting obligations of businesses under the**Non-Financial Reporting**\n**Directive**65, with a view to improving the quality and scope of non-financial disclosures, \nincluding on environmental aspects such as biodiversity. \n\nThrough its existing platforms66, the Commission will help to build a**European**\n**Business for Biodiversity**movement, taking inspiration from recent initiatives67 and \nmaking this movement an integral part of the European Climate Pact. Particular attention \nwill be paid to measures to incentivise and eliminate barriers for the take-up of nature- \nbased solutions, as these can lead to significant business and employment opportunities \nin various sectors68 and are the key to innovation for economic or societal needs that rely \non nature. \n\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental \nAssessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime \n(2008/99/EC). \n\n63 https://ec.europa.eu/environment/aarhus/ \n64 Study on due diligence requirements through the supply chain – Final Report. \n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and \ndiversity information by certain large undertakings. \n\n66 Such as the EU Business @ Biodiversity Platform (B@B). \n67 See for example Business for Nature or One Planet Business for Biodiversity. \n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy. \n\n16", + "page_start": 16, + "page_end": 16, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "targets, with the ability to ratchet up action if needed. These reviews should be \nbased on an independent, science-based gap-analysis and foresight process, with \ncommon headline indicators for all Parties. \n\n**An enabling framework**to bring the ambition to life, across areas such as \n\nfinance, capacity, research, innovation and technology. \n\n**Fair and equitable sharing of the benefits**from the use of genetic resources \n\nlinked to biodiversity. \n\n**A principle of equality**. This includes respect for the rights and the full and \neffective participation of indigenous peoples and local communities. There should \nbe an inclusive approach with participation of all stakeholders, including women, \nyouth, civil society, local authorities, the private sector, academia and scientific \ninstitutions. \n\n**4.2. Using external action to promote the EU’s ambition**\n\n*4.2.1. International Ocean Governance*\n\nIn line with the International Ocean Governance agenda77, the EU will support the \nconclusion of an ambitious legally binding agreement on**marine biological diversity of**\n**areas beyond national jurisdiction**(BBNJ) by the end of 2020. It must set clear global \nprocedures \nidentifying, designating and effectively managing ecologically \nrepresentative marine protected areas in the high seas. It should be ratified and \nimplemented as quickly as possible. \n\nfor \n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary", + "page_start": 20, + "page_end": 20, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: \n\n Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What is the EU's tolerance for unauthorised fishing?", + "target_page": 21, + "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "threaten their conservation status. To support this, data collection on by-catch for all \nsensitive species needs to be stepped up. \n\nIn addition,**fisheries-management measures**must be established in all marine protected \nareas according to clearly defined conservation objectives and on the basis of the best \navailable scientific advice. \n\n*2.2.7. Restoring freshwater ecosystems*\n\nThe EU’s legal framework on water is ambitious but implementation is lagging behind \nand enforcement must be stepped up46. Greater efforts are needed to**restore freshwater**\n**ecosystems and the natural functions of rivers**in order to achieve the objectives of the \nWater Framework Directive. This can be done by removing or adjusting barriers that \nprevent the passage of migrating fish and improving the flow of water and sediments. To \nhelp make this a reality,**at least 25,000 km of rivers will be restored into free-flowing**\n**rivers by 2030**47 through the removal of primarily obsolete barriers and the restoration of \nfloodplains and wetlands. Technical guidance and support to the Member States to \nidentify sites and help mobilise funding will be provided by the Commission in 2021, in \nconsultation with all relevant authorities48. Member State authorities should review water \nabstraction and impoundment permits to implement ecological flows in order to achieve \ngood status or potential of all surface waters and good status of all groundwater by 2027 \nat the latest, as required by the Water Framework Directive49. To that effect, the \nCommission will provide technical support to Member States on their measures by 2023. \n\nOverall, large-scale river and floodplain restoration investments50 can provide a major \neconomic boost for the restoration sector and for local socioeconomic activities such as \ntourism and recreation. At the same time, these investments can improve water \nregulation, flood protection, nursery habitats for fish, and the removal of nutrient \npollution. \n\n*2.2.8. Greening urban and peri-urban areas*\n\n**Green urban spaces**, from parks and gardens to green roofs and urban farms, provide a \nwide range of benefits for people. They also provide opportunities for businesses and a \nrefuge for nature. They reduce air, water and noise pollution, provide protection from \nflooding, droughts and heat waves, and maintain a connection between humans and \nnature51. \n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the**value of green**\n**urban spaces for our physical and mental wellbeing**. While protection of some urban \n\n46 Fitness Check of the EU Water Legislation (SWD(2019) 439); Evaluation of the Urban Waste Water \nTreatment Directive (SWD(2019) 700). \n47 The target of 25,000 km is based on the Commission’s assessment of what is achievable in the EU by \n2030. \n48 The guidelines will take a wide range of issues into account, including hydropower generation, flood \nmanagement, water supply, agriculture and navigability. \n49 These measures should be planned in the 3rd River Basin Management Plans to be adopted by Member \nStates in 2021, under the Water Framework Directive. \n\n50 Fitness Check of the EU Water Legislation (SWD(2019) 439). \n51 EnRoute project. \n\n12", + "page_start": 12, + "page_end": 12, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. \n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership \n\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection \nand shall be based on the precautionary principle. \n\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)). \n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the \nWorld’s Forests (COM(2019) 352). \n\n82 Including international financing where biodiversity is the principal objective and where it is a \nsignificant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States \nfinancial reports submitted to the Convention on Biological Diversity in 2015 and 2018. \n\n21", + "page_start": 21, + "page_end": 21, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**energy**41. It will also review in 2021 the data on biofuels with high indirect land-use \nchange risk and establish a trajectory for their gradual phase out by 2030. \n\nThe overall objective is to ensure that EU regulatory framework on bioenergy is in line \nwith the increased ambition set out in the European Green Deal. \n\n*2.2.6. Restoring the good environmental status of marine ecosystems*\n\n**Restored and properly protected marine ecosystems**bring substantial health, social \nand economic benefits to coastal communities and the EU as a whole. The need for \nstronger action is all the more acute as marine and coastal ecosystem biodiversity loss is \nseverely exacerbated by global warming42. \n\nAchieving good environmental status of marine ecosystems, including through strictly \nprotected areas, must involve the restoration of carbon-rich ecosystems as well as \nimportant fish spawning and nursery areas. Some of today’s sea uses endanger food \nsecurity, fishers’ livelihoods, and the fishery and seafood sectors.**Marine resources**\n**must be harvested sustainably and there must be zero-tolerance for illegal practices**. \nIn this regard, the full implementation of the EU’s Common Fisheries Policy, the Marine \nStrategy Framework Directive and the Birds and Habitats Directives is essential. \n\nThe application of an ecosystem-based management approach under EU legislation43 will \nreduce the adverse impacts of fishing, extraction and other human activities, especially \non sensitive species and seabed habitats. To support this,**national maritime spatial**\n**plans**, which Member States have to deliver in 2021, should aim at covering all maritime \nsectors and activities, as well as area-based conservation-management measures.44 The \nCommission will also propose a**new action plan to conserve fisheries resources and**\n**protect marine ecosystems**by 2021. Where necessary, measures will be introduced to \nlimit the use of fishing gear most harmful to biodiversity, including on the seabed. It will \nalso look at how to reconcile the use of bottom-contacting fishing gear with biodiversity \ngoals, given it is now the most damaging activity to the seabed. This must be done in a \nfair and just way for all. The European Maritime and Fisheries Fund should also support \nthe transition to more selective and less damaging fishing techniques. \n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our \noceans and biodiversity. This makes it all the more important to maintain or reduce \nfishing mortality at or under**Maximum Sustainable Yield levels**. This will help achieve \na healthy population age and size distribution for fish stocks. \n\nThe**by-catch of species threatened with extinction**must also be eliminated or reduced \nto a level that allows full recovery. This should also be the case for those in bad \nconservation status or not in good environmental status. Furthermore, the by-catch of \nother species45 must be eliminated or, where this is not possible, minimised so as not to \n\n41 Article 29 of the EU Renewable Energy Directive 2018/2001. \n42 See for example Intergovernmental Panel on Climate Change (2019), Special Report on the Ocean and \nthe Cryosphere in a Changing Climate. \n43 The Common Fisheries Policy, the Marine Strategy Framework Directive (2008/56/EC) and the \nMaritime Spatial Planning Directive (2014/89/EU). \n\n\n \n \n \n \n [html]\n
TableTable
TableTableMarch 2022 a
ecostParametersSpecifications
", + "page_start": 11, + "page_end": 11, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "targets, with the ability to ratchet up action if needed. These reviews should be \nbased on an independent, science-based gap-analysis and foresight process, with \ncommon headline indicators for all Parties. \n\n**An enabling framework**to bring the ambition to life, across areas such as \n\nfinance, capacity, research, innovation and technology. \n\n**Fair and equitable sharing of the benefits**from the use of genetic resources \n\nlinked to biodiversity. \n\n**A principle of equality**. This includes respect for the rights and the full and \neffective participation of indigenous peoples and local communities. There should \nbe an inclusive approach with participation of all stakeholders, including women, \nyouth, civil society, local authorities, the private sector, academia and scientific \ninstitutions. \n\n**4.2. Using external action to promote the EU’s ambition**\n\n*4.2.1. International Ocean Governance*\n\nIn line with the International Ocean Governance agenda77, the EU will support the \nconclusion of an ambitious legally binding agreement on**marine biological diversity of**\n**areas beyond national jurisdiction**(BBNJ) by the end of 2020. It must set clear global \nprocedures \nidentifying, designating and effectively managing ecologically \nrepresentative marine protected areas in the high seas. It should be ratified and \nimplemented as quickly as possible. \n\nfor \n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary", + "page_start": 20, + "page_end": 20, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Obviously,**most informal, and**— in particular —**irregular and illegal types of work do not respect**\nlegal OSH obligations — and at the same time legal monitoring obligations also fail. The EU \nFundamental Rights Agency (FRA) published several case studies and examples in a series called \n‘Severe labour exploitation reports; 359 these studies provide an insight into most irregular working \nconditions. \n\n**Undeclared work**is defined as paid and lawful (not criminal) activity but undeclared to public authorities. (‘paid \nactivities that are lawful as regards their nature but not declared to public authorities, taking into account the \ndifferences in the regulatory systems of Member States’.) \n\nIn 2018, the European Commission estimated the scale of**undeclared work**in the EU. According to this estimate, \non average, 11.6% of total labour input in the private sector is undeclared, and undeclared work constitutes on \naverage 16.4% of gross value added. The main sectors according to the Special Flash Eurobarometer from 2019360 \nare personal services (childcare/elderly care/cleaning) followed by construction and hospitality services.361 The \n‘European Platform tackling undeclared work’ provides fact sheets about the type and quantity of undeclared work \nin all EU Member States.362 \n\nThe compliance of enterprises with OSH regulations is**supervised by state institutions, mainly the**\n**Labour Inspectorates**.363 At EU level, the SLIC developed common principles for their work. These \ncommon principles aim at harmonising their work and facilitate collaboration; they include planning and \nmonitoring, inspectors’ competencies and independence, prevention, protection, and assistance and \nguidance for inspectors, and internal and external communication.364 \n\nPractically all labour inspections in the EU Member States worked in the past two decades on \n**organisational and strategic measures to achieve an effective and broad impact**, and also to better \nadapt to new and emerging risks.365 To enhance the level of implementation in terms of coverage and \nquality, many labour inspections developed**smart enforcement**and**supervision concepts**.366 \n\n On average, two million visits per year were made by labour inspectorates, in approximately 22 million \nbusinesses in the EU, in the decade 2010-2020, with a steady decline over the years.367 .368 Many \nenterprises that are regarded as low-risk establishments have never been inspected by a labour \ninspectorate. Often more than one inspection is done in large enterprises, for example, as a follow-up \ninspection; there might also be more than one annual inspection in enterprises with high risks. The \nlabour inspection is also tasked to supervise enterprises with many separated sites or establishments, \nfor example, construction companies and shops of supermarket chains. The visit of one headquarter or \none shop cannot be regarded as a visit of a representative selection of enterprises’ locations, which \npossibly show different levels of safety and health. \n\nIn the decade between 2000 and 2010, the development of the resources of labour inspections show a \nmixed picture,**some countries extended the capacities of labour inspections, others cut**\n**resources**. 369 For the period between 2010 and 2020, the European Trade Union Institute (ETUI) \ncounted a decrease of labour inspectors and inspections in 20 of 27 Member States, a drop of 7% for \ninspectors and of 18% for inspections. 370 Again, the picture between Member States differs but, in \ngeneral, budget or staff cuts dominate. ESENER findings show that there was a significant decline \nbetween 2014 and 2019 regarding the number of visits by Labour Inspectorates.371", + "page_start": 122, + "page_end": 122, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Prohibition on arrival of vessels into England**\n\n**3.**—(1) A controller must not cause or permit a vessel whose last point of departure was a \ncountry or territory listed in paragraph 5 to moor at a port in England unless mooring at a port in \nEngland— \n\n(a) is reasonably necessary to secure the safety of the vessel or the health and safety of any \n\nperson aboard it; or \n\n(b) is otherwise required pursuant to a direction issued under Schedule 3A to the Merchant \nShipping Act 1995. \n\n(2) This paragraph does not apply in relation to— \n\n(a) a commercially operated vessel carrying no passengers; \n(b) a vessel operated by or in support of Her Majesty’s Government in the United Kingdom; \n(c) a vessel operated by or in support of a foreign country or territory where, prior to its \narrival in England, a United Kingdom Government Department has provided written \nconfirmation to the operator that the vessel is carrying passengers who are travelling to \nconduct official business with the United Kingdom. \n\n**4.**The countries or territories referred to in paragraph 2(1) are— \n\n(a) Argentina; \n(b) Brazil; \n(c) Cape Verde; \n(d) Chile; \n(e) Ethiopia; \n(f) The Maldives; \n(g) Oman; \n(h) Qatar; \n(i) South Africa; \n(j) Turkey; \n(k) United Arab Emirates. \n\n**5.**The countries or territories referred to in paragraph 3(1) are— \n\nTurkey \n\n**6.**A controller who contravenes paragraph 2(1) or 3(1) commits an offence punishable on \n\nsummary conviction by a fine. \n\nSCHEDULE 14 Regulation 20(4)(c) \n\nAmounts of fixed penalties \n\n**Amounts of fixed penalties**\n\n**1.**The amounts specified for the purposes of regulation 20(4)(c) are the amounts specified in \n\nparagraphs 2 to 17 in relation to the offences described in each paragraph. \n\n**Regulation 19(1)(a)**\n\n**2.**Breach of regulation 3(1), (2) (3) (5), (7) or (8) (without reasonable excuse fail to provide \npassenger information, or evidence of having provided passenger information, or to update \npassenger information)— \n\n(a) in the case of the first fixed penalty notice, £500; \n\n(b) in the case of the second fixed penalty notice, £1,000; \n(c) in the case of the third fixed penalty notice, £2,000; \n(d) in the case of the fourth and subsequent fixed penalty notices, £4,000. \n\n**Regulation 19(6)**\n\n**3.**Breach of regulation 19(6) (intentionally or recklessly provide false passenger information)— \n(a) if the offence consists of the intentional or reckless provision of false or misleading \npassenger information relating to the person’s travel history in relation to a category 3 \ncountry or territory), £10,000; \n\n(b) in any other case— \n\n(i) in the case of the first fixed penalty notice, £500, \n(ii) in the case of the second fixed penalty notice, £1,000, \n(iii) in the case of the third fixed penalty notice, £2,000, \n(iv) in the case of the fourth and subsequent fixed penalty notices, £4,000. \n\n**Regulation 19(1)(b)**\n\n**4.**Breach of regulation 4 (1), (2), (3) or (4) (without reasonable excuse fail to possess or produce \n\nevidence of negative test result on arrival)— \n\n(a) in the case of the first fixed penalty notice, £500; \n(b) in the case of the second fixed penalty notice, £1,000; \n(c) in the case of the third fixed penalty notice, £2,000; \n(d) in the case of the fourth and subsequent fixed penalty notices, £4,000.", + "page_start": 84, + "page_end": 84, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "362 ELA: European Platform tackling undeclared work \n\n363 The OSH Barometer contains a special section on enforcement capacities, here \n364 SLIC, 2015: Common Principles for Labour Inspection in Relation to Health and Safety In the Workplace \n365 Cardiff University et al., 2011: Contract to assess the potential impact of emerging trends and risks on labour \ninspection methodologies in the domain of occupational health and safety, \nEuropean Federation of Public Service Unions (EPSU), 2012: A mapping report on Labour Inspection Services in \n15 European countries (p. 13ff). \n\n366 The Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) are particularly active in this area. \nThey have summarised the current challenges for labour inspections and supervision in general, giving extensive \nand detailed recommendations; Nordic Future of Work Group, 2020: Work today and in the future : Perspectives \non Occupational Safety and Health challenges and opportunities for the Nordic labour inspectorates, here \nBAuA, 2020: Scientific workshop on the future of smart and effective labour inspection, 3 November 2020, here", + "page_start": 153, + "page_end": 153, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 41: Posted workers, receiving and sending countries in the EU315**\n\n\n\nUnambiguously, the data show that all eastern and southern European countries are senders (exception \nMalta). The central European countries Germany, France, Belgium and Austria and the two Nordic \ncountries Sweden and Finland are the receivers. Some smaller countries like Denmark, Ireland and \nLuxembourg are exceptions, and the Netherlands has an equal amount of sent and received posted \nworkers. \n\n**5.4 Globalisation and OSH**\n**Globalisation**is an**economic development accelerating during the past three decades**. Over the \nlast decades, production and services have become less and less solely based on national pre- \nproduction or national service suppliers but instead on international supply chains. 316**International**\n**supply chains**require logistics connections between countries and continents, harmonised technical \nstandards, and, as far as possible, common legal rules and agreements, be it for services or materials \nand products. The development of such supply chains divides the necessary work related to a product \nor a service in parts, which might also mean**that the OSH risks might not be shared in a fair or equal**\n**way**. A fair divide is most probable between economies of similar levels of development, but a main part \nof**globalisation is trade between different levels of economic and technological development**. \n\nA relevant part of outsourcing to less-developed countries**took place in sectors with high OSH risks**: \nmining, metallurgic processes, hazardous waste, basic chemicals and textiles. At the same time, EU \nenterprises ‘import’ health and safety risks by producing goods for export, for example, vehicles, \nmachines, food or specialty chemicals. A**full assessment of the divide of OSH risks needs a case-**\n**by-case description**; a variety of different shares of risk is possible: there might take place reverse \ndevelopments, for example, open-pit mining in a country will probably bear much lower risks than \nunderground coal mining in the EU, and the risks inside the EU might increase due to (partly illegal) \nimport of non-standard or even prohibited products and equipment into the EU (e.g. non certified \nmachines or equipment, cooling agents), and the other way around: EU enterprises might produce and \nexport products whose use is prohibited in the EU (e.g. pesticides). Regarding the**globalisation of**", + "page_start": 113, + "page_end": 113, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "tackling undeclared work’ provides fact sheets of the type and quantity of undeclared work in all EU \nMember States;464 Eurofound published several reports on platform work,465 and the FRA had a series \nof publications and fact sheets on severe cases of exploitation, particularly of migrant workforces.466 \nAlso, the creation of the European Labour Authority (ELA) 467 is partly a consequence of the**often**\n**irregular working conditions of mobile, posted, contracted or seasonal workers**who leave their \ncountry to work in the EU or in another European country. ELA particularly aims to mitigate such critical \nissues related to labour mobility and social security coordination between countries. \n\n**In this report**, the quantitative data and the interpretation of the developments will cover — in an ideal \ncase —**the period 2005 to 2020**. In 2004, a major extension of the EU took place, from 15 to 25 \nMember States. If it is not possible to cover the whole period, the analysis is limited to the maximum \npossible period. If comparability is high, for a very few selected data a further look back to the 1990s \nwas taken. \n\nMoreover, there can be**major comparability difficulties**caused by the change of methodological \napproaches, geographical coverage and other context factors during the last 10 to 30 years. Major \nchallenges for comparative assessments of EU-wide harmonised data collections from different years \nwere: \n\n• The EU went through**several enlargement processes**, expanded from EU-12 to EU-15 in \n1994, expanded from EU-15 to EU-25 in 2004, to EU27 in 2007 and to EU28 in 2013, and \nfrom 2020 on — due to the departure of the United Kingdom — the EU consists of 27 Member \nStates. In statistical publications the identifier EU27_2020 is often used to distinguish this \nperiod from the EU27 phase between 2008 and 2012, before Croatia joined and the EU27 \nbecame EU28. \n\n•**Methodologies of data collection changed**, questions in surveys were abandoned or \n\nchanged, and sample sizes or structures changed, for example, the given period in survey \nquestions changed. One example is from the EWCS: the time categories for health-related \nabsence from work changed from ‘between 10 and 20 days’ to absence of ‘more than 15 \ndays’. \nImportant**structural decisions were taken in the sector of economic statistics**, like the \nchange of the statistical composition and the coding of economic sectors, NACE Code 1, \nRevision 1 (NACE 1.1) was applied until 2007, and from 2008 NACE Code 2 is applied. \n\n• \n\n• The survey providers use(d) for**occupation and educational attainment different**\n**categories**and aggregations levels, for example, ESEG, ISCED or ISCO. \n\n• Some important categories and definitions are**not fully harmonised**in statistics, for example, \nthe definition of ‘manual worker’ or of ‘migration status’.468 \n\n**7.3 Qualitative data and research**\n**Quantitative data gain importance by a comprehensive description of the reasons behind these**\n**data**and their development,**by interpretation and analysis**. Such analytical explanations are \nelaborated by (roughly categorised): the providers of the quantitative data themselves, in addition by \nscientists at universities and governmental institutions, by European, national or regional governmental \norganisations, by business federations and trade unions, by professional associations and by \ninternational organisations. \n\nThis analytical work covers a large variety of topics like detailed studies and reports on**risks, exposures**\n**and outcomes**, on the development and application of**effective technical and organisational**\n**preventive measures**, on preventive**OSH systems and infrastructures**, for example, evaluations and \nassessments of the level of implementation of OSH directives, and finally on the**societal, economic**\n**and legal frame and context**of OSH.", + "page_start": 133, + "page_end": 133, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "OLAF’s own staff or by any outside body authorised to do so on its behalf. \n\nSuch checks and audits may be initiated at any moment during the provision of \nthe services and up to five years starting from the payment of the balance of the \nlast specific contract issued under this FWC \n\nThe audit procedure is initiated on the date of receipt of the relevant letter sent \nby the contracting authority. Audits are carried out on a confidential basis. \n\n**II.24.2**The contractor must keep all original documents stored on any appropriate \nmedium, including digitised originals if authorised under national law, for a period \nof five years starting from the payment of the balance of the last specific contract \nissued under this FWC. \n\n**II.24.3**The contractor must grant the contracting authority’s staff and outside personnel \nauthorised by the contracting authority the appropriate right of access to sites and \npremises where the FWC is implemented and to all the information, including \ninformation in electronic format, needed to conduct such checks and audits. The \ncontractor must ensure that the information is readily available at the moment of \nthe check or audit and, if so requested, that information is handed over in an \nappropriate format. \n\n**II.24.4**On the basis of the findings made during the audit, a provisional report is drawn \nup. The contracting authority or its authorised representative must send it to the \ncontractor, who has 30 days following the date of receipt to submit observations. \nThe contractor must receive the final report within 60 days following the expiry of \nthe deadline to submit observations. \n\nOn the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. \n\n**II.24.6**The Court of Auditors, the European Public Prosecutor’s Office established by \nCouncil Regulation (EU) 2017/193977 (‘the EPPO’) and, for the processing of \npersonal data, the European Data Protection Supervisor have the same rights as \nthe contracting authority, particularly right of access, for the purpose of checks,", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "What are the missions of the Sumitomo Mitsui Financial Group?", + "target_page": 7, + "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n\n\nSpecific Examples of CSR Activities \n\n**Together with Our Employees**\n\n**We are developing human resources that can take on global roles,**\n**and we are creating globalized working environments**\n\nprocess of “in-house internationalization.” \nprocess of “in-house internationalization.” \n\n**Preparing human resources**\n**to take on global roles**\n\n**Creating support tools**\n**for developing the role of**\n**female employees**\n\nUnder our “global course” program, newly \nUnder our “global course” program, newly \n\nhired sogoshoku \nhired (management-track) staff \nsogoshoku (management-track) staff \n\nare sent overseas after basic training. We \nare sent overseas after basic training. We \n\nFaced with changing markets and rising \nFaced with changing markets and rising have also expanded human resource \nhave also expanded human resource \n**“My Story”**\ncosts, many Japanese companies are \ncosts, many Japanese companies are training programs in English and Chinese \ntraining programs in English and Chinese \n\nmoving their operations overseas. Many \nmoving their operations overseas. Many and at overseas units. \nand at overseas units. \n\nlarge companies already have gone global \nlarge companies already have gone global Improvement of language skills in particular \nImprovement of language skills in particular \n\nin terms of production and marketing bases, \nin terms of production and marketing bases, is s ome t hing t ha t r equir e s ongoing \nis s ome t hing t hat requir es ongoing \n\nbalance between work and care needs. \nbalance between work and care needs. \n\n**Better support for carers:**\n**Workplace measures to**\n**deal with the rising old-age**\n**dependency ratio**\n\nThe improvements have three aspects: \nThe improvements have three aspects: \n\n(1) Care-leave time has been extended to \n(1) Care-leave time has been extended to \n\none year; (2) the time frame during which \none year; (2) the time frame during which \n\nstaggered and shortened working hours \nstaggered and shortened working hours \n\nfor care-giving are allowed has been \nfor care-giving are allowed has been \n\nIn November 2010, the bank expanded its \nIn November 2010, the bank expanded its extended to three years; and (3) greater \nextended to three years; and (3) greater \n\nemployee carer support program. \nemployee carer support program. flexibility has been introduced in reduction \nflexibility has been introduced in reduction \n\nEven now, much remains to be done to \nEven now, much remains to be done to of working hours for care purposes. \nof working hours for care purposes. \n\ndevelop public suppor t mechanisms, \ndevelop public suppor t mechanisms, \n\nat overseas units and for regular employees \nat overseas units and for regular employees \n\nin Japan. All of these courses are in English \nin Japan. All of these courses are in English \n\nand feature discussions and presentations \nand feature discussions and presentations \n\non resolution of issues faced by global \non resolution of issues faced by global \n\ncompanies. Through such lively exchanges, \ncompanies. Through such lively exchanges, \n\nthe aim is to develop the ability to deepen \nthe aim is to develop the ability to deepen \n\ncross-cultural communication and cultivate \ncross-cultural communication and cultivate \n\na global outlook and mentality. \na global outlook and mentality. \n\nAt the bank, we will continue measures to \nAt the bank, we will continue measures to \n\npromote globalization going forward, and \npromote globalization going forward, and \n\ncreate systems that can provide higher \ncreate systems that can provide higher \n\nquality support to our customers. \nquality support to our customers. \n\nWe have also established the SMBC Care \nWe have also established the SMBC Care \n\nConsultation Desk as a convenient general \nConsultation Desk as a convenient general \n\nservice for employees and their family \nservice for employees and their family", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "i \nt \no \nm \no \nM \n\nL \nt \nd \n. \n\nL \nm \ni \n\ni \nt \ne \nd i \nt \ns \nu \ni \n\nL \nt \nd \n. \n\nF \nn \na \nn \nc \ne \n\ni \nI \nn \nc \n. \n\n**SMFG CSR promotion structure**\n\n**Group CSR Committee**\n\n**Chairman**: Director in charge of SMFG \nCorporate Planning Department \n**Committee members**: General Managers of SMFG, \nSumitomo Mitsui Banking Corporation, \nSMFG Card & Credit, Sumitomo Mitsui Card, \nCedyna, Sumitomo Mitsui Finance and Leasing, \nThe Japan Research Institute, \nSMBC Friend Securities, SMBC Nikko Securities, \nTHE MINATO BANK and \nKansai Urban Banking Corporation \n**Administered by**: Group CSR Department of SMFG \n**Strategic advisor**: \nJRI Center for the Strategy of Emergence \nB \na \nn \nk \nn \ng \nC \no \nr \np \no \nr \na \nt \ni \no \nn \n\nS \nu \nm \n\ni \nt \no \nm \no \nM \n\ni \n\nWe intend to be a financial services group that contributes to the healthy development \nWe intend to be a financial services group that contributes to the healthy development \nof society. For this purpose, we recognize the importance of our mission to serve as a \nof society. For this purpose, we recognize the importance of our mission to serve as a \ncrucial part of the public infrastructure and also our social responsibilities. With such \ncrucial part of the public infrastructure and also our social responsibilities. With such \nrecognition, we under take business operations that contribute to the steady \nrecognition, we under take business operations that contribute to the steady \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ndevelopment of Japan and the rest of the world, and endeavor, as a good corporate \ncitizen, to make a positive contribution to society. \ncitizen, to make a positive contribution to society. \n\ni \nt \ns \nu \n\n3.**Contributing to**\n\ni \n\n**CSR Liaison Committee**\n**Social Development**\n\n4.**Free and Active**\n\nWe intend to be a financial services group for which all officers and employees work \nWe intend to be a financial services group for which all officers and employees work \nwith pride and commitment. For this purpose, we respect people and develop \nwith pride and commitment. For this purpose, we respect people and develop \nemployees with extensive professional knowledge and capabilities, thereby creating a \nemployees with extensive professional knowledge and capabilities, thereby creating a \nfree and active business environment. \nfree and active business environment. \n\n**Business Environment**\n\n5.**Compliance**\n\nWe intend to be a financial services group that always keeps in mind the importance of \nWe intend to be a financial services group that always keeps in mind the importance of \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \ncompliance. For this purpose, we reflect our awareness of Business Ethics in our business \nactivities at all times. In addition, we respond promptly to directives from auditors and \nactivities at all times. In addition, we respond promptly to directives from auditors and \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \ninspectors. Through these actions, we observe all laws and regulations, and uphold moral \nstandards in our business practices. \nstandards in our business practices. \n\n**Participation in global initiatives**\n\nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nRecent years have seen a growing range of international initiatives to deal with threats to the sustainability of the global environment. \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nAs a global citizen, the SMFG Group, mindful of its societal influence as a financial institution, follows the guidelines and principles of \nthe following initiatives and organizations: \nthe following initiatives and organizations:", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) \n\n\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n**contribute to the sustainable development of society as a whole.**\n\n\n\n\n\n\n\n\n\nA further measure is installation of handheld \nA further measure is installation of handheld \n\n**Making banking**\n**a more pleasant experience**\n**for all customers**\n\nhearing support devices at all branches \nhearing support devices at all branches \n\n(except housing loan promotion offices), to \n(except housing loan promotion offices), to \n\nallay the concerns of hearing-impaired \nallay the concerns of hearing-impaired \n\ncustomers who find it difficult to converse \ncustomers who find it difficult to converse \n\nWith the old-age dependency ratio soaring, \nWith the old-age dependency ratio soaring, and follow spoken instructions. By using the \nand follow spoken instructions. By using the \n\nthe SMFG Group aims to provide friendly, \nthe SMFG Group aims to provide friendly, devices as communication tools, bank \ndevices as communication tools, bank \n\neasy-to-use banking services for all its \neasy-to-use banking services for all its employees can respect customer privacy \nemployees can respect customer privacy \n\nand do not have to talk loudly. \nand do not have to talk loudly. \n\ncustomers. \ncustomers. \nSome Group companies are likewise making \nSome Group companies are likewise making Further measures include posting of “green \nFurther measures include posting of “green \n\ntheir facilities barrier-free at bank branches \ntheir facilities barrier-free at bank branches \n\n\n\nThe SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on \n\near” logos at branches to reassure customers \near” logos at branches to reassure customers \n\nBut in recent years, consumers have come to \nBut in recent years, consumers have come to that the bank has facilities for conversing \nthat the bank has facilities for conversing \n\n**The financial sector’s role in**\n**improving the nation’s diet and**\n**in strengthening the agricultural**\n**and fisheries sectors**\n\nplace more priority on factors other than \nplace more priority on factors other than writing. All branches are being equipped \nin in writing. All branches are being equipped \n\nvolume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\nEnvironmental and \nenergy businesses: \n34.2% \nOthers: \n23.7% \n\n**Together with Our Customers**\n\nKansai Genki \nFund \nFinancing \nby sector \n(June 30, 2011) \n\nInvestment \nand business \nexpansion \nin Asia, etc.: \n10.5% \n\n**We believe it is important to contribute to maintenance and protection of**\n**the natural environment and the sustainable development of regional society**\n**through our core business, hand in hand with the customer.**\n\nEnvironmentally Responsible \nEnvironmentally Responsible \nCompany Support Fund \nCompany Support Fund \nEnvironmental Facilities \nEnvironmental Facilities \nSupport Fund \nSupport Fund \n\n**Name**\n\n**Social contribution**\n**and donation type-cards**\n**Credit cards**\n\nMedical, nursing and healthcare businesses: \n31.6% \n\n¥50 billion \n¥50 billion **Size of fund** The “Chikyuni Yasashii Card” \n\nThe fund supports companies \n**Outline**The fund supports companies \nwith environmentally-aware \nwith environmentally-aware \nmanagements or involvement in \nmanagements or involvement in \nenvironmental businesses \nenvironmental businesses \n\n**Harnessing the Bank of Japan’s**\n**“Fund-Provisioning Measure**\n**to Support Strengthening**\n**the Foundations**\n**for Economic Growth”**\n\nGenki Fund is used to help customers develop \nGenki Fund is used to help customers develop \n\na wide range of businesses. The bank will \na wide range of businesses. The bank will \n\ncontinue to play its role as a regional financial \ncontinue to play its role as a regional financial \n\ninstitution dedicated to supporting customers \ninstitution dedicated to supporting customers \n\nKansai Genki Fund: \nthat show originality and energy in helping \nthat show originality and energy in helping \n\nA helping hand for the regional economy \ndevelop the Kansai economy. \ndevelop the Kansai economy. \n\nKansai Urban Banking Corporation has \nKansai Urban Banking Corporation has \nKansai Genki Fund \nKansai Genki Fund **Name**\nlaunched a support initiative to boot up \nlaunched a support initiative to boot up \n\n¥50 billion \n¥50 billion **Size of fund**\nnext-generation industries. Marketing teams \nnext-generation industries. Marketing teams \n\nwith specialists in fields such as medical and \nwith specialists in fields such as medical and \n**Outline**\n\nnursing care, and environment and energy \nnursing care, and environment and energy \n\n\n\n\n\nFiscal 2011 is the 20th anniversary of the \nFiscal 2011 is the 20th anniversary of the \n\n“Chikyuni Yasashii Card,” a social contribution \n“Chikyuni Yasashii Card,” a social contribution \n\nand donation-type credit card launched by \nand donation-type credit card launched by \n\nCedyna in 1991. Donations made through \nCedyna in 1991. Donations made through \n\nthe card totaled over ¥500 million by 2006, \nthe card totaled over ¥500 million by 2006, \n\nand are expected to surpass ¥600 million \nand are expected to surpass ¥600 million \n\nin the coming fiscal year—a tribute to the \nin the coming fiscal year—a tribute to the \n\ngenerosity of cardholders. \ngenerosity of cardholders. \n\n“Chikyuni Yasashii Cards” fall into 14 \n“Chikyuni Yasashii Cards” fall into 14 \n\ncategories, based on a global environmental \ncategories, based on a global environmental \n\nprotection theme. These range from major \nprotection theme. These range from major \n\nissues affecting the entire planet, such as \nissues affecting the entire planet, such as \n\n\n\n**Cedyna issues other social**\n**contribution and**\n**donation-type credit cards**\n\n**Cedyna’s**\n**social contribution and**\n**donation type-card**\n**“Chikyuni Yasashii Card”**\nChina Business Support Fund \nChina Business Support Fund **Name**\n\n¥50 billion \n¥50 billion **Size of fund**\n\nThe fund supports for companies \n**Outline**The fund supports for companies \nconsidering moving into China, or \nconsidering moving into China, or \nexpanding their business there \nexpanding their business there", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "the Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo \n\nMitsui Card joined a literary social contribution \nMitsui Card joined a literary social contribution \n\ninitiative by participating in the Books To \ninitiative by participating in the Books To \n\nThe People 2010 project operated by BOOKOFF \nThe People 2010 project operated by BOOKOFF \n\n environ- \nCORP. This project aims to provide environ \nCORP. This project aims to provide \n\nments in which children can read books in \nments in which children can read books in \n\npurpose-built facilities, through donations to \npurpose-built facilities, through donations to \n\nRoom to Read, a non-governmental organi- \nRoom to Read, a non-governmental organi \n\nzation that supports education in developing \nzation that supports education in developing \n\ncountries. These NGO donations are pegged \ncountries. These NGO donations are pegged \n\nto total numbers of used books and other \nto total numbers of used books and other \n\nitems purchased by cardholders. Through \nitems purchased by cardholders. Through \n\nthe Sumitomo Mitsui Card-operated online \nthe Sumitomo Mitsui Card-operated online \n\nshopping mall POINT UP Mall, cardholders \nshopping mall POINT UP Mall, cardholders \n\nJapan, with the participation of 280 employ- \nJapan, with the participation of 280 employ \n\nees and their families. In addition, regional \nees and their families. In addition, regional \n\ncontribution activities were carried out by \ncontribution activities were carried out by \n\nSMBC and SMBC Nikko Securities donate a \nSMBC and SMBC Nikko Securities donate a \n\nportion of the profits from marketing of the \nportion of the profits from marketing of the \n\n“The \nSMBC Nikko World Bank Bond Fund ( “The \nSMBC Nikko World Bank Bond Fund \n\n) to the Japanese \nWorld Bank Green Fund” ) to the Japanese \nWorld Bank Green Fund \n\nRed Cross Society and the Japan Committee \nRed Cross Society and the Japan Committee \n\nfor UNICEF. \nfor UNICEF. \n\ns first \nThis investment trust is the world’s first \nThis investment trust is the world \n\nfund developed in cooperation with the \nfund developed in cooperation with the \n\nWorld Bank that invests in World Bank green \nWorld Bank that invests in World Bank green \n\nbonds, according to research by Nikko \nbonds, according to research by Nikko \n\nAsset Management Co., Ltd. Funds from \nAsset Management Co., Ltd. Funds from \n\nthe World Bank green bonds support only \nthe World Bank green bonds support only \n\nWorld Bank-funded projects in developing \nWorld Bank-funded projects in developing \n\ncountries to mitigate global warming. \ncountries to mitigate global warming. \n\n*Research by Nikko Asset Management Co., Ltd. \n\nare encouraged to buy used books through \nare encouraged to buy used books through \n\nBOOKOFF, and employees collect and donate \nBOOKOFF, and employees collect and donate \n\nused books from their homes and companies. \nused books from their homes and companies. \n\n\n\n\n\n\n\nNikko Securities carry out ongoing cleanup \nNikko Securities carry out ongoing cleanup \n\nand other activities in the areas around their \nand other activities in the areas around their \n\noffices and branches. \noffices and branches. \n\nThe Minato Bank and Kansai Urban Banking \nThe Minato Bank and Kansai Urban Banking \n\nCorporation also engage in cleanup activities \nCorporation also engage in cleanup activities \n\naround Suma Beach and Lake Biwa, to \naround Suma Beach and Lake Biwa, to \n\nprotect the regional environment. \nprotect the regional environment. \n\n\n\n\n\nVolunteers at the Shonan Erosion Control Forest project \n62 participants \nHelping clean up Senju Shinbashi bridge that spans Ara River \n64 participants \nHelping clean up Nishi Araibashi bridge that spans Ara River \n37 participants", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Social Contribution Activities**\n\n**1**\n★★ \n\n**Helping build prosperity**\n**in Asia and the world**\n\n**7** **8**\n★★ \n\n**2**\n★★ \n\n★★ \n\n★★ \n**3**\n**4**\n★★ \n★★ \n**10**\n★★ \n★★ \n**5**\n★★ \n★★ \n★★ \n\nThe SMFG Group is engaged in a range of activities \nThe SMFG Group is engaged in a range of activities \n\nthat contribute to development at both the regional \nthat contribute to development at both the regional \n\nand international level. In addition to overseas units’ \nand international level. In addition to overseas units’ \n\nindependent initiatives, which are geared to host \nindependent initiatives, which are geared to host \n\ncountry issues and characteristics, the Group supports \ncountry issues and characteristics, the Group supports \n\nprojects that have contributed to achievement of the \nprojects that have contributed to achievement of the \n\nUnited Nations’ global Millennium Development Goals, \nUnited Nations’ global Millennium Development Goals, \n\nsuch as poverty eradication, health improvement and \nsuch as poverty eradication, health improvement and \n\nstatus improvement for education and women in \nstatus improvement for education and women in \n\ndeveloping countries. Our support takes the form of \ndeveloping countries. Our support takes the form of \n\ndonations to non-profit and non-governmental \ndonations to non-profit and non-governmental \n\norganizations, through the employee volunteer fund. \norganizations, through the employee volunteer fund. \n\n(The map shows areas where fund money is used, \n(The map shows areas where fund money is used, \n\n**Europe**\n**7**\n\n**Donations to charity groups**\n\nEmployees of Sumitomo Mitsui Banking Corporation Europe \nEmployees of Sumitomo Mitsui Banking Corporation Europe \n(SMBCE) conducted volunteer activities in their time off. \n(SMBCE) conducted volunteer activities in their time off. \nSMBCE contributes to charitable organizations through an \nSMBCE contributes to charitable organizations through an \nin-house fund and also uses a matching gifts program under \nin-house fund and also uses a matching gifts program under \nwhich it donates a \nwhich it donates a \ncertain amount for \ncertain amount for \nevery donation made \nevery donation made \nby its employees. \nby its employees. \n\n**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. \n\n\n\n\n\n\n\n**6**\n\nMiddle East & Asia \n★★ \n\n symbol). Please see our website for \nmarked with a ★ symbol). Please see our website for \nmarked with a \nmore details. \nmore details. \n**South Korea** **Vietnam**\n**1** **4**\n\n**Support for a South Korean students’**\n**Japanese-language theater competition**\nAs a way of increasing understanding of Japanese culture, \nAs a way of increasing understanding of Japanese culture, \nSMBC \ns Seoul Branch donates funds to make possible the \nSMBC’s Seoul Branch donates funds to make possible the \nholding of a competition \nholding of a competition \ninvolving theatrical perfor- \ninvolving theatrical perfor \nmances in the Japanese \nmances in the Japanese \nlanguage by South Korean \nlanguage by South Korean \nstudents of Japanese. \nstudents of Japanese.", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Social Contribution**\n**Activities**\n\nGarbage was analyzed in the Kugenuma Beach cleanup event, in which SMFG and its Group companies participated \n**SMFG as a corporate citizen: Working to create a prosperous society for all**\n\nbranches at their own initiative. A wide variety \nbranches at their own initiative. A wide variety \n\n**SMFG and**\n**its Group companies**\n**participate in neighborhood**\n**cleanup programs** **Supporting education in**\n**developing countries,**\n**together with our customers**\n**and employees**\n\n**Donations through**\n**“The World Bank**\n**Green Fund”**\n\nof social contribution activities, such as the \nof social contribution activities, such as the \nMitsui Sumitomo VISA Card \ncollection of used stamps and PET bottle \ncollection of used stamps and PET bottle \n\ncaps, were carried out for global causes. \ncaps, were carried out for global causes. \n\nSumitomo Mitsui \nCard staff \nPOINT UP Mall \nSMBC Nikko Securities will continue activi- \nSMBC Nikko Securities will continue activi \n\nties that contribute to society and prioritize \nties that contribute to society and prioritize \n\ncommunication between employees. \ncommunication between employees. \n\nPromoting usage through \nthe point-allocation system \nDonation of used books \n\n\n\n\nSumitomo Mitsui \nCardholders \n\nBOOKOFF CORP Group \n\nBuying used books \n\nPurchase price \n\nBuilding libraries in developing countries \nthrough the NGO Room to Read \n\nIn the fall of 2010, SMBC Nikko Securities \nIn the fall of 2010, SMBC Nikko Securities \n\nestablished its “Green Week” for strength- \nestablished its “Green Week” for strength \n\nening environmental protection and social \nening environmental protection and social \n\ncontribution activities, with the aim of \ncontribution activities, with the aim of \n\npromoting communication within regional \npromoting communication within regional \n\nsociety and among participating employees \nsociety and among participating employees \n\nand their families, while deepening under- \nand their families, while deepening under \n\nstanding of environmental protection through \nstanding of environmental protection through \n\nEmployees and their families pitch in to clean up \n the bed of the Ara River in Tokyo \nparticipation in social contribution activities. \nparticipation in social contribution activities. \n\nBetween November 13 and December 5, \nBetween November 13 and December 5, \nEnvironmental protection activities \n2010, environmental protection programs \n2010, environmental protection programs \nForestry management volunteering experience in Osaka \n(Izumi no Mori) \nwere rolled out by cross-organizational \nwere rolled out by cross-organizational \n117 participants \n“Green Committees” in four locations in \n“Green Committees” in four locations in \n\nIn fiscal 2010, 150 volunteers from the \nIn fiscal 2010, 150 volunteers from the \n\nSMFG Group participated in beach cleanup \nSMFG Group participated in beach cleanup \n\nactivities in Kanagawa and Hyogo prefectures \nactivities in Kanagawa and Hyogo prefectures \n\non “SMFG Clean-up Day.” This initiative is \non “SMFG Clean-up Day.” This initiative is \n\nnot simply a matter of picking up garbage. It \nnot simply a matter of picking up garbage. It \n\nalso involves inspections and analysis of \nalso involves inspections and analysis of \n\ngarbage to identify pointers for providing \ngarbage to identify pointers for providing \n\nsolutions for environmental issues in the \nsolutions for environmental issues in the \n\nfuture. \nfuture. \n\nIn addition to beach cleanup activities in \nIn addition to beach cleanup activities in \n\nChiba and Hyogo prefectures by SMBC \nChiba and Hyogo prefectures by SMBC \n\nFriend Securities, Group companies of \nFriend Securities, Group companies of \n\nCedyna, Sumitomo Mitsui Finance & Leasing, \nCedyna, Sumitomo Mitsui Finance & Leasing, \n\nthe Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", + "target_page": 8, + "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "housing for the elderly, expected to be a \nhousing for the elderly, expected to be a \n\nfuture growth area. \nfuture growth area. \n\nW hile c o n t inuing t o t a ilo r bu sine s s \nW hile c o n t inuin g t o t a ilo r b u s in e s s \n\nactivities to the needs of the community at \nactivities to the needs of the community at \n\nlarge and ensuring a friendly banking \nlarge and ensuring a friendly banking \n\nenvironment for our customers, the SMFG \nenvironment for our customers, the SMFG \n\nGroup also plans to support the creation of \nGroup also plans to support the creation of \n\n\n\n\n\n**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC \n\nThe Minato Bank has created a position \nThe Minato Bank has created a position \n\ntitled “Service Care Manager” at each of \ntitled “Service Care Manager” at each of \n\nits branches, filled by at least one branch \nits branches, filled by at least one branch \n\nmanagerial staffer, as part of measures to \nmanagerial staffer, as part of measures to \n\nmake branch visits more pleasant for \nmake branch visits more pleasant for \n\ncustomers, following earlier nuts-and-bolts \ncustomers, following earlier nuts-and-bolts \n\nimprovements. \nimprovements. \n\nService Care Managers are dedicated to \nService Care Managers are dedicated to \n\nimproving support and services for the \nimproving support and services for the \n\ncustomer at each branch. Their training \ncustomer at each branch. Their training \n\nincludes simulations of the problems faced \nincludes simulations of the problems faced \n\nby persons with disabilities, awareness \nby persons with disabilities, awareness \n\nraising and support methods for the elderly \nraising and support methods for the elderly \n\nand persons with disabilities. \nand persons with disabilities.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) \n\n\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n**contribute to the sustainable development of society as a whole.**\n\n\n\n\n\n\n\n\n\nA further measure is installation of handheld \nA further measure is installation of handheld \n\n**Making banking**\n**a more pleasant experience**\n**for all customers**\n\nhearing support devices at all branches \nhearing support devices at all branches \n\n(except housing loan promotion offices), to \n(except housing loan promotion offices), to \n\nallay the concerns of hearing-impaired \nallay the concerns of hearing-impaired \n\ncustomers who find it difficult to converse \ncustomers who find it difficult to converse \n\nWith the old-age dependency ratio soaring, \nWith the old-age dependency ratio soaring, and follow spoken instructions. By using the \nand follow spoken instructions. By using the \n\nthe SMFG Group aims to provide friendly, \nthe SMFG Group aims to provide friendly, devices as communication tools, bank \ndevices as communication tools, bank \n\neasy-to-use banking services for all its \neasy-to-use banking services for all its employees can respect customer privacy \nemployees can respect customer privacy \n\nand do not have to talk loudly. \nand do not have to talk loudly. \n\ncustomers. \ncustomers. \nSome Group companies are likewise making \nSome Group companies are likewise making Further measures include posting of “green \nFurther measures include posting of “green \n\ntheir facilities barrier-free at bank branches \ntheir facilities barrier-free at bank branches \n\n\n\nThe SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on \n\near” logos at branches to reassure customers \near” logos at branches to reassure customers \n\nBut in recent years, consumers have come to \nBut in recent years, consumers have come to that the bank has facilities for conversing \nthat the bank has facilities for conversing \n\n**The financial sector’s role in**\n**improving the nation’s diet and**\n**in strengthening the agricultural**\n**and fisheries sectors**\n\nplace more priority on factors other than \nplace more priority on factors other than writing. All branches are being equipped \nin in writing. All branches are being equipped \n\nvolume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "volume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message \n\nhealthiness, and the cultural aspects of diet. \nhealthiness, and the cultural aspects of diet. ablets for dialogue with customers who \ntablets for dialogue with customers who \n\nAs discussion continues on the need for \nAs discussion continues on the need for have concerns about their hearing and who \nhave concerns about their hearing and who \n\nfarmers to increase production scale and \nfarmers to increase production scale and dislike written conversations. \ndislike written conversations. \n\nFor many years, food supply networks in \nFor many years, food supply networks in move into processing and marketing, major \nmove into processing and marketing, major \n\nJapan were premised on mass production and \nJapan were premised on mass production and changes are underway in the agriculture and \nchanges are underway in the agriculture and \n\n**Peace of mind**\n**at the bank counter**\n\nmass consumption, enabling the country to \nmass consumption, enabling the country to fisheries sector in Japan. \nfisheries sector in Japan. \n\nmeet soaring food demand at a time of rapid \nmeet soaring food demand at a time of rapid Against this backdrop, SMBC has developed \nAgainst this backdrop, SMBC has developed \n\ngrowth in the population and economy. \ngrowth in the population and economy. a new financial product for this sector. \na new financial product for this sector. \n\nongoing improvement of this system. \nongoing improvement of this system. \n\nBy backing customer companies’ own \nBy backing customer companies’ own \n\ninitiatives in the areas of food and agriculture \ninitiatives in the areas of food and agriculture \n\nin this way, SMBC will be supporting measures \nin this way, SMBC will be supporting measures \n\nto improve the diet of the Japanese and \nto improve the diet of the Japanese and \n\nstrengthen the agriculture and fisheries sector. \nstrengthen the agriculture and fisheries sector. \n\nwith large numbers of customers, to tailor \nwith large numbers of customers, to tailor \n\nservices to the needs of all customers. \nservices to the needs of all customers. \n\nFor example at the Minato Bank, we have \nFor example at the Minato Bank, we have \n\nequipped all ATMs at all our branches and \nequipped all ATMs at all our branches and \n\ncashpoints with voice-guidance handsets for \ncashpoints with voice-guidance handsets for \n\nthe visually impaired. \nthe visually impaired. \n\nIn addition, we have set up priority seating \nIn addition, we have set up priority seating \n\nin the lobby of each of our branches for \nin the lobby of each of our branches for \n\ncustomers who are very old or who have \ncustomers who are very old or who have \n\nmobility problems. We are also steadily \nmobility problems. We are also steadily \n\nintroducing queue-number displays using \nintroducing queue-number displays using \n\nColor Universal Design (CUD) principles, \nColor Universal Design (CUD) principles, \n\n**For further details, please see our website.**\nwhich are easier to read for customers with \nwhich are easier to read for customers with \n\neyesight concerns. \neyesight concerns. \n\nIn addition to removing mobility barriers at \nIn addition to removing mobility barriers at \n\nbranches, the bank plans to aggressively \nbranches, the bank plans to aggressively \n\nsupport installation of facilities needed to \nsupport installation of facilities needed to \n\ncope with the rapidly rising old-age \ncope with the rapidly rising old-age \n\ndependency ratio. As a first step, SMBC \ndependency ratio. As a first step, SMBC \n\nhas est ablished clear guidelines for \nhas est ablished clear guidelines for \n\nsuppor ting the construction of rental \nsuppor ting the construction of rental \n\nhousing for the elderly, expected to be a \nhousing for the elderly, expected to be a \n\nfuture growth area. \nfuture growth area.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**\n\n**Comprehensive**\n**disclosure of**\n**CSR activities**\nCovers environment-related statistical data and gives more detailed \nCovers environment-related statistical data and gives more detailed \ninformation on CSR activities \ninformation on CSR activities \n\n\n\n\n\n**About this Report**\n\nPeriod Covered \n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” ) \nNote: Certain items in this report refer to activities taking place after April 2011. \n\n: \n\n**CSR report (online version, Japanese only)**\n\nPublication Date of \nJapanese Document \n\n**Enriched**\n**CSR disclosure**\n\nDecember 2011 \n: \nwww.smfg.co.jp/responsibility \n\nContact \n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. \n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 \nTEL: +81-3-3282-8111 \n\n: \n\nThis is the official version of our CSR report. Covers the full spectrum of \nThis is the official version of our CSR report. Covers the full spectrum of \nCSR activities at SMFG \nCSR activities at SMFG", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\nEnvironmental and \nenergy businesses: \n34.2% \nOthers: \n23.7% \n\n**Together with Our Customers**\n\nKansai Genki \nFund \nFinancing \nby sector \n(June 30, 2011) \n\nInvestment \nand business \nexpansion \nin Asia, etc.: \n10.5% \n\n**We believe it is important to contribute to maintenance and protection of**\n**the natural environment and the sustainable development of regional society**\n**through our core business, hand in hand with the customer.**\n\nEnvironmentally Responsible \nEnvironmentally Responsible \nCompany Support Fund \nCompany Support Fund \nEnvironmental Facilities \nEnvironmental Facilities \nSupport Fund \nSupport Fund \n\n**Name**\n\n**Social contribution**\n**and donation type-cards**\n**Credit cards**\n\nMedical, nursing and healthcare businesses: \n31.6% \n\n¥50 billion \n¥50 billion **Size of fund** The “Chikyuni Yasashii Card” \n\nThe fund supports companies \n**Outline**The fund supports companies \nwith environmentally-aware \nwith environmentally-aware \nmanagements or involvement in \nmanagements or involvement in \nenvironmental businesses \nenvironmental businesses \n\n**Harnessing the Bank of Japan’s**\n**“Fund-Provisioning Measure**\n**to Support Strengthening**\n**the Foundations**\n**for Economic Growth”**\n\nGenki Fund is used to help customers develop \nGenki Fund is used to help customers develop \n\na wide range of businesses. The bank will \na wide range of businesses. The bank will \n\ncontinue to play its role as a regional financial \ncontinue to play its role as a regional financial \n\ninstitution dedicated to supporting customers \ninstitution dedicated to supporting customers \n\nKansai Genki Fund: \nthat show originality and energy in helping \nthat show originality and energy in helping \n\nA helping hand for the regional economy \ndevelop the Kansai economy. \ndevelop the Kansai economy. \n\nKansai Urban Banking Corporation has \nKansai Urban Banking Corporation has \nKansai Genki Fund \nKansai Genki Fund **Name**\nlaunched a support initiative to boot up \nlaunched a support initiative to boot up \n\n¥50 billion \n¥50 billion **Size of fund**\nnext-generation industries. Marketing teams \nnext-generation industries. Marketing teams \n\nwith specialists in fields such as medical and \nwith specialists in fields such as medical and \n**Outline**\n\nnursing care, and environment and energy \nnursing care, and environment and energy \n\n\n\n\n\nFiscal 2011 is the 20th anniversary of the \nFiscal 2011 is the 20th anniversary of the \n\n“Chikyuni Yasashii Card,” a social contribution \n“Chikyuni Yasashii Card,” a social contribution \n\nand donation-type credit card launched by \nand donation-type credit card launched by \n\nCedyna in 1991. Donations made through \nCedyna in 1991. Donations made through \n\nthe card totaled over ¥500 million by 2006, \nthe card totaled over ¥500 million by 2006, \n\nand are expected to surpass ¥600 million \nand are expected to surpass ¥600 million \n\nin the coming fiscal year—a tribute to the \nin the coming fiscal year—a tribute to the \n\ngenerosity of cardholders. \ngenerosity of cardholders. \n\n“Chikyuni Yasashii Cards” fall into 14 \n“Chikyuni Yasashii Cards” fall into 14 \n\ncategories, based on a global environmental \ncategories, based on a global environmental \n\nprotection theme. These range from major \nprotection theme. These range from major \n\nissues affecting the entire planet, such as \nissues affecting the entire planet, such as \n\n\n\n**Cedyna issues other social**\n**contribution and**\n**donation-type credit cards**\n\n**Cedyna’s**\n**social contribution and**\n**donation type-card**\n**“Chikyuni Yasashii Card”**\nChina Business Support Fund \nChina Business Support Fund **Name**\n\n¥50 billion \n¥50 billion **Size of fund**\n\nThe fund supports for companies \n**Outline**The fund supports for companies \nconsidering moving into China, or \nconsidering moving into China, or \nexpanding their business there \nexpanding their business there", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n\n\nSpecific Examples of CSR Activities \n\n**Together with Our Employees**\n\n**We are developing human resources that can take on global roles,**\n**and we are creating globalized working environments**\n\nprocess of “in-house internationalization.” \nprocess of “in-house internationalization.” \n\n**Preparing human resources**\n**to take on global roles**\n\n**Creating support tools**\n**for developing the role of**\n**female employees**\n\nUnder our “global course” program, newly \nUnder our “global course” program, newly \n\nhired sogoshoku \nhired (management-track) staff \nsogoshoku (management-track) staff \n\nare sent overseas after basic training. We \nare sent overseas after basic training. We \n\nFaced with changing markets and rising \nFaced with changing markets and rising have also expanded human resource \nhave also expanded human resource \n**“My Story”**\ncosts, many Japanese companies are \ncosts, many Japanese companies are training programs in English and Chinese \ntraining programs in English and Chinese \n\nmoving their operations overseas. Many \nmoving their operations overseas. Many and at overseas units. \nand at overseas units. \n\nlarge companies already have gone global \nlarge companies already have gone global Improvement of language skills in particular \nImprovement of language skills in particular \n\nin terms of production and marketing bases, \nin terms of production and marketing bases, is s ome t hing t ha t r equir e s ongoing \nis s ome t hing t hat requir es ongoing \n\nbalance between work and care needs. \nbalance between work and care needs. \n\n**Better support for carers:**\n**Workplace measures to**\n**deal with the rising old-age**\n**dependency ratio**\n\nThe improvements have three aspects: \nThe improvements have three aspects: \n\n(1) Care-leave time has been extended to \n(1) Care-leave time has been extended to \n\none year; (2) the time frame during which \none year; (2) the time frame during which \n\nstaggered and shortened working hours \nstaggered and shortened working hours \n\nfor care-giving are allowed has been \nfor care-giving are allowed has been \n\nIn November 2010, the bank expanded its \nIn November 2010, the bank expanded its extended to three years; and (3) greater \nextended to three years; and (3) greater \n\nemployee carer support program. \nemployee carer support program. flexibility has been introduced in reduction \nflexibility has been introduced in reduction \n\nEven now, much remains to be done to \nEven now, much remains to be done to of working hours for care purposes. \nof working hours for care purposes. \n\ndevelop public suppor t mechanisms, \ndevelop public suppor t mechanisms, \n\nat overseas units and for regular employees \nat overseas units and for regular employees \n\nin Japan. All of these courses are in English \nin Japan. All of these courses are in English \n\nand feature discussions and presentations \nand feature discussions and presentations \n\non resolution of issues faced by global \non resolution of issues faced by global \n\ncompanies. Through such lively exchanges, \ncompanies. Through such lively exchanges, \n\nthe aim is to develop the ability to deepen \nthe aim is to develop the ability to deepen \n\ncross-cultural communication and cultivate \ncross-cultural communication and cultivate \n\na global outlook and mentality. \na global outlook and mentality. \n\nAt the bank, we will continue measures to \nAt the bank, we will continue measures to \n\npromote globalization going forward, and \npromote globalization going forward, and \n\ncreate systems that can provide higher \ncreate systems that can provide higher \n\nquality support to our customers. \nquality support to our customers. \n\nWe have also established the SMBC Care \nWe have also established the SMBC Care \n\nConsultation Desk as a convenient general \nConsultation Desk as a convenient general \n\nservice for employees and their family \nservice for employees and their family", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "[html]Fiscal year 2003 ( For the year ended Mer. 31.2004 )Millions of yenAutomobile and EliminationsSales FinancingConsolidated fotalOperating activitiesIncome before income taxes and minority inferests — overwork — overwork — overwork — overwork — overwork — overworkY671.513¥ 64.984¥ 736.497Depreciation and amortization — onconconcensesses — onconcensesses313.146147.891461.037Increase in finance receivables — oceoconcentratenesses — oceoconomical subcomes( 154 )( 462.956 )( 463.110 )QFQ : Q57.9365.05762.993Net cash provided by ( used in ) operating activities — overwerwerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewerenewers1.042.441( 245.024 )797.417Investing activitiesProceeds from sales of investment securities including shares of subsidiaries ————————40.4883440.522Proceeds from sales of property, plant and equipment - exercise --------------------------------------------------------------------------------------------------------------------------------------53.82710553.932Purchases of foed assessment -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------( 422.326 )( 6.061 )( 428.387 )Purchases of least vehicles................................................................................................................................................................................( 19.295 )( 457.318 )( 476.613 )Proceeds from sales of leased vehicles.......................................................................................................................................................................20.857170.248191.105QPg!||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||( 101.534 )( 35.151 )( 136.685 )Nel cash used in investing activities........................................................................................................................................................................( 427.983 )( 328.143 )( 756.126 )Financing activities( Decrease ) increase in short - term borrowings.---------------------------------------------------------------------------------------------------------------------------------------------------------------( 306.969 )169.394( 137.575 )( Decrease ) increase in long - ferm borrowings.................................................................................................................................................................( 244.774 )3.1, 473126.699Increase in bonds and debentures — oneoconsenses — oneoconsesses120.00030.000150.000QPg!||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||( 253.031", + "page_start": 100, + "page_end": 100, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "What is the trend of flood risk in Canada in 2024?", + "target_page": 1, + "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
\n\nHow can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**17**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n\n\n**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. \n\n**Table 6.**Global mean changes at 1.5°C global warming compared to present day for individual ensemble members, for the \nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean \nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow). \n\n\n \n \n \n \n [html]\n
IPSL - CMSA - LRGFDL - ESM2MHadGEM2 - ESIPSL - CMSA - MRMIROC - ESM - CHEMACCESS1 - 0ensemble mean
TXx (° C )1.21.91.72.01.51.91.7
TX90p (% time )10.015.716.219.214.118.315.6
CDD− 1.20.7− 1.3− 5.40.0− 3.8− 1.6
RX5day ( mm )1.13.64.54.64.04.33.6
drought proxy0.740.48n. a.0.390.160.310.42
flood proxy0.750.73n. a.0.730.790.730.75
Pmean (%)1.40.93.11.33.92.42.2
Rmean (%)2.10.75.40.76.75.03.9
Rlow (%)− 3.40.35.92.25.94.92.6
\n\ndays were projected to exceed the baseline 10th percentile, at 1.5°C this reduces by 15–20% or \nmore. Again, the patterns of change at 1.5°C retain a similar geographical pattern of greater \nincreases in the tropics than mid-latitudes (electronic supplementary material).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "**2014 Outlook**\n**Economic Growth Opportunities in Atlantic Canada**\n\nLarge economic projects, either proposed or underway in Atlantic Canada, are expected to drive economic and population growth. Highlights \nfrom the five largest projects are included below: \n\nv Continued progress on the $25 billion Irving Shipbuilding project is expected to generate growth in Nova Scotia in 2014, 2015 and beyond. \nPresently, Irving is investing approximately $350 million modernizing the Halifax Shipyard to begin cutting steel in 2015. \n\nv The $7.8 billion Muskrat Falls hydro project is driving strong economic growth in Newfoundland and Labrador (“NL”) and recently the \n$1.52 billion Maritime Link subsea cable designed to transport electricity from NL to Nova Scotia has been approved. \n\nv Shell Canada has been awarded the exploration rights for eight parcels offshore Nova Scotia and has committed to spending more than \n$1 billion exploring these parcels over the next six years. \n\nv BP Exploration Company Ltd (“BP”) was awarded another four deep water parcels for a total exploration spending commitment of nearly \n$1.1 billion over six years. This offshore oil activity has the potential for long‑term spending and employment opportunities in the region \ndepending on the results of the exploration activity over the coming years. \n\nv The proposed Energy East Pipeline Project is positive economic news for the Saint John, New Brunswick market. \n\nKillam’s Atlantic portfolio is also poised to benefit from the continued migration to urban centers, which is generating population growth in \nKillam’s core markets in Atlantic Canada. \n\n**Occupancy Gains Expected**\n\nKillam expects to see modest gains in occupancy levels in the first and second quarter of 2014 compared to 2013. These gains are expected from \nfurther expansion of marketing and leasing activities, including a focus on tenant retention. Killam expects to see continued positive results \nfrom its Ontario portfolio throughout the next year as the Company’s Ottawa properties acquired in 2012 and early 2013 have stabilized. Killam \nforecasts to operate these properties at an average vacancy rate of approximately 2%, consistent with market norms in this region. Furthermore, \nthe Company expects to continue to outperform CMHC in its core markets located in Atlantic Canada. Trending in the first quarter of 2014 has \nshown steady occupancy gains in all New Brunswick markets as well as PEI, more than offsetting a slight decrease in occupancy in Halifax. Rental \nrevenue growth is expected in the range of 1% ‑ 2% across the portfolio in 2014, given Ontario’s rental increases are capped at 0.8% for 2014 and \nmarket pressures from new supply in Killam’s core markets in Atlantic Canada. \n\n**Natural Gas Volatility**\n\nThe Company expects to see continued volatility in natural gas pricing in Nova Scotia and New Brunswick until additional pipeline capacity is built \nto alleviate supply constraints in Atlantic Canada and the Northeastern US, bringing pricing more in‑line with other areas of North America. In \nthe short‑term, Management will continue to manage properties to maximize energy efficiencies. In addition, where dual‑fired heating systems \nexist, the Company will switch to oil when the economics support the change and will explore investing in increasing the base of dual‑fired \nsystems. \n\n**Acquisition Activity With a Focus in Ontario and Two New Developments Underway**", + "page_start": 27, + "page_end": 27, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). \n\n\n–0.2 0 \n0.2 \n1.0 \n0.6 \nvulnerability to food insecurity \n0.4 0.8 1.2 1.4 \n\n\n\n\n\n**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
driving SSTs1.5 ° C2.0 ° C
IPSL - CM5A - LR20152030
GFDL - ESM2M20402055
HadGEM2 - ES20272039
IPSL - CM5A - MR20202034
MIR0C - ESM - CHEM20232035
ACCESS1 – 020342046
\n\n**Table 3.**Time of reaching GWLs of 1.5°C and 2°C in the raw output from the HadGEM3 climate simulations, driven by different \nsets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied \nto the calculation of the ClimPACT indices. \n\n**8**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nup to present-day plus model-projected warming thereafter (table 4). While this does lead to \ninconsistent definitions of dates of the GWLs for applications of the climate model output with \nand without bias correction, the focus here is on the level of warming relative to pre-industrial \nrather than the timing of this warming. Therefore, priority is given to an accurate quantification \nof GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming \nlevels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on \nthe model and warming level. This inconsistency would have consequences if these results were \napplied to time-dependent impacts and adaptation assessments, but that is not the case here so \nthis concern does not apply. However, one issue is that the time-dependent nature of the aerosol \nforcing means that the spatial pattern of regional climate responses varies over time, so this will \nlead to some degree of inconsistency between the analysis of the ClimPACT extremes and the \nHCVI and JULES impacts projections. \n\n3. Results \n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the \nlevel of agreement between models for a particular projected change, and hence an indication \nof potential robustness of the projected changes for informing adaptation. We then make a \ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would \nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in \nregional climate outcomes, we address this in a number of ways. For individual realizations, we \ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C, \neven if the sign of the change is uncertain. We also compare the range of outcomes at different \nGWLs, to see if the regional-scale uncertainty itself increases with global warming. \n\n(a) Climate-change impacts at 2°C global warming", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Capital loses in Canada that can be applied against future capital gains$ 43
$44Tax losses in foreign jurisdictions that expire between 2023
and 20331734
Deductible temporary differences in foreign jurisdictions3245
$ 92$ 123
\n\nthe reversal, and the reversal", + "page_start": 109, + "page_end": 109, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**19**\n\n\n\n\n\n\n\n(*a*) \n6.0 \n5.0 \n\n4.0 \n\n3.0 \n2.0 \n\n1.0 \n\n0 \n\n(*b*) \n10.0 \n\n8.0 \n\n6.0 \n\n4.0 \n\n2.0 \n\n0 \n\n(*c*) \n12.0 \n\n8.0 \n\n4.0 \n\n0.0 \n\n–4.0 \n\nIPS L-C M 5 A-L R \n\n\n\nG F D L-E S M 2 M \n\nM IR O C-E S M -C H E M \n\nA C C E SS1-0 \n\n1.5°C 2°C \n\n**Figure 13.**Global mean percentage changes relative to 1981–2010 in (a) precipitation over land, (b) mean run-off flows, (c) low \nrun-off lows (10th percentile), at 2°C and 1.5°C global warming. \n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "**5**\n\n\n \n \n \n \n [html]\n
IDdefinitionunitssector of relevance
TXxannual maximum daily maximum temperature° Chealth, agriculture and food security
TX90ppercentage of days above the 90th percentile of daily maximum temperature in the 1981 – 2010 average%health, agriculture and food security, water resources and hydrology
CDDmaximum number of consecutive days with precipitation less than 1 mmdayshealth, agriculture and food security, water resources and hydrology
RX5daymaximum consecutive 5 day precipitationmmhealth, agriculture and food security, water resources and hydrology
\n\nmembers at any given date. Since specific levels of global warming such as 1.5°C or 2°C were \nreached at different times in the different ensemble members, according to the SST forcings used, \nany given level of global warming could be associated with different radiative forcings in different \nensemble members. In any given ensemble member at any specific level of global warming, the \nCO2 concentration and SSTs were the same as in the driving CMIP5 model at that GWL. Land \ncover was fixed in this simulation—there was no dynamic vegetation nor any time-dependent \nanthropogenic land use change. \nSome comparison of the higher-resolution atmospheric simulations with the original CMIP5 \nsimulations, is provided by Wyser*et al.*[20]. \n\n(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index \n\nTo assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. \n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How flooding was prevented in Vancouver? ", + "target_page": 1, + "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "threaten their conservation status. To support this, data collection on by-catch for all \nsensitive species needs to be stepped up. \n\nIn addition,**fisheries-management measures**must be established in all marine protected \nareas according to clearly defined conservation objectives and on the basis of the best \navailable scientific advice. \n\n*2.2.7. Restoring freshwater ecosystems*\n\nThe EU’s legal framework on water is ambitious but implementation is lagging behind \nand enforcement must be stepped up46. Greater efforts are needed to**restore freshwater**\n**ecosystems and the natural functions of rivers**in order to achieve the objectives of the \nWater Framework Directive. This can be done by removing or adjusting barriers that \nprevent the passage of migrating fish and improving the flow of water and sediments. To \nhelp make this a reality,**at least 25,000 km of rivers will be restored into free-flowing**\n**rivers by 2030**47 through the removal of primarily obsolete barriers and the restoration of \nfloodplains and wetlands. Technical guidance and support to the Member States to \nidentify sites and help mobilise funding will be provided by the Commission in 2021, in \nconsultation with all relevant authorities48. Member State authorities should review water \nabstraction and impoundment permits to implement ecological flows in order to achieve \ngood status or potential of all surface waters and good status of all groundwater by 2027 \nat the latest, as required by the Water Framework Directive49. To that effect, the \nCommission will provide technical support to Member States on their measures by 2023. \n\nOverall, large-scale river and floodplain restoration investments50 can provide a major \neconomic boost for the restoration sector and for local socioeconomic activities such as \ntourism and recreation. At the same time, these investments can improve water \nregulation, flood protection, nursery habitats for fish, and the removal of nutrient \npollution. \n\n*2.2.8. Greening urban and peri-urban areas*\n\n**Green urban spaces**, from parks and gardens to green roofs and urban farms, provide a \nwide range of benefits for people. They also provide opportunities for businesses and a \nrefuge for nature. They reduce air, water and noise pollution, provide protection from \nflooding, droughts and heat waves, and maintain a connection between humans and \nnature51. \n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the**value of green**\n**urban spaces for our physical and mental wellbeing**. While protection of some urban \n\n46 Fitness Check of the EU Water Legislation (SWD(2019) 439); Evaluation of the Urban Waste Water \nTreatment Directive (SWD(2019) 700). \n47 The target of 25,000 km is based on the Commission’s assessment of what is achievable in the EU by \n2030. \n48 The guidelines will take a wide range of issues into account, including hydropower generation, flood \nmanagement, water supply, agriculture and navigability. \n49 These measures should be planned in the 3rd River Basin Management Plans to be adopted by Member \nStates in 2021, under the Water Framework Directive. \n\n50 Fitness Check of the EU Water Legislation (SWD(2019) 439). \n51 EnRoute project. \n\n12", + "page_start": 12, + "page_end": 12, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Work on Dampier B A S E E X P A N S I O N W O R K S A N D E N V I R O N M E N T A L M A N A G E M E N T \n\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving \n\na capital budget of $13m. \n\n**A. DREDGING**\n\nApproximately 700,000 m3 of material is to be dredged in King Bay to form an entrance \n\nchannel, vessel berths, cyclone moorings and to provide access to the slipway. \n\nThe experience of Woodside constructing their nearby base in 1981 indicates that two types of \n\ndredges will be required, a Cutter Suction to remove the soft unconsolidated material (approx.70%) \n\nand a Dipper Dredge (barge mounted back-hoe) to remove harder consolidated material. \n\nThe Dipper Dredge will be the largest of its type in the world, and will be an ideal remedial \n\ndredging tool using the experience gained from the earlier Woodside project. \n\nThe layout of the Base has been very much driven by the desire to avoid or minimize blasting \n\nwhile fulfilling functional objectives. \n\n**B. QUAY WALL ( BERTH 1)**\n\nMarket research and customer needs have caused Mermaid to relocate and redesign the main \n\nberth to accommodate a wider range of vessels than originally contemplated. The berth is now \n\nlocated in deeper water with better vessel access. \n\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide \n\n(MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**21.**—(1) Workers engaged in essential or emergency works— \n(a) related to water supplies and sewerage services; and \n(b) carried out by, for, or on behalf of a water undertaker, sewerage undertaker, water supply \nlicensee, sewerage licensee or local authority, \n\nwhere they have travelled to the United Kingdom in the course of their work. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “essential or emergency works” includes— \n\n(i) inspections, maintenance, repairs, and asset replacement activities, \n(ii) monitoring, sampling and analysis of water supplies under the Private Water \nSupplies (England) Regulations 2016(**a**), the Water Supply (Water Quality) \nRegulations 2016(**b**), the Private Water Supplies (Wales) Regulations 2017(**c**), or the \nWater Supply (Water Quality) Regulations 2018(**d**); \n\n(b) “sewerage licensee” means the holder of a sewerage licence under section 17BA of the \nWater Industry Act 1991(**e**); \n\n(c) “sewerage services” has the meaning given in section 219(1) of the Water Industry Act \n\n1991(**f**); \n\n(d) “water supply licensee” has the meaning given in sections 17A(7) and 219(1) of the \nWater Industry Act 1991(**g**). \n\n**22.**—(1) Workers engaged in essential or emergency works relating to flood and coastal erosion \n\nrisk management on behalf of— \n\n(a) the Environment Agency; or \n(b) a lead local flood authority in England. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “flood” and “coastal erosion” have the meanings given in section 1 of the Flood and \n\nWater Management Act 2010(**h**); \n\n(b) “lead local flood authority” has the meaning given in section 6(7) of that Act; \n(c) “risk management” has the meaning given in section 3 of that Act(**i**). \n\n**23.**—(1) Workers engaged in essential or emergency works— \n\n(a) related to— \n\n(i) a generating station, \n(ii) an electricity interconnector, \n(iii) a district heat network as defined in regulation 2 of the Heat Network (Metering and \nBilling) Regulations 2014(**j**), \n\n(iv) communal heating as defined in regulation 2 of the Heat Network (Metering and \n\nBilling) Regulations 2014, \n\n(v) automated ballast cleaning and track re-laying systems on a network, or \n(vi) the commissioning, maintenance and repair of industrial machinery for use on a \nnetwork; or \n\n(**a**) S.I. 2016/618; relevant amending instruments are S.I. 2017/506, 2018/707 and 2019/558. \n(**b**) S.I. 2016/614; relevant amending instruments are S.I. 2017/506, 2018/706 and 378, 2019/526 and 558. \n(**c**) S.I. 2017/1041 (W. 270), as amended by S.I. 2018/647 (W. 121), S.I. 2019/460 (W. 110) and S.I. 2019/463 (W. 111). \n(**d**) S.I. 2018/647 (W. 121), as amended by S.I. 2019/463 (W. 111). \n(**e**) 1991 c. 56. Section 17BA(6) was inserted by section 4(1) of the Water Act 2014 (c. 21). The reference to “sewerage \n\nlicensee” was inserted in section 219(1) by paragraph 120(2)(f) of Schedule 7 to the Water Act 2014. \n(**f**) The definition of “sewerage services” was amended by paragraph 120 of Schedule 7 to the Water Act 2014. \n(**g**) Section 17A was inserted by section 1 of the Water Act 2014. \n(**h**) 2010 c. 29. \n(**i**) And see section 2 of the Flood and Water Management Act 2010 for the meaning of “risk”. \n(**j**) S.I. 2014/3120. There are no relevant amending instruments.", + "page_start": 39, + "page_end": 39, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when \n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast \n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of \n\nOnslow and Exmouth further to the south. \n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers \n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is \n\ntypically on cyclone alert three times per season. The season is November to April. \n\nTo date there have been three options available to vessel owners when a cyclone approaches:. \n\n• Run to sea \n\n• Take refuge with crew onboard, on a mooring in the most sheltered location available such \n\nas the Dampier Archipelago or the Monte Bello Islands. \n\n• Construct a cyclone shelter. \n\nMermaid has undertaken significant engineering work on the placing of vessels on partially \n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews \n\ndemobilized to take care of their families and attend to household cyclone preparation.", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. \n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room \n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four \n\nvessel specific mooring lines secured to special attachment points on the vessel. \n\n**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. \n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services \n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex \n\nregulatory requirements related to health, safety, quarantine, environmental management, dust, \n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this \n\nimplementation stage.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**•**\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle \n\nmost of the 60 vessels currently working in the region, a considerable number, but one \n\nwhich will rise over coming years. First class engineering facilities have been planned \n\nand highly experienced management recruited. Alternative slipways offering \n\ncomparable capacity are only to be found in Darwin or Fremantle, a sea journey of \n\napproximately 1000 miles from this operational region. Australia has emerged as a \n\ncentre of excellence with respect to vessel repair work, the Dampier facility will both \n\nbenefit from and protect that valuable reputation. \n\n**•**\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The \n\nmajor oilfield services company Halliburton, have been attracted to the base as a \n\ntenant and a $1.1m purpose built building is being constructed for their use. \n\nNegotiations are also proceeding with other groups who recognise the unique \n\nadvantages of operating from this strategically positioned Base. Rental income and \n\nassociated revenues such as plant and labour hire will contribute significantly to the \n\noverall economics of the facility. \n\n**•**\nProtected moorings for cyclone shelter will be established inside the breakwater for \n\nlong term lease to local tug operators. The demand arises from serious vessel and crew \n\nsafety considerations. The Dampier Port Authority are reluctant to see the continued \n\nuse of cyclone moorings in the Harbour, not only for safety reasons, but for \n\nenvironmental concerns as well. Oil spills are not acceptable under any circumstances \n\nand will be avoided whatever the cost. Tug owners share similar concerns, but in \n\naddition they need to remain in a position of readiness for crews and equipment to \n\nresume their important functions immediately following a cyclonic event. The number \n\nof specific purpose spread moorings, detailed on the adjacent plan will total 10 in the \n\nfirst phase of construction, a limit which will be assisted by an ability to remove vessels \n\nup to 100 tonnes from the water by wharf crane for tie down on cradles.", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Environmental Risk**\nAs an owner of real estate, Killam is subject to federal, provincial and municipal environmental regulations. These regulations may require the \nCompany to fund the costs of removal and remediation of certain hazardous substances on its properties or releases from its properties. The \nfailure to remediate such properties, if any, could adversely affect the Company’s ability to borrow using the property as collateral or to sell \nthe real estate. Killam is not aware of any material non‑compliance with environmental laws at any of its properties. The Company has made, \nand will continue to make, the necessary capital expenditures to comply with environmental laws and regulations. Environmental laws and \nregulations can change rapidly, and the Company may be subject to more stringent environmental laws and regulations in the future. The \nCompany mitigates its risk of losses associated with oil tank leaks by enforcing the requirement for appropriate insurance, performing regular oil \ntank inspections, and enforcing the removal of oil tanks when homes are sold. \n\n**General Uninsured Losses**\nKillam carries comprehensive general liability, fire, flood, extended coverage and rental loss insurance with policy specifications, limits and \ndeductibles customarily carried for similar companies. There are, however, certain types of risks (generally of a catastrophic nature) that are \neither uninsurable or would not be economically insurable. \n\n**Rent Control Risk**\nRent control exists in some provinces in Canada, limiting the percentage of annual rental increases to existing tenants. Killam is exposed to the \nrisk of the implementation of, or amendments to, existing legislative rent controls in the markets in which it operates, which may have an adverse \nimpact on the Company’s operations. In the provinces that Killam currently operates, Prince Edward Island, and Ontario have rent controls. As \nwell, Nova Scotia has rent control for MHCs. \n\n**Utility and Property Tax Risk**\nKillam is exposed to volatile utility costs and increasing property taxes. Utility expenses, mainly consisting of oil, natural gas, water and electricity \ncharges, have been subject to considerable price fluctuations over the past several years. Killam has the ability to raise rents on the anniversary \ndate of its leases, subject to the overall rental market conditions, to offset rising energy and utility costs, however rental increases may be limited \nby market conditions. Killam invests in energy efficiency initiatives to reduce its reliance on utility costs; however Killam remains exposed to \nprice volatility. The Company has the ability to fix rates through the use of swap contracts for a portion of its oil and natural gas consumption to \nreduce the impact of fluctuations in commodity prices. To address the risk of property tax increases, Killam, along with the assistance of outside \nconsultants, reviews property tax assessments and, where warranted, appeals them. \n\n**Taxes**\nKillam is currently not cash‑tax taxable due to its ability to reduce taxable income through unclaimed CCA, and does not expect to be cash taxable \nfor at least the next three to five years. A change in circumstances that could result in the Company paying cash taxes in advance of this estimate \nmay have a negative impact on Killam’s liquidity. To mitigate against this risk, Killam is working with tax advisors to identify those issues that may \nimpact a change in the Company’s tax situation. \n\n**Dividend Payments**\nDividend payments may exceed actual cash available from time to time because of items such as mortgage principal repayments, capital \nrequirements, and redemption of shares, if any. The Company may be required to use part of its debt capacity, raise additional equity, or reduce \ndividends in order to accommodate such items, and there can be no assurance that funds from such sources will be available on favourable \nterms, or at all.", + "page_start": 59, + "page_end": 59, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
WaterEnvironmental Audit
While ranfall can occur year round, it is general health providers, including the supported and support water than therapy. Therefore of therefore therefore their management of water than their community. Therefore of their communitiIn December 2012 the eleventh an intervention of comprehensive to intervention and the completed. The address the community to interventions to interventions to improve the clearing the clear to intervention of the clear to interventi
To pauge any potential drawdown impact on local groundwater, the mine regularly monitors 80 water table measuring stations, located on the mine stre and in surrounding villages. Wate levels rise and fall seasonally but no long term adve tthe current Environmental Impact adherence to board environmentz vance of the Australian Minerals In Environmental Mineagement ond In our environmental performance occoncluded that, the operations of perations of perations of conc
A total of 2.454.585 tornes of water was used to process 5.695.634 tornes of ore during the finan cial year. Water usage was reduced onsite via recycling of water from the Tailings Storage facility via the decint water return system. The excrequirements as seell as voluntary commitments made by Alsars Min audit also indicates that the proje are being carried out in accordanc requirements of the Australian Minimal Minimal Minimal Minimal Minimal Minimally signalistic, in
SpecificationsRehabilitationNo contaminated land issues arosperiod. The rehabilitation program
", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How can citizens in Fredericton easily access flood risk data?", + "target_page": 1, + "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. \n\nRebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "with a project called \"Tales of Things\" to allow people to leave messages for each other (or just for \n\nthe world) at the bus stops. Scanning the QR code now allows people to see not just the bus \n\ntimetable, but also the notes other travelers have left on that stop, including*\"what's nearby, who's*\n\n*waiting for whom, what number can you call for a good time. It's a cross between bus stop*\n\n*Facebook and digital graffiti\"*, that happened thanks to the openness of the original bus stop data. \n\nThe Social Life of Data Project will study instead how particular datasets have been used, who used \n\nthem, how those people are connected and what conversations happen around Open Data. \n\n**3.3. Legal issues remain crucial**\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this \n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing \n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible \n\nbenefits in that country. If there are no guarantees that public data can be used without restriction, \n\nvery little happens in practice, and when it happens it may be something against the public interest. \n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process \n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized \n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from \n\ntheir website to reuse them, Public Engines sued. \n\nReporting this, D. Eaves rightly points out that*both*companies are right: one is trying to protect its \n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY \n\nplace where it's available. This is what happens when public officials leave the ownership of*public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little \n\ndifference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "officially lobbying Public Administrations to get the PSI they could use for the same purposes. As \n\nother suggestions made here, these are activities that should start at the city and regional level, first \n\nwith custom-made education initiatives, then with specific data-based services. Engaging all these \n\nactors in the adoption of (local) Open Data will be one of the big challenges of the next years. \n\n**5. Bibliography**\nBesides those explicitly linked from the text, this report has drawn inspiration by many other \n\nresources. The most important ones are listed here, but the complete list should be much longer. We \n\nwish to thank first the authors of the works listed below and, immediately after, to all the activists, \n\ninside and outside governments worldwide, who are working on this topic. \n\n1. Are you prepared for the pitfalls of Gov 2.0? \n\n\n \n \n \n \n [html]\n
3. Canada launches data. gc. ca.- what works and what is hroken
4. Creative Commons and data bases : huge in 2011, what you can do
5. Defining. Gox. 2.0. and Open. Goxsernment
6. How. Government. Data Can. Improve Lives
7. If you like solar, tell your utility to publish this map
8. Indian. corruption. backlanh. builds. after... year_of. the. treasure. hunters.”
9. Informacion. Cisica... Just. What. in. Civic. Information?
10. Is open government just about information?
11 - LSDL : Jn. un. click. la mappa del. crimine
12. La. casta. e. online :. dategli. la. caccial
13. Linee guida UK sullopendata
14. MSc dissertation on Open Government Data in the UK
15 - Open. Data.( 2 ): Effective. Data. Use.
16. Open. Data :. quali. prospettive. per. la. pianificazione?
IT - Open Knowledge Foundation Blog * Blog Archive * Keeping Open Government Data
Open2
18. Open. data,. democracy. and. public. sector. reform
", + "page_start": 32, + "page_end": 32, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "website that tracks which councils have published public toilet open data, and which have not. A \n\nmap like this solves one specific, concrete problem in the ordinary, daily life of many people: \n\n*\"Many older people have continence concerns and only go to places where they know there is a*\n\n*toilet. \"*\n\nIt is also possible and useful to pass the message that, when it comes to participation, activism and \n\ntransparency in politics, Open Data are a concrete and pacific weapon that is both very effective and \n\nvery easy to use for everybody. Dino Amenduni explained the first point well at the end of 2010 \n\nwith words and arguments that, while tightly bound to the current situation in Italy, apply, in spirit, \n\nalso to other countries: \n\n*in order to have your voice heard, it is necessary to threaten the private interests of*\n*politicians. The ways to achieve this goal are, in my opinion... Communication*\n*guerrilla: physical violence doesn't generate change anymore. Power is in the hands of*\n*those who have data. But those data must be communicated, made usable, fun to use,*\n*shareable, in order to give the feeling that knowledge brings a concrete (economic or*\n*intangible) personal advantage*\n\nProofs that participation to generation and usage of Open Data is easy would include, instead, \n\nexamples like electionleaflets. All citizens who can use a computer scanner and have Internet access \n\ncan upload on that website the leaflets distributed by the candidates during a campaign, making \n\nmuch easier (after other, more skilled volunteers have inserted the content of the leaflets in \n\nsearchable databases) comparisons between the candidates positions or making public some \n\ndisrespectful material (racist, insulting…). \n\n**4.7. Involve NGOs, charities and business associations**\nAs a final note and recommendation of this report, we'll note that, in comparison with hackers and \n\npublic officers, there are other parties that could and should play a role in Open Data adoption much \n\nbigger than what they have had so far. \n\nNGOs and charities, as well as professionals or business associations, all have lots to gain from \n\nOpen Data but don't seem, in many cases, to have realized this yet. Members of the first category \n\nshould routinely ask for support directly to Open Data civic hackers to gather (either from \n\ngovernment or citizens) more up to date information that is specifically relevant for their \n\ncampaigns. \n\nThe other associations, instead, should be much more active both in publishing Open Data about \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableAdvance and developedStateStatisticsTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableStateGene 2011. FM Scunla Saneriors SzTableTable
", + "page_start": 31, + "page_end": 31, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**6**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \nvulnerability to food insecurity \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n0.4 0.6 0.8 1.0 1.2 1.4 \n. \n. \n. \n. \n. \n. \n. \n. \n\n**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
\n\nUN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "decisions. Ideally, this training should be provided at a local level with local programs, in a way that \n\nmakes it possible to use it on local issues, for the reasons and in the ways discussed in the next \n\nparagraph. For example, visualization techniques like those used by ABC News to show the effects \n\nof the March 2011 Japan Earthquake, in which all the user has to do to compare scenes from before \n\nand after the earthquake is to move a slider, should be routinely used to explain proposals about \n\nurban planning, zoning and related topics. \n\n**4.6. Focus on local, specific issues to raise interest for Open**\n**Data**\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens \n\nto use Open Data in their political, economic and professional decisions, one of the final \n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be \n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of \n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the \n\nrecommendations of this report*at the local level*, \n\nMost people encounter their local governments much more often then their national ones. When \n\nworking within a single city or region it is much easier to inform citizens, raise their interest and \n\ninvolve them, because they would be searching*local*solutions to improve*local*services and/or \n\nsave*local*money. There may also be much more opportunities to do so, especially in this period of \n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in \n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" \n\nmust be the keys for local activists and public employees working on local Open Data: \n\n• work on specific issues and with precise objectives \n\n• focus on immediate usefulness \n\n• work on demand, on the*services*that people want. Required services define what data must \n\nbe open, not the contrary \n\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data: \n\n*\"how do we get people to use the data that we publish?\"*. The right question, instead, is \"what data \n\ndo people want?\". Even if citizens don't realize yet that what they actually want is more Open Data, \n\nor that what they need can be done more quickly and cheaply by releasing some information in that \n\nway. \n\n\n \n \n \n \n [html]\n
A genat example of what all this means is the < underline > Great Enjtish Public Tuiliet Magc a public participation31 / 34Cagvright 2013 LIDR, Sourkin Segerion Sint Rime, This work is released ander o Cinotive Commers atribution Acrease ( htp :// creativecomerung / liceners / hy5.01 )
", + "page_start": 30, + "page_end": 30, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Units ( 1 )Number of Properties% of Apartment NOI and Equity Income
Nova Scotia
Halifax ( 2 )4.9705447.1 %
Sydney13921.2 %
5.1095648.3 %
New Brunswick
Moncton1.593309.8 %
Fredericton1.394209.9 %
Saint John1.143135.6 %
Miramichi9610.7 %
4.2266426.0 %
Ontario ( 3 )
Ottawa49262.7 %
London26422.8 %
Cambridge22523.4 %
Toronto37821.5 %
1.3591210.4 %
Newfoundland and Labrador
St. John ' s813117.3 %
Grand Falls14821.1 %
961138.4 %
Prince Edward Island
Charlottetown906176.6 %
Summerside8620.3 %
992196.9 %
Total12.647164100.0 %
\n\n\n \n \n \n \n [html]\n
SitesNumber of Communities% of MHC NOI
Nova Scotia2.6261634.3 %
New Brunswick224134.2 %
Ontario2.1441629.3 %
Newfoundland and Labrador17022.2 %
Total5.16435100.0 %
", + "page_start": 29, + "page_end": 29, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "elections \n\n• Open Congress : a tool for political scientists to track the work and effectiveness of \n\nthe Brazilian congress \n\n• Paraguay: Who Do We Choose?: lists profiles of all candidates for many public posts. \n\nIn Brazil, the principle that*\"what is not confidential should be available on the Internet in the open*\n\n*data format\"*is already discussed and, in principle, accepted, by some departments of the Brazilian \n\nfederal government. However, the preferred practice for now is (if there are no other obstacles) to \n\nonly publish data that have been explicitly requested by some citizens. \n\nA report presented in May 2011 at the First Global Conference on Transparency Research \n\nmentioned a couple of Open Data issues in Latin America that are worth noting, because they're \n\npresent even in Europe and North America, in spite of the different historical and social \n\nbackground: \n\n• \"Better coordination is needed between right to information campaigners and open data \n\nactivists.\" \n\n• \"If activist manage to target particular topics to add \"value\" to the discussion, demand for \n\nopen data could eventually increase in the region.\" \n\nIn Africa, mobile phones are much more available, and more essential than computer with Internet \n\naccess, often bypassing the need for real desktop PCs with many applications. Therefore, from a \n\npurely technical point of view, transparency, accountability and efficiency in government are \n\nquickly becoming accessible to most African citizens through mobile networks rather than through \n\nthe \"traditional\" Internet. However, there are still too few public departments and procedures that \n\nuse digital documents and procedures on a scale large enough to generate meaningful volumes of \n\ndigital data that could be then published online. \n\nWhile we write, Kenya is laying the legal groundwork to support Open Data. Permanent Secretary \n\nfor Information and Communications, Dr. Bitange Ndemo is reported as having been championing \n\nfor quite some time. In practice, big challenges remain for Open Data usage in Kenya. The easiest \n\none to solve is to technical, that is find skilled people that can package the data in ways that the \n\npublic can consume (even on mobile phones...). The real problem, however, is the fact that \n\n(summarizing from Thinking About Africa's Open Data): \n\nThere is a lot of Kenya data but it isn't accessible. The entities that hold the most public \nand infrastructure data are always government institutions. Getting information from \nthem can be very hard indeed. We don't know who to go to to get the data we need, and", + "page_start": 9, + "page_end": 9, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*\n\n**2.1. Wikileaks and the Open Data movement**\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published \n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence \n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open \n\nData and Wikileaks are about transparency, accountability and democracy. \n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks \n\nscandal. \n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and \n\ntransparency whenever government activities are concerned. Citizens must be able to know what \n\nthe state is*actually*doing but sometimes, be it for careful evaluation of all the alternatives or \n\nbecause of security, it must be possible to work behind closed doors, at least temporarily. We'll \n\ncome back to this point later in this report. \n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness \n\nand transparency in politics, not only there are deep differences between the two ideas but, in our", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. \n\n**OBSERVATIONS**\n**Annual report: State of the UK Climate. Downloadable data.**\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package, \nbringing the observed data right up to date. This annual update8 covers trends, the multi- \ndecade climate record and significant weather events such as the early July 2015 hot spell \nand the exceptionally mild and wet December of the same year. \n\nQuality controlled UK observational datasets from the Met Office observing network, provided \nat spatial resolutions to match the land projections and for pre-defined administrative regions \nand river basins, will be available under an Open Government Licence9. For variables such as \ntemperature and precipitation these data sets will span the late 19th Century to the present \nday and will be provided for daily, monthly, seasonal, annual and long term averages. \n\n**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. \n\n8 The latest update can be found at**http://www.metoffice.gov.uk/climate/uk/about/state-of-climate**\n9**http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n10**https://www.ipcc.ch/report/ar5/**", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", + "target_page": 3, + "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Peripheral nerve injury results in a biased loss of \nsensory neuron subpopulations \nAndrew H. Coopera, Allison M. Barryb, Paschalina Chrysostomidoua, Romane Loligniera, Jinyi Wanga, \nMagdalena Redondo Canalesa, Heather F. Tittertona, David L. Bennettb, Greg A. Weira,*\n\nAbstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. \n\n1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2872 \n\ninjury (Fig. S6A–C, http://links.lww.com/PAIN/C84), indicating \nthat any loss of neurons within specific neuronal subpopulations \nwas not biased towards soma size. Collectively, these data show \nthat unrepaired axonal damage to peripheral sensory neurons \ninduces a partial loss of Trpm81 and CGRP1 subpopulations, \nbut no major loss of myelinated afferents. \nBased on our findings of preferential \n\ndeveloped transgenic recombinase driver lines, we have \nshown that \nloss is biased across molecularly defined \nsubpopulations. Nonpeptidergic nociceptive neurons are \nparticularly susceptible to loss, with almost all Mrgprd1 \naxotomized afferents lost following an unrepaired transection \ninjury (SNItrans) and roughly half lost following a model which \ncontrastingly allows for nerve regenerations (SNIcrush). \nFinally, we have observed that the vulnerability of Mrgprd1 \nneurons extends to the in vitro setting and provide data to \nsupport \nloss is driven by a lack of \nthe hypothesis that \nneurotrophic support following injury. \n\nloss of nonpeptidergic \nnociceptors, we re-analyzed a previous population-specific \ntranscriptomic dataset of mouse DRG neurons following nerve \ninjury for potential upregulation of cell death pathways (Fig. S7, \nhttp://links.lww.com/PAIN/C84).3 We found that early after injury \n(3 days post-SNItrans), nonpeptidergic (MrgDCreERT2-expressing) \nneurons showed enhanced enrichment of GO terms associated \nwith apoptosis, in contrast to a broad population of nociceptors \n(labelled with Scn10aCreERT2), peptidergic nociceptors (Calca- \nCreERT2), C-LTMRs (ThCreERT2), and Ab-RA (rapidly adapting) and \nAd-LTMRs (Ad/Ab-LTMR, Ntrk2CreERT2;AdvillinFlpO), \nin which \nthere was less or no enrichment of cell death pathways. By \n4 weeks, only C-LTMR and Ad/Ab-LTMR subtypes show any \noverrepresentation of cell death pathways (in the populations \nstudied). Both injury-specific and apoptotic signatures in non- \npeptidergic neurons were no longer significantly enriched, \nconsistent with a loss of axotomized nonpeptidergic afferents \nby this late timepoint postinjury. These data suggest \nthat \napoptotic pathways are upregulated acutely after injury in a cell- \ntype-specific manner. \n\nThe question of whether DRG neurons die following traumatic \ninjury has been addressed by several groups over the last few \ndecades. Despite contrasting findings on the extent, timing, and \nform that loss takes, most studies have observed frank loss of \nDRG neurons.6,38,46,53 However, more recent studies using \nrecombinase driver lines and novel machine-learning approaches \nhave cast doubt on this consensus.44,49 Our data strongly \nsupport the loss hypothesis and suggest that approximately 60% \nof axotomized afferents die within 2 weeks of SNI. The \ndiscrepancy between our findings and other recent studies may \nbe partly explained by the sampling method used to estimate \nneuronal numbers. For example, Schulte et al.49 developed \na novel machine-learning approach and found no reduction in \nneuron density across serial sections of rat DRG following SNI, \nand they inferred from this that frank loss did not occur. Our \nresults are congruous, in that we also observed no reduction in \nneuron density. However, we found a substantial loss in the total \nneuron-containing volume of injured DRG, which underlies our \ncontrasting conclusion of \nfrank loss. Of note, morphological \nvolumetric analysis and MRI have also previously demonstrated \nvolume loss in both rodent and human DRG following nerve \ninjury.35,65,66 These findings occur despite a major increase of \nnonneuronal cells in the injured DRG30 and support the notion \nthat the total DRG neuron number is decreased.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 4. Spared nerve injury induces a loss of Trpm81 and CGRP1 but not myelinated DRG neurons. (A) Schematic of experimental approach. (B–D) FastBlue \nlabelling and Trpm8-tdTom (B), Calca-YFP (C), or Thy1-CFP expression (D) 28 days after SNItrans in the L4 DRG, contralateral (top) or ipsilateral (bottom) to injury. \nImages are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue sections. Scale bars 5 100 mm. (E–G) Quantification of the \nproportion of FB-labelled neurons also expressing Trpm8-tdTom (E), Calca-YFP (F), or Thy1-CFP (G) in L4 DRG contralateral or ipsilateral to SNItrans. Paired t tests; \nTrpm8-tdTom: t2 5 5.31, P 5 0.034, n 5 3 mice; Calca-YFP: t3 5 4.12, P 5 0.026, n 5 4 mice; Thy1-CFP: t3 5 4.42, P 5 0.022, n 5 4 mice.*P , 0.05. CFP, cyan \nfluorescent protein; CGRP, calcitonin gene-related peptide; DRG, dorsal root ganglion; FB, FastBlue. \n\n\n \n \n \n \n [html]\n
TablePatients withPatientsTablePatientsPatientsTableTableTableGAT = 7 G /γ - DiffRegionsConstructFirstTableIRI_IT1TableTable to self - termPrimerTable and TableStatementGeneCompositionSpecificTableTableTableTableTableTableTableTable.TableTableTableTableTableTableofTablePost - sequencen = 8Age ( years )PatientsStateTableandTableTableARTNo. of diseasesHRRX.TableAge ( years )SensorMaximumSETGene numberMaximumGeneConstructMalesTableTableTableTableTable1.TableTable.Specifications.SensorsMeanPARSpecificityParameterTableTabledataInductionTablePPPARTT18 fullingGroupStatement[ 10101 T [ 10 ]MeanEMWETS TETS ETComponentTableTMTMTMSitestandTableSpeciesTableTableTableTable1.20Table.TableinPatientsTableTableTabletheSpeciesreferencenTableSpeciesSpecificityAge, yearsAgeTableAllelestedTableTableTableMinimumITR TIPPatientsStateStatement---MaximumSpecificationPropertiesMaximumSpecificationTableTableofTableParametersTableTableTableTableCompared withoutPositionsTableGeneralParameterControlTable
", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed2.pdf" + }, + { + "text": "Supplemental digital content \n\nSupplemental digital content associated with this article can be \nfound online at http://links.lww.com/PAIN/C84. \n\n\n \n \n \n \n [html]\n
Video content associated with this article can be found on thePAIN Web site.
[ 1Article history :
Received 14 November 2023Received in revised form 11 April 2024
[ 2Accepted 25 May 2024
Available online 15 August 2024References
[ 1 ] Absira VE, Kuehn ED, Chiris AM, Springel MW, Tolver AA, Zimmerman AL, Onefice UL, Biyle KA, BaiL, Song / Su, Bashiota KA, O ' Nell TO, Zhuo I, Tsan C, Hoynoski J, Rutin M, Kus L, Nederkofer V, Watanabe M,[ 2
Dymeck - 9M, Nekson SB, Heintz N, Hughes DI, Ginty DD. The cellular and synaptic architecture of the mechanosensory dorsal horn. Cell 2017 ; 168 : 295 – 310. e19.[ 2
[ 2 ] Balley AL, Ribeiro - Da - Silva A. Transient loss of terminals from non - peptidergic nociceptive fibers in the substantia gelatinosa of spinal cord[ 2
_2006 ; 138 : 675 – 90.[ 2
[ 8 ] Barry AM, Zhao N, Yang X, Bennett DL, Baskczos G. Deep RNA - seq of male and female murine sensory neuron subtypes after nerve injury. PAIN 2023 ; 164 : 2196 – 215.[ 2
[ 4 ] Bell AM, Uting C, Dickie AC, Kucharczyk MW, Quiliet R, Gutierraz - Mecinas M, Razian ANB, Cooper AH, Lan Y, Hachisuka J, Weir GA,[ 2
Barnister K, Watanabe M, Kania A, Hoon MA, Macaulay IC, Denk F, Todd Aul. Deep sequencing of Phox2a nuclei reveals five classes of antercilateral system neurons. bioPakix 2023.2020.08.20.20.08.20.08.20.0520.09.20.052715.[ 6 ] Bennett DL, Michael GJ, RamachanN, Munson JB, Averill S, Yan Q, McMahon SB, Priestey JV. A distinct subgroup of small ORG cells
[ 2
", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed2.pdf" + }, + { + "text": "Neuronal \nloss has been proposed as a key contributor to poor \nfunctional recovery following nerve injury,54 and biased survival of \ntypes might be expected to contribute to \ndifferent afferent \nmodality-specific sensory deficits. Beyond loss of function, does \nDRG neuron loss contribute to chronic pain, in either an adaptive or \nmaladaptive manner? Intrathecal delivery of GDNF is neuro- \nprotective and reverses the reduction in the number of IB4-binding \nDRG neurons and central terminals seen following transection.5 \nTreatment is concurrently analgesic and abrogates pain-related \nbehaviors.7,60 However, the pleiotropic nature of GDNF makes it \nimpossible to directly attribute the analgesic effects to the reversal \nof neuron loss. Indeed, it is possible that GDNF exerts its effect by \nactions on intact nonpeptidergic nociceptive afferents,52 activation \nof which is known to drive aversive behaviors in the neuropathic \nstate.62 These data leave the contribution of nonpeptidergic \nnociceptor loss to behavior in the GDNF treatment paradigm \nambiguous. Other pharmacological approaches have been found \neffective at reversing a neuronal \nloss in rodent models, but the \nimpact on pain behavior was not studied.21,22 \n\nWhile we made efforts to profile the loss of several molecularly \ndiscrete sensory neuron populations, we acknowledge that not all \nsubtypes were profiled. Furthermore, recent single-cell RNA \nsequencing has given us a more granular appreciation of the \nheterogeneity of sensory neurons.42 Future studies could \nleverage our experimental approach and new transgenic lines \nto characterize the loss of neurons in more detail. Such \nexperiments may be pertinent before embarking on molecular \nor functional profiling of populations post–nerve injury. \n\nRodents develop marked mechanical and thermal hypersen- \nsitivity rapidly following nerve injury and before timepoints at \nwhich neuron loss is observed.10 This lack of a temporal \ncorrelation may suggest a limited contribution to evoked hyper- \nsensitivities. The temporal profile of ongoing tonic pain (eg, pain \naversiveness as measured by condition place preference \nassays26) is less defined and so is its correlation to the timing of \nneuron loss. \n\n4.5. Conclusions \n\nIn sum, we have provided data from multiple complementary \nexperimental approaches to support the hypothesis that DRG \nneurons are lost following nerve injury in mice. We describe \na substantial loss, which is biased towards specific subpopula- \ntions and particularly present in small-diameter nonpeptidergic \nnociceptive neurons. \n\nThere are many anatomical sites within the somatosensory \nnervous system where differential \nloss of sensory neuron \npopulations could impact neurobiology. For example, loss of \ncutaneous afferents may afford more opportunity for plasticity in \nreinnervation patterns, such as collateral sprouting of uninjured or \nsurviving afferents, and the types of nerve endings made by \ndifferent molecular subpopulations.17,27 It also seems likely that the \ndeath of many neurons within a DRG could contribute to the \nexpansion and activation of immune cell types, which are known to \nplay a major role in neuropathic pain.30,69 Finally, under normal \nconditions, peripheral sensory input is integrated into the dorsal \nhorn of the spinal cord by complex interneuron circuitry. Many \nspinal circuits are engaged by convergent input from different \nafferent types.9,41,70 Therefore, selective loss of input from discrete \nafferent types could undoubtedly impact the normal processing of \nremaining afferent signals.34 Experimentally abrogating neuronal \nloss may be a fruitful approach to assess the contribution to \nnervous system plasticity (adaptive or maladaptive) following injury. \nIn this regard, our in vitro readout would be a useful experimental \n\nConflict of interest statement", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "Mice were briefly anesthetized during the procedure, induced with \n3% to 5% isoflurane, and then maintained at 1.5% to 2% as required. \nHindlimbs were taped with the plantar surface of the paw facing up, \nand a custom, 26G removable needle with a 30˚ bevel, attached to \na 25-mL Hamilton syringe, was inserted between the 2 distal-most \nfootpads, towards the medial aspect of the hindpaw. The needle \nwas then rotated 90˚, so the bevel faced medially. Furthermore, 4-mL \nFastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS# \n73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then \nslowly injected, and the needle was left in place for 10 seconds, \nbefore rotating and carefully retracting to avoid backflow of FB along \nthe needle track. This prevented the FB bolus from contacting the \nsural innervation territory of the lateral hindpaw, restricting it largely to \nthe tibial innervation territory of the glabrous hindpaw skin. \n\nformaldehyde. L3 to L5 DRGs were removed and postfixed for \nanother 2 hours, cryoprotected in 30% sucrose overnight, and \nthen embedded in optimal cutting temperature media (OCT; \nTissue Tek, Alphen aan den Rijn, the Netherlands). Dorsal root \nganglia were sectioned on a Leica CM1950 cryostat at 30 mm, \nwith every section collected serially on 5 Superfrost Plus slides \n(VWR, Lutterworth, United Kingdom) and each slide containing 1 \nin every 5 sections (4-7 sections per slide). One slide per DRG was \nselected at random and was washed with PBS, before being \nincubated with appropriate primary antibodies (Table 2) diluted in \n5% normal donkey serum and 0.3% Triton X-100 in PBS for \n3 days at 4˚C. After PBS washes, slides were incubated with \nappropriate secondary antibodies (Table 2) in the same PBS/ \n(normal donkey serum) NDS/Triton-X100 solution as for prima- \nries, overnight at room temperature. Slides were washed and \ncoverslipped with VectaShield Vibrance Hardset mounting media \n(Vector Labs, Newark, CA), with 4’,6-diamidino-2-phenylindole \nincluded in mounting media where FB-labelled cells were not \nbeing examined. Sections were imaged using a Zeiss LSM900 \nAiryscan confocal microscope equipped with 405-, 488-, 561-,", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", + "target_page": 4, + "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Peripheral nerve injury results in a biased loss of \nsensory neuron subpopulations \nAndrew H. Coopera, Allison M. Barryb, Paschalina Chrysostomidoua, Romane Loligniera, Jinyi Wanga, \nMagdalena Redondo Canalesa, Heather F. Tittertona, David L. Bennettb, Greg A. Weira,*\n\nAbstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. \n\n1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "2.9. Statistical analysis \nData are expressed as mean 6 SEM unless otherwise specified, \nand P values of less than 0.05 were considered significant. Power \ncalculations were performed using G*Power 3.1.9.7.15 A \nquantitative Venn diagram was created using BioVenn.25 All \nother statistical analyses were performed in Prism 10 (GraphPad \nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way \nRM ANOVAs (repeated measures analysis of variance), where \nappropriate. Normality was assessed by the Shapiro–Wilk test. If \nˇS´ıd ´ak or \nthe main analysis of variance effect was significant, \nTukey multiple comparisons tests were performed. To compare \npopulation distributions of soma cross-sectional area or volume, \nKolmogorov–Smirnov tests were performed. \n\nAs a third complementary approach, we applied semiauto- \nmated volumetric analyses of nuclei size following tissue clearing. \nIn this study, whole DRGs were cleared 4 weeks after SNItrans for \nnuclei counting in “complete” tissue (Figs. 2E–H). Nuclei were \nlabelled by TDP-43, in line with the study by West et al.,67 and \nwere quantified using Imaris software (Fig. 2F, Video 1). We \nobserved a slight but significant rightward shift in nuclear spot \nvolume population distribution 4 weeks after SNItrans (Fig. 2G). In \naddition, there was a significant reduction in the number of small \nbut not medium or large nuclear spots, in support of a loss of \nsmall-diameter neuron populations (Fig. 2H). \n\n3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent \n\nTo assess the gross loss of neurons from DRG following nerve \ninjury, we generated the AvilFlpO;Atf3CreERT2;RC::FLTG mouse \nline in which na¨ıve and axotomized sensory neurons were \ndifferentially labelled. In this mouse line, all neurons express \nin the na¨ıve state and switch to \ntdTomato (Flp-dependent) \nexpressing green fluorescent protein (GFP) upon axonal damage \nand concurrent tamoxifen treatment (Flp- and Cre-dependent) \n(Figs. 1A and B). Following pilot experiments to optimize \ntamoxifen dosing regimen, this approach was both highly efficient \nand specific (with the caveat that it was necessary to wait for \nseveral days after nerve injury for Cre-induced GFP expression): \n14 days after SNItrans surgery, GFP was expressed by 99.1 6 \n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we \nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons \n(Figs. S2A–D, http://links.lww.com/PAIN/C84). We then used \na stereological approach to quantify the total number of neurons \nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNItrans, as \nto injury. One week after SNItrans, we \nwell as contralateral", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture \n\nobserved 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). \n\nDorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). \n\nSNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. \n\n3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury-", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2872 \n\ninjury (Fig. S6A–C, http://links.lww.com/PAIN/C84), indicating \nthat any loss of neurons within specific neuronal subpopulations \nwas not biased towards soma size. Collectively, these data show \nthat unrepaired axonal damage to peripheral sensory neurons \ninduces a partial loss of Trpm81 and CGRP1 subpopulations, \nbut no major loss of myelinated afferents. \nBased on our findings of preferential \n\ndeveloped transgenic recombinase driver lines, we have \nshown that \nloss is biased across molecularly defined \nsubpopulations. Nonpeptidergic nociceptive neurons are \nparticularly susceptible to loss, with almost all Mrgprd1 \naxotomized afferents lost following an unrepaired transection \ninjury (SNItrans) and roughly half lost following a model which \ncontrastingly allows for nerve regenerations (SNIcrush). \nFinally, we have observed that the vulnerability of Mrgprd1 \nneurons extends to the in vitro setting and provide data to \nsupport \nloss is driven by a lack of \nthe hypothesis that \nneurotrophic support following injury. \n\nloss of nonpeptidergic \nnociceptors, we re-analyzed a previous population-specific \ntranscriptomic dataset of mouse DRG neurons following nerve \ninjury for potential upregulation of cell death pathways (Fig. S7, \nhttp://links.lww.com/PAIN/C84).3 We found that early after injury \n(3 days post-SNItrans), nonpeptidergic (MrgDCreERT2-expressing) \nneurons showed enhanced enrichment of GO terms associated \nwith apoptosis, in contrast to a broad population of nociceptors \n(labelled with Scn10aCreERT2), peptidergic nociceptors (Calca- \nCreERT2), C-LTMRs (ThCreERT2), and Ab-RA (rapidly adapting) and \nAd-LTMRs (Ad/Ab-LTMR, Ntrk2CreERT2;AdvillinFlpO), \nin which \nthere was less or no enrichment of cell death pathways. By \n4 weeks, only C-LTMR and Ad/Ab-LTMR subtypes show any \noverrepresentation of cell death pathways (in the populations \nstudied). Both injury-specific and apoptotic signatures in non- \npeptidergic neurons were no longer significantly enriched, \nconsistent with a loss of axotomized nonpeptidergic afferents \nby this late timepoint postinjury. These data suggest \nthat \napoptotic pathways are upregulated acutely after injury in a cell- \ntype-specific manner. \n\nThe question of whether DRG neurons die following traumatic \ninjury has been addressed by several groups over the last few \ndecades. Despite contrasting findings on the extent, timing, and \nform that loss takes, most studies have observed frank loss of \nDRG neurons.6,38,46,53 However, more recent studies using \nrecombinase driver lines and novel machine-learning approaches \nhave cast doubt on this consensus.44,49 Our data strongly \nsupport the loss hypothesis and suggest that approximately 60% \nof axotomized afferents die within 2 weeks of SNI. The \ndiscrepancy between our findings and other recent studies may \nbe partly explained by the sampling method used to estimate \nneuronal numbers. For example, Schulte et al.49 developed \na novel machine-learning approach and found no reduction in \nneuron density across serial sections of rat DRG following SNI, \nand they inferred from this that frank loss did not occur. Our \nresults are congruous, in that we also observed no reduction in \nneuron density. However, we found a substantial loss in the total \nneuron-containing volume of injured DRG, which underlies our \ncontrasting conclusion of \nfrank loss. Of note, morphological \nvolumetric analysis and MRI have also previously demonstrated \nvolume loss in both rodent and human DRG following nerve \ninjury.35,65,66 These findings occur despite a major increase of \nnonneuronal cells in the injured DRG30 and support the notion \nthat the total DRG neuron number is decreased.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "SNI-related gene expression signatures were less evident in \nMrgprd-expressing and C-LTMR neurons at later timepoints, \ncompared with other populations in injured DRG.3 This could be \nexplained by a loss of axotomized neurons of these classes and \ntherefore sampling of only uninjured neurons at \nthis time- \npoint.24,43,64 In terms of the transcriptional response to injury, \nindividual \nnonpeptidergic nociceptors show enrichment of \nproapoptotic factors early after injury,23,68 and we extend these \nresults in this study, by describing a subpopulation-specific \nenrichment of GO terms associated with apoptosis that is evident \nas early as 3 days after \ninjury. Such data and single-cell \ntranscriptomic profiling of all DRG neurons following injury37,44 \nmay offer the opportunity to elucidate the cell death pathways \nengaged and upstream effectors that enrich this process to \nnonpeptidergic nociceptive neurons. \n\nplatform to help delineate the precise cell death pathways and \nsignaling cascades engaged (which could then be experimentally \nmanipulated). Such studies should consider that plasticity may \nevolve over time. The loss of IB41 central terminals is transient \nfollowing crush and has even been observed to reverse at longer \ntimepoints following SNItrans.36 These observations, in conjunction \nwith ours of loss of neurons, raise the intriguing question of the \nsource of such central reinnervation. \n\n4.4. Study limitations \n\nOur efforts focused on traumatic nerve injury paradigms owing to \nprevious contrasting results using these robust and reproducible \nexperimental models. We did not extend our studies to systemic \nneuropathy models, such as chemotherapy or diabetic neurop- \nathy. A recent postmortem analysis reported a neuronal loss in \nthe DRG from patients with painful diabetic peripheral neurop- \nathy.19 Transcriptional \nresponses vary substantially across \ndifferent nerve insults,44 so it would be of interest to test whether \nneuronal loss and the subpopulation vulnerability reported in this \nstudy are common features across different types of insults. \n\nUsing multiple approaches, we assess the na¨ıve mouse L4 \nDRG to contain approximately 8000 neurons, consistent with \na previous estimate,67 and observed a frank loss of small- \ndiameter neurons following injury. However, the extent of loss \nobserved using our semiautomated approach was less than that \nobserved using manual techniques.67 Two major limitations in \nthis study may explain this discrepancy: First, owing to technical \nissues, the cleared DRG dataset is unpaired ipsilateral–contra- \nlateral which adds larger variability. Second, the analysis method \nis prone to undercounting deep nuclei. The signal-to-noise is \nbetter for superficial nuclei and smaller tissue volumes. Given the \nreduction in DRG volume after SNItrans, nuclei \nin larger \ncontralateral DRG may be undercounted.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "this diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic \n\nrodent models.24,50,53,56 Some \nnerve injury in experimental \nstudies have suggested that neuron loss occurs in certain patient \ncohorts,48,66 but this is yet to be definitively demonstrated in \nhumans. In rodents, most studies support a preferential loss of \nsmall cells that give rise to unmyelinated fibers53 but some \ncontrasting studies describe the preferential loss of large cells6 or \nloss of cells of all sizes.46 Variation is evident across studies in \nterms of experimental species, age, \ninjury, and \nquantification methods.56 Shi et al.50 used stereological counting \nmethods to identify a 54% loss of DRG neuron number 4 weeks \nafter “mid-thigh” sciatic nerve transection in C57BL/6 mice. \nEstimates for the degree of loss following commonly used nerve \ninjury paradigms (eg, spared nerve injury [SNI] and sciatic nerve \ncrush) are not available and because of the neurochemical \nchanges following injury and the loss of subpopulation marker \ngene expression,5,44,50 the vulnerability of molecularly defined \nsubpopulations has not been characterized. Moreover, more \nrecent studies have cast doubt on the extent or even presence of \nDRG neuron death following nerve injury. One study which \ndeveloped a deep learning approach to assess rat DRG cellular \nplasticity found no loss of neurons up to 2 weeks post-SNI,49 \nwhile another observed no loss of genetically labelled damaged \nDRG neurons 2 months after sciatic nerve crush.44 \n\ntype of \n\n\n \n \n \n \n [html]\n
“ Slohool of Psychology and Neuroscerce, University of Glosgraw, Glasgrow, Unifed Kingdom, a Nuffeeld Department of Clinical Neurosclences, University of Oxford, Oxford, United Kingdom
“ Corresponding author. Address : School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 & GQ, United Kingdom. Tel.: + 44 ( I ) 14.33.7023. E - mal address : gregory weirfiglasgow ac. ak ( G. A. Weir ).
Supplemental digital content is available for this article. Direct LRE, citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal ’ s Web site ( www. painjournalizeline. com ).
Casynging - 10.2004 This Author ( s ): Pubblished / cyi Risifen / riber / ribality, inc. on betweef of the International Association for the Diudy or Plari. This is an open acess anticle detitured under the Creative Commons Attituden Loorse
http :// dx. dbi. org / 10.1097 / l, pain. 00000000000000000332?
\n\nThe issue of whether neuron loss occurs, and if so, in what \nsubpopulations, is important. It will likely have implications for our \nunderstanding of reinnervation and functional recovery in patients. \nFurthermore, better insight will provide critical context for those \ninvestigating the plasticity that occurs following nerve injury and \nmay inform therapeutic targeting of sensory neuron populations. \n\nAn expanding repertoire of transgenic recombinase driver lines \nnow makes it possible to permanently label DRG neuron \nsubpopulations and study their fate in rodent nerve injury paradigms. \nThe aim of this study was to use this technology to characterize \n\nwww.painjournalonline.com 2863", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. \n\nprotein) neurons 28 days after sham surgery or SNItrans (Figs. 3A \nand B). SNItrans, but not sham, resulted in a significant decrease \n(54.0 6 6.6%) in the total number of MrgD-YFP1 neurons in L4 \nDRG (Fig. 3C).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 4. Spared nerve injury induces a loss of Trpm81 and CGRP1 but not myelinated DRG neurons. (A) Schematic of experimental approach. (B–D) FastBlue \nlabelling and Trpm8-tdTom (B), Calca-YFP (C), or Thy1-CFP expression (D) 28 days after SNItrans in the L4 DRG, contralateral (top) or ipsilateral (bottom) to injury. \nImages are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue sections. Scale bars 5 100 mm. (E–G) Quantification of the \nproportion of FB-labelled neurons also expressing Trpm8-tdTom (E), Calca-YFP (F), or Thy1-CFP (G) in L4 DRG contralateral or ipsilateral to SNItrans. Paired t tests; \nTrpm8-tdTom: t2 5 5.31, P 5 0.034, n 5 3 mice; Calca-YFP: t3 5 4.12, P 5 0.026, n 5 4 mice; Thy1-CFP: t3 5 4.42, P 5 0.022, n 5 4 mice.*P , 0.05. CFP, cyan \nfluorescent protein; CGRP, calcitonin gene-related peptide; DRG, dorsal root ganglion; FB, FastBlue. \n\n\n \n \n \n \n [html]\n
TablePatients withPatientsTablePatientsPatientsTableTableTableGAT = 7 G /γ - DiffRegionsConstructFirstTableIRI_IT1TableTable to self - termPrimerTable and TableStatementGeneCompositionSpecificTableTableTableTableTableTableTableTable.TableTableTableTableTableTableofTablePost - sequencen = 8Age ( years )PatientsStateTableandTableTableARTNo. of diseasesHRRX.TableAge ( years )SensorMaximumSETGene numberMaximumGeneConstructMalesTableTableTableTableTable1.TableTable.Specifications.SensorsMeanPARSpecificityParameterTableTabledataInductionTablePPPARTT18 fullingGroupStatement[ 10101 T [ 10 ]MeanEMWETS TETS ETComponentTableTMTMTMSitestandTableSpeciesTableTableTableTable1.20Table.TableinPatientsTableTableTabletheSpeciesreferencenTableSpeciesSpecificityAge, yearsAgeTableAllelestedTableTableTableMinimumITR TIPPatientsStateStatement---MaximumSpecificationPropertiesMaximumSpecificationTableTableofTableParametersTableTableTableTableCompared withoutPositionsTableGeneralParameterControlTable
", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "Does the Oxbridge Academy have a guide on how to apply to college?", + "target_page": 21, + "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments \n\nTo make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. \n\nIf you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees.", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613", + "page_start": 26, + "page_end": 26, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Depending on which course you study, you will either be assessed \nby means of written assignments, or through a combination of \nwritten assignments and exams. Assignments not only help to \ndeepen your understanding of the work, but they often also count \ntoward your final mark. \n\nIf you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around.", + "page_start": 36, + "page_end": 36, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "With our head office in Stellenbosch in the Western Cape, we cater to our \nstudents’ needs by recruiting industry-expert tutors to provide academic \nassistance via telephone and e-mail, as well as by designing our study \nmaterial in such a way that it is clear, simple, and easy for our students \nto understand. \n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers \n\n5. When you use external resources, remember to reference them \nproperly, and to include them in a bibliography. \nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries. \ncom/definition/english/plagiarism), which is a serious offence. \n\n6. \nown words when you formulate your answers. \n\nAlways hand in your own work, and make sure that you use your", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "You can find the course name and course code for your chosen course on \nthe relevant detailed course information page on our website. Have a look \nat the example in the screenshot below (the course name and course code \nare circled in red): \n\n\n\nPlease make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation", + "page_start": 21, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. \n\n• Organise your study material into a structure that makes sense to you. \n\n• Arrange your study material into a format that suits your learning style. \n\n\n \n \n \n \n [html]\n
• Create memory aids for yourself.• Identify key ideas and concepts.
• Focus on what ' s important.• Prepare for exams more easily.
", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you have any questions about your course work, you are always \nwelcome to approach your tutors for help. Just remember that your \ntutors cannot guess what your needs are: you will have to make \ncontact with your tutors and communicate your questions clearly if \nyou want to get the assistance that you need. \n\n\n\n**Use a relevant and descriptive subject line.**\nThis way, your tutor will immediately know what your e-mail is \nabout, and he or she will be more likely to open it. A good subject \nline might read as follows: “Enquiry regarding Assignment 1 for \nSafety Management 101” \n\n**Be polite, and use an appropriate form of address.**\nAlways start your e-mail with an appropriate form of address, \nsuch as “Hello Mr/Ms …” and sign it off with your full name and \nstudent number. This will help to give your message a friendly, yet \nprofessional tone. \n\n\n \n \n \n \n [html]\n
Makethat yControlill he, able tTableTableTableTablevalueStateTableTableStatementAge ( years )TableTable1.2010StateTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 33, + "page_end": 33, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "than in connection with a residential trip away from the school); \n\n(b) “school” means— \n\n(i) an alternative provision academy within the meaning of section 1C of the Academies \n\nAct 2010(**a**), \n\n(ii) a community, foundation or voluntary school or a community or foundation special \nschool within the meaning of section 20 of the School Standards and Framework Act \n1998(**b**), \n\n(iii) an independent school (as defined by section 463 of the Education Act 1996(**c**)) \nregistered under section 95 of the Education and Skills Act 2008(**d**), \n\n(iv) a non-maintained special school (as defined in section 337A of the Education Act \n\n1996(**e**), or \n\n(v) a pupil referral unit within the meaning of section 19(2B) of the Education Act \n1996(**f**); \n\n(c) “college” means— \n\n(i) an institution within the further education sector within the meaning of section 91 of \n\nthe Further and Higher Education Act 1992(**g**), or \n\n(ii) a 16 to 19 Academy within the meaning of section 1B of the Academies Act \n\n2010(**h**). \n\n(**a**) 2010 c. 32; section 1C was inserted by section 53(7) of the Education Act 2011 (c. 21). \n(**b**) 1998 c. 31; section 20 was amended by paragraph 95 of Schedule 21 to the Education Act 2002 (c. 32), paragraph 13 of \nSchedule 3 to the Education and Inspections Act 2006 (c. 40) and S.I. 2010/1158. \n(**c**) 1996 c. 56; section 463 was substituted by section 172 of the Education Act 2002 and amended so far as relevant by \n\n\n \n \n \n \n [html]\n
( d )2008 c. 25
( e )1996 c. 56 ; section 337A was substituted by section 1421 ) of the Education and Skills Act 2008 ( c. 25 ).
( f )Section ( 952B ) was amonded or far arelevant by sections 47 of and Schedule 9 to the Education Act ( 997 ), occition 3 of and paragraph 1 of Schedule 3 and Schedule 4 to the Children, Schools and Families Act 2010, section 101 of the Education an a
( g )1992 ; 13. section 90 was amended in so fat as referent by paragraph 42 of Schedule 9 and Schedule 11 to the Learning and Skills Act 2000 ( c. 21 ), paragraph 43 of Schedule 3 to the appromizeships. Skills. Children and Learning Act 2009 ( c. 22 ) an
( h )Section 1B was inserted by section 53 ( 7 ) of the Education Act 2011.
", + "page_start": 79, + "page_end": 79, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "I have trouble writing effective summaries in English, do you have any tips?", + "target_page": 29, + "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "To make a good summary, you need to: \n\n\n \n \n \n \n [html]\n
Keep it brief.
Make sure to use main headings and keywords.
Focus on the main ideas.
Classify and organise the information in a logical manner.
Use your own words where possible.
Include examples.
Remember that your summaries are there to help you.
", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SUMMARIES \n\nGeneral Tips for Making Summaries \n\n• Underline or highlight key points as you work through your study \n\nmaterial, and make notes. \n\n• When you come across a word or concept you don’t understand, \n\nlook it up in a dictionary, or do some research on the concept, and \nadd your own definition to your summary.", + "page_start": 31, + "page_end": 31, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "25. Create a mind map to summarise Chapter 7 (How to Ask for Help \nfrom Your Tutor). (5) \n\n26. \nwritten assignments. (3) \n\nList 3 things you need to do if you want to earn good marks for your \n\n29. List 3 methods you can use to summarise your study material. (3) \n\n30. Give 2 examples of how good language skills can benefit your ca- \nreer. (2) \n\n31. Complete the following sentence:", + "page_start": 57, + "page_end": 57, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "• Always use a relevant and descriptive subject line. \n\nE-mails with blank subject lines may be marked as spam by the \nrecipient’s e-mail client, and e-mails with non-descriptive subject \nlines such as “Hello” or “Meeting” may be ignored. \n\n• Write your e-mail in clear and simple language. \n\nDon’t try to sound too formal, and don’t use complicated words \nwhen simple ones would work just fine. As far as possible, write in \nthe active voice. \n\n• Structure your message clearly, and include only the necessary \n\ninformation. \nTake care not to confuse the message by including too many topics \nin one e-mail. Respect your colleagues’ time, and try to keep your \nmessages as short as possible. \n\nIf you include a link in your e-mail, make sure that you provide some \ncontext. \nYour recipients are unlikely to click on a link if they don’t have any \nidea as to what they are going to see when they open it. \n\n• \n\n• Only mark an e-mail as ‘urgent’ when it really does require immedi- \n\nate attention. \nWhat’s urgent to you may not always be urgent to your recipients.", + "page_start": 52, + "page_end": 52, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "summaries that outperform standard physician documentation in completeness and error \nfrequency.35 However, factual inconsistencies in the summaries produced by LLMs increase as the \ncontext length increases,36 and for medium- to long-context tasks, fine-tuning an open-source \nmodel has been shown to perform better than a prompt-learning approach.37 In prior work, \nmembers of this study team demonstrated 62% of LLM-generated hospital course summaries met \nstandard-of-care for a formal inpatient discharge summary.24 However, recently published clinical \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted)", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. \n\n• Organise your study material into a structure that makes sense to you. \n\n• Arrange your study material into a format that suits your learning style. \n\n\n \n \n \n \n [html]\n
• Create memory aids for yourself.• Identify key ideas and concepts.
• Focus on what ' s important.• Prepare for exams more easily.
", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**36**. Tang L, Sun Z, Idnay B, et al. Evaluating large language models on medical evidence summarization. NPJ Digit \nMed. 2023;6(1):158. doi:10.1038/s41746-023-00896-7 \n\n**37**. Goswami J, Prajapati KK, Saha A, Saha AK. Parameter-efficient fine-tuning large language model approach for \nhospital discharge paper summarization. Appl Soft Comput. 2024;157:111531. doi:10.1016/j.asoc.2024.111531 \n\n**38**. Huang KT, Mehta NH, Gupta S, See AP, Arnaout O. Evaluation of the safety, accuracy, and helpfulness of the \nGPT-4.0 large language model in neurosurgery. J Clin Neurosci. 2024;123:151-156. doi:10.1016/j.jocn.2024.03.021 \n\n**39**. Giuffrè M, Kresevic S, You K, et al. Systematic review: the use of large language models as medical chatbots in \ndigestive diseases. Aliment Pharmacol Ther. 2024;60(2):144-166. doi:10.1111/apt.18058 \n\n**40**. Tailor PD, Dalvin LA, Chen JJ, et al. A comparative study of responses to retina questions from either experts, \nexpert-edited large language models or large language models alone. Ophthalmol Sci. 2024;4(4):100485. doi:10. \n1016/j.xops.2024.100485 \n\n**41**. Zaretsky J, Kim JM, Baskharoun S, et al. Generative artificial intelligence to transform inpatient discharge \nsummaries to patient-friendly language and format. JAMA Netw Open. 2024;7(3):e240357. doi:10.1001/ \njamanetworkopen.2024.0357 \n\n**42**. Zhou C, Liu P, Xu P, et al. Lima: less is more for alignment. arXiv. Preprint posted online May 18, 2023. doi:10. \n48550/arXiv.2305.11206", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + }, + { + "text": "Read as much as possible. Reading improves your vocabulary, \nand helps you to become familiar with sentence structure, \nword order, and the correct use of punctuation. \n\n1. \n\nInvest in a good dictionary. When you are unsure of the \nmeaning of a word, or when you come across an unfamiliar \nword, make sure to look it up in your dictionary. \n\n2. \n\nKeep a journal. This will give you an opportunity to practice \nyour writing skills on a regular basis. \n\n3.", + "page_start": 6, + "page_end": 6, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "were observed to be of lower quality compared with the physician-written summaries with regards \n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]), \n\n\n \n \n \n \n [html]\n
Summary typeR ‐ 1aR ‐ 2aR ‐ LaθERT - pIIRT - rSCALE
LLM ‐ generated0.4940.3220.3910.8590.8760.691
Physician - written0.2510.0880.1540.7960.8270.456
\n\nAbbreviations: BERT, bidirectional encoder representations from transformers; p, precision-based scores; r, recall-based scores; R, recall-oriented understudy for gisting evaluation; \nSCALE, source chunking approach for large-scale inconsistency evaluation. \n\na R-1, R-2, R-L are the 3 types of recall-oriented understudy for gisting evaluation scores. Higher is better for all metrics. \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted) December 3, 2024 6/12", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed8.pdf" + }, + { + "text": "9. Use correct grammar and spelling. \n\nThis will contribute to the clarity of your answers, and will prevent the \nperson marking your paper from having to guess what you mean. \n\n10. For longer questions and essay-style questions: plan your answers be- \n\nfore you start writing. \nThis will help you to formulate logical arguments, as well as to structure \nyour answers clearly. In essay questions, you will get marks for using \nthe correct format, which includes making sure that you have an intro- \nduction, sub-headings and paragraphs, and a conclusion. \n\n11. Where relevant, give examples. \n\nThis will help to demonstrate that you understand the topic. \n\n12. If you are writing an open-book exam, keep in mind that you won’t have \n\nenough time to look up all the answers. \nMake sure that you know your work, and that you know where to look \nfor key information. These types of exams are more focused on testing \nyour understanding than on testing your knowledge, which means that \nyou need to have a thorough grasp of the work. \n\n13. If you have to answer multiple-choice questions, make sure that you read \n\nthe questions very carefully. \nTry to think of the correct answer before you read through the options, \nas you are less likely to become confused. When in doubt, go with your \nfirst instinct. If there is more than one correct answer, go with the an- \nswer that appears to be most correct. \n\n14. If you start running out of time towards the end of the exam, write short \nnotes as answers to each of the remaining questions, instead of trying \nto answer each question perfectly. \nThis way, you should still earn some marks for writing down the most \nimportant points. \n\n15. If you have time left at the end of the exam, go back and read through \n\nyour answers to make sure that you are happy with them.", + "page_start": 43, + "page_end": 43, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", + "target_page": 25, + "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "k \nc \no \nt \nS \ne \nb \no \nd \nA \n/ \ns \nt \nr \n\nA \nk \nc \no \nt \nS \ny \nt \ni \nl \n\na \nu \nQ \n© \n\n\n\nIn 2007, 2013 and 2020,**Eurostat**asked employed persons in its ad hoc surveys to the Labour Force \nSurvey (LFS) whether they had**‘… exposure to risk factors that can adversely affect mental well-**\n**being’**.10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, \nviolence or threat of violence, harassment and bullying, other factors). In the 2020 survey,11 ‘Mental \nwell-being’ was operationalised by an additional four response options, resulting in a total of eight \noptions:12 \n\n*1. Severe time pressure or overload of work;*\n*2. Violence or threat of violence;*\n*3. Harassment or bullying;*\n*4. Poor communication or cooperation within the organisation;*\n*5. Having to deal with difficult customers, patients, pupils etc.;*\n*6. Job insecurity;*\n*7. Lack of autonomy, or lack of influence over the work pace or work processes; and*\n*8. Another significant risk factor for mental well-being.*\n\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely \naffect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report \nover two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.13", + "page_start": 24, + "page_end": 24, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 202014**\n\n\n\nESENER 2019 reveals that several**psychosocial risk factors**are reported to be present in a significant \nshare of establishments in the EU27, namely having to deal with difficult customers, patients and pupils \n(59%) and time pressure (45%). \n\nThe aspects**‘Difficult clients’, ‘Poor communication’ and ‘Long working hours’**are major psycho- \nsocial risks. The increase of workforce in communicative and client-oriented occupations — social work, \neducation, tourism and entertainment, health and care — during the last 30 years adds to the \nconventional work with clients in service, sales and health occupations. \n\nThe next table shows the top seven EU Member states with the highest share of these risks for all \nsectors and for the sector ‘Human health and social work activities’ (HHSW). \n\n**Table 1: Psychosocial risks, Top countries ‘All Sectors’ and ‘Human health and social work’ – ESENER**\n**2019**\n\n\n\n\n \n \n \n \n [html]\n
Having to deal with difficult customers, patients, papilsPoor communic cation or cooperation within tha organisationLong or irregular working hoursHaving to deal with difficult customers, patients, pupilsPoor communication or cooperation within the organisationLong or irregular working hours
ALL SECTORSALL SECTORSALL SECTORSHHSWHHSWHHSW
PT 75.6 %SE 41.8 %DK 44.9 %5.96.7 %SE 51.8 %SE 56.8 %
MT 75.0 %DK 37.4 %RO 39.7 %PT 94.1 %OK 45.5 %OK 47.8 %
CY 71.4 %8.29.9 %SE 33.1 %EE 91.5 %NL 37.4 %CY 47.0 %
DK 68.3 %NL 28.7 %FI 32.8 %PL 91.4 %8.37.1 %LV 45.7 %
U 67.8 %FI 27.7 %CY 29.6 %8.89.8 %FR 33.6 %CZ 44.3 %
BE 67.5 %LU 25.9 %MT 28.0 %SE 89.4 %ES 31.8 %RO 36.7 %
FR 67.2 %FR 22.9 %DE 25.7 %DK 87.1 %IJ J 31.5 %FR 35.7 %
EU 59.7 %EU 17.9 %EU 21.5 %EU 83.5 %EU 27.7 %EU 31.1 %
\n\n**Difficult customers, patients and pupils (‘clients’)**seem to be the most widespread psychosocial \nburden, with workers in Portugal, Malta and Cyprus are most exposed. In the sector HHSW, eastern \nEuropean countries are much more present, Slovenia at the top, followed by Portugal, Estonia, Poland \nand Bulgaria. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n26", + "page_start": 25, + "page_end": 25, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Concerning the complaints about**poor communication and cooperation**within the organisation, all \nthree Nordic EU Member States are represented in the seven countries with the highest burden, together \nwith several central European countries. This is valid for both selected groupings, ‘All sectors’ and \n‘HHSW’. \n\nRegarding**long or irregular working hours**, we see a mix of countries from all regions. The order of \ncountries in the sector HHSW — a mixture of countries from the East, South and North — is probably \ndue to specific sectoral regulations of working times. Sweden is at the top in HHSW with 57%, followed \nby Denmark, Cyprus, Latvia and Czechia, all between 44% and 48%. \n\nMany analyses of psychosocial risks include**other relevant factors like decision latitude**(or decision \nauthority) and**skill discretion**(level of skill and creativity required on the job). In a long-term analysis \nof the responses to the EWCS between 1995 and 2015, the authors conclude:15 \n\n*‘Our findings suggest that work stress generally increased from 1995 to 2015, and that the increase was*\n*mostly driven by psychological demands. People working in lower-skilled occupations had generally higher*\n*levels of job strain and effort-reward imbalance, as well as they tend to have a steeper increase in job*\n*strain than people working in higher-skilled occupations. Most of the change occurred from 1995 to 2005.’*\n\nAccording to this study, the**differences between the skills groups**are significant, below illustrated for \nthe development of**‘Psychological demands’**and**‘Job strain’**; for these two indicators high-skilled \nand low-skilled manual workers are at the top of the scale. \n\n**Figure 4: Psychosocial risk factors – Differences between skill groups (Job strain)**", + "page_start": 26, + "page_end": 26, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**List of figures**\nFigure 1: Risk factors present (% of establishments) – ESENER 2014 and 2019................................ 23 \n\nFigure 2: Risk factors that can adversely affect mental wellbeing – EWCS and ESENER ................. 24 \n\nFigure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 2020 . 26 \n\nFigure 4: Psychosocial risk factors – Differences between skill groups (Job strain)............................. 27 \n\nFigure 5: Psychosocial risk factors – Differences between skill groups (Psychological demand) ........ 28 \n\nFigure 6: Psychosocial risk factors – Differences between skill groups (Decision authority) ............... 28 \n\nFigure 7: Psychosocial risk factors – Differences between skill groups (Skill discretion) ..................... 29 \n\nFigure 8: Hours worked per week of full-time employment, EU27 – Eurostat ...................................... 31 \n\nFigure 9: Average working time and work during unsocial hours – Eurostat LFS ................................ 32 \n\nFigure 10: Development of work intensity indicators between 1991 and 2015 – Eurofound ................ 33 \n\nFigure 11: Establishment size and ‘Pressure due to time constraints’ – ESENER 2014 and 2019 ...... 34 \n\nFigure 12: Establishment size and ‘Long or irregular working hours’ – ESENER 2014 and 2019 ....... 34 \n\nFigure 13: ‘Pressure due to time constraints’, Yes responses – ESENER 2019 .................................. 35 \n\nFigure 14: Employed persons and percentage of working time under pressure – Eurostat LFS Ad hoc \n2019 ....................................................................................................................................................... 35 \n\nFigure 15: Percentage of employed persons with working time under pressure (per country, sum of \nresponses ‘Always’ and ‘Often’) – LFS Ad hoc 2019 ............................................................................ 36 \n\nFigure 16: Exposure to physical risks – ESENER, EWCS and LFS ..................................................... 39 \n\nFigure 17: Physical health risks compared (%) – EWCS 2015 ............................................................. 42 \n\nFigure 18: Employment types in EU27, development 2005 to 2022 – Eurostat .................................. 47 \n\nFigure 19: Employed persons by main place of work – Eurostat .......................................................... 51 \n\nFigure 20: Employees working mostly from home (in % of employed persons) – Eurostat .................. 52 \n\nFigure 21: Development of the total number of non-fatal accidents at work and incidence rates (accidents \nper 100,000 workers), 1998 and 2019 – Eurostat ................................................................................. 65 \n\nFigure 22: Share of people reporting any accident and accidents resulting in time off work by country, \n2020 ....................................................................................................................................................... 70 \n\nFigure 23: Comparison of the average incidence rate of fatal accidents in two periods: 2010-2014 and \n2015-2020 ............................................................................................................................................. 71 \n\nFigure 24: Main causes of mortality 2019, EU27 .................................................................................. 79 \n\nFigure 25: Work-related deaths – estimates by WHO/ILO and ICOH for EU27 ................................... 83 \n\nFigure 26: Work-related DALYs – estimates by WHO/ILO and ICOH for the EU27 ............................. 84 \n\nFigure 27: Prevalence of musculoskeletal diseases – EWCS 2015 ..................................................... 88 \n\nFigure 28: Satisfaction with working conditions in the main paid job – EWCS 2015 ............................ 89", + "page_start": 4, + "page_end": 4, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Some of these groups are**directly addressed by European and national legislation**, for example, \nworkers with disabilities, young workers or pregnant women. For other groups of workers, for example, \nfor women or migrant workers, the legislative protection is formulated as a general ‘equal treatment’ \nprescription, like to provide preventive measures for all groups in an enterprise (Framework Directive, \nArticle 15 ‘Risk groups’), or to provide solutions that fit to the individual (Framework Directive, Art. 6.2.d.). \nThere are some prescriptions that refer to specific preventive activities, for example, to provide written \ninstructions in different languages for safe work with chemicals. \n\n**3.6 Conclusions**\nThe exposure**to psychosocial risks**is increasing, with mental health prevalence still emerging. Major \nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, \nlonger working hours and poor communication. There is also some evidence that countries with over- \naverage employment in sectors like health and care or other human and client-oriented services \n(education, social work, tourism, entertainment) suffer from longer working hours and more mental \nburden. The northern countries are at the top of the countries with highest mental burden. The southern \ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment, \ncharacterised by atypical working times and issues with difficult clients. \n\n\n \n \n \n \n [html]\n
Concerning the sectors, national context appears to be related to differences in psychosocial risk
management in all types of organisations, although in some sectors this relationship is weak. In the apriculture, forestry and fishing sector and the sectors of mining, condruction, electricity, trade,
transport, and accommodation and food, the low level of psychosocial risk management ’ as observed also in a bounzational rational contained. An explanation for this finding might relate to the large proportion of small organisationst
\n\nThere is a stable**block of ‘conventional’ physical health risks**— ergonomics and risk from the work \nenvironment — and ergonomic risks that did not significantly change since 1990. It varies between 15% \nfor exposure to smoke, fumes and dusts to over 60% for repetitive hand/arm movements.**Ergonomic**\n**risks**develop in two directions: 1) traditional risks stagnate in total, that is, lifting and moving heavy \nloads, painful or tiring positions, and shifts between sectors (from industry to transport, health and care); \n2) risks of inactivity and highly repetitive hand/arm movements increase. Beside sectoral and \noccupational differences, it can be noted that in general higher percentages of exposed employed \npersons (workers and self-employed) are working in eastern and southern Member States. \n\nSince 2006 the average**working time**per week went down by 15 minutes for employees, and a slight \nreduction of most atypical — or unsocial — working times can be observed. Work intensification has \nemerged until 2005 but seems to stagnate since then. There are strong indications but no quantitative \nevidence on the extent to which working long hours, work at atypical times and probably also work with \nhigher risks were**transferred to workers in non-standard types of employment**.", + "page_start": 58, + "page_end": 58, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "highest quintile, a difference of 21% (EU27, 2019).196 The**European Quality of Life Survey**(EQLS) \nfinds that 13% of the lowest quartile report bad health (EU28, 2016), compared to only 4% of the \nrespondents of the highest income quartile. 197 \n\nThe**relation between socioeconomic status — measured by income — and working conditions**\nis often not further analysed, at least not on an aggregated statistical level. Due to complex \nmethodological difficulties and strong national variations of the health systems, there are until now**no**\n**EU-wide morbidity statistics available, based on administrative data**.198 A ‘Morbidity Task Force’ \nat EU level worked between 2005 and 2011 on the development of such statistics.199 Country-specific \ndata — without a harmonised approach between countries — are provided in EU and OECD publication \nseries.200 \n\nThe system of**European Core Health Indicators (ECHI)**provides an overview on prevalence of major \ndiseases.201 Main morbidities covered until now are asthma, chronic obstructive pulmonary diseases \n(COPD), communicable diseases, depression, dementia, diabetes, diseases caused by drugs, \nHIV/AIDS, and physical or sensory functional limitations. However, in ECHI there is no option to relate \nthese diseases to sectors or occupations. \n\nThe impact of work — as one essential element of the socioeconomic status — on health was the subject \nof numerous academic studies, often performed as specific case studies. The authors of an overview \nstudy on ‘Cross-country inequality in the EU’ summarise (more references in the original text): \n\n*‘Occupational grade and labour market status are among the factors most often studied in relation to*\n*health and mortality. Occupational grade has been found to be associated with self-rated health, mental*\n*and physical health, such as the presence of long-standing illness and a number of diseases. Lower*\n*occupation might affect health through poor working conditions, such as the higher exposure to*\n*occupational hazards and toxic compounds, health-damaging behaviours and psychosocial stress.*\n*Work-based stress combined with a lack of autonomy over one’s work are believed to be the*\n*psychosocial factors that can cause physiological changes, such as increased risk of cardiovascular*\n*diseases and reduced immune system response. It has been shown that the gaps in mortality between*\n*different occupational grades persist in old age and tend to widen with age.*202 \n\nEurostat provides in the LFS**2020 Ad hoc module**on ‘Accidents at work and other work-related health \nproblems’ a rough overview on such relations, with some specification, for example, for sectors, \nattainment levels, professional status, size of enterprise or occupation. 203 The differences between four \naggregated occupational groups and work-related health problems is shown in the next table. \n\n**Table 23: People reporting work-related health problems by group of occupations (ISCO) – LFS Ad hoc**\n**2020204**\n\n\n \n \n \n \n [html]\n
Work - related health problems2020
Managers, professionals, technicians and associate professionals9.40 %
Clerical support workers, service and sales workers report9.40 %
Skilled agricultural, forestry and fishery workers, craft and related trades workers13.40 %
Plant and machine operators and assemblers, elementary occupations11.80 %
Total10.30 %
", + "page_start": 79, + "page_end": 79, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "satisfaction, for example, Austria, Cyprus, Germany, Greece, Ireland, Hungary, the Netherlands, \nPortugal and Slovakia. The one negative item might also be work-related health problems, for example, \nfor Sweden and Finland. \n\nMost countries show more extreme contradictions, that is, being in some aspects better and in others \nworse than average, like Estonia, Lithuania, Poland, Bulgaria, Portugal, Slovenia and Spain. Many of \nthese countries have very low figures for work-related health problems. Contradictory but mostly \nnegative responses (two or three fields with values under average) we find for Austria, Belgium, Croatia, \nFrance, Latvia, Lithuania, Malta, Romania, Poland, Spain and Slovenia. \n\n**4.4 Conclusions**\n**Work accident data**— fatal and non-fatal — show an impressive decline in the past 20 years, even if \none takes into account the significant level of underreporting. Preventive technical and organisational \nsafety measures and sectoral shifts were the crucial factors for this improvement. The relevance of**non-**\n**fatal accidents with severe health consequences**— permanent disability or more than three months’ \ntime-off period (more than 230,000) — should be recognised and further investigated. \n\n**Public health data**show a significant increase in**life expectancy**and**substantial shifts in morbidity**\nduring the past three decades at EU level, also documenting major differences between EU Member \nStates in mortality and morbidity.**Socioeconomic inequality**is an evident reason for higher mortality \nand morbidity. There is less evidence concerning the correlation between working conditions — as a \nmajor element of the socioeconomic status — and mortality and morbidity at EU level. \n\nThe clearest evidence on the**relationship between working conditions and diseases**exists for \nrecognised occupational diseases, and for these, the trend is also strongly downwards. In contrast, the \nestimates of the development of**work-related diseases**— based on fractions of diseases attributable \nto work occupation — show a persistently high burden. The current estimates of ILO/WHO and of ICOH \nrange between 115,000 and 180,000 deaths and between 4.5 million and 6.9 million DALYs; advanced \nresearch and the incorporation of more disease groups — mental health, diseases caused by biological \nagents — will significantly increase these figures. Literature, studies and surveys like the EWCS, LFS \nand the Flash Eurobarometer clearly show the strong relations between health status and occupation. \nEurostat works on improvements concerning the morbidity statistics (task force, pilot statistics on \noccupational diseases). EU-wide morbidity statistics from national administrative sources might be \navailable in the future; currently self-reported health data are the major source for EU-wide harmonised \nquantitative data. \n\n**Wellbeing and satisfaction at work**show similar patterns as health and work accidents and work- \nrelated health issues. Sectors with high physical demands and high customer and client orientation and \noccupations with a lower skill level report lower wellbeing and satisfaction levels; these groups report a \ngood health status — mostly being younger — but fewer expectations to be able to work in this \noccupation until the age of 60. Professions with strong customer and client orientation have lower-than- \naverage wellbeing and satisfaction rates. \n\n**Workers in manual occupations**265 have higher accident rates, lower life expectancy and less \nexpectancy to do the job until age 60.**Administrative workers (clerical, managerial)**have a better \nstatus in the above-mentioned aspects but report a worse health situation. For many items the eastern \nEU Member States — often all of them — report the least positive data. The**healthy worker effect and**\n**cultural differences**— to express not being healthy — probably strongly influence the self-assessment.", + "page_start": 98, + "page_end": 98, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**3.1 Psychosocial risks at work**\nDuring the last 30 years, the scientific, political and practical discussions on**psychosocial risks**and \npreventive measures against psychosocial risks have gained strong importance. After a period of doubts \nand resistance, today they are regarded as risks of the same severity as the classical physical safety \nand health risks.4 (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases \nand the burden of mental diseases see Chapter 2.2. 5) \n\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the**risks**\n**have increased**and/or the**number of people working in occupations**with higher psychosocial risks \nhas increased.6,7 This is valid, for example, for the indicator time pressure, for example, in delivery \nservices, transport, and often also clerical work; the workforce has grown in sectors where emotional \ndemands from dealing with difficult clients, customers, pupils or patients are common; there are also \nmore workers employed (or self-employed) in interactional occupations, for example, in call centres, or \nin occupations with a high level of emotional tensions, for example, education, health and care. \n\n**Figure 2: Risk factors that can adversely affect mental wellbeing – EWCS8 and ESENER9**\n\nA major difference between the ESENER and the EWCS survey is the respondent. In ESENER those \npersons who are most familiar with OSH or responsible for OSH in an enterprise were asked whether a \ncertain risk factor exists in the enterprise; in the EWCS survey workers themselves were asked whether \nthey are exposed to a risk factor. \n\n\n \n \n \n \n [html]\n
TableTableEuropean Agency for Safety and Health at Work – EU - OSHA
Table
", + "page_start": 23, + "page_end": 23, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**4.3 Wellbeing and health status**\nExisting concepts of**wellbeing**cover**more aspects of work than working conditions or safety and**\n**health**at workplaces. Eurofound mentions as the most relevant components:*income, working time*\n*arrangements, possibilities for skills development and career advancement, and the degree of individual*\n*control over work*. 243 The United Nations Economic Commission for Europe (UNECE) developed a \nscheme of quality of employment that covers these aspects:*safety and ethics of employment, income*\n*benefits and employment, working hours and balancing working and non-working life, security of*\n*employment and social protection, social dialogue, skills development and training, workplace*\n*relationships and work motivation.*244 \n\nThis chapter**focuses on the health and safety aspects**of wellbeing, although the OSH aspect is often \nnot clearly separable from the above-mentioned aspects, that is, when surveys are intending to identify \nthe level of ‘satisfaction at work’. Still, due to its serious impact on all other aspects of working conditions, \nthe consequences of insufficient health are regarded as critical: \n\n*‘While OHS is only one substantive working condition, like earnings and job insecurity it is arguably a*\n*critical one for many workers. In terms of scope and severity, even official data … suggests poor OHS*\n*is something most workers will experience at some point and many far more frequently.’*245 \n\nA common methodology to collect data on**health status**and wellbeing is**self-reporting and self-**\n**assessment**of workplace risks, health risks and health problems, absence, job satisfaction and working \nlife perspective from a health point of view. The data are in general collected by EU-wide surveys, for \nexample, by the EWCS, the Flash Eurobarometer, ESENER or the LFS Ad hoc modules. The \ndescription of working conditions in the OSH Barometer starts with responses regarding the**‘Overall**\n**opinion’**on working conditions. This allows insight into the subjective assessment of health risks at \nwork and wellbeing. \n\n***4.3.1 Satisfaction at work***\n\nIn the EWCS of 2015, at EU level 86% of the workers respond that they are**‘satisfied’**(60%) or**‘very**\n**satisfied’**(26%) with their work. Country differences exist but are not striking. The EU Member States \nwith the highest satisfaction rates are Austria, the Netherlands, Finland, Czechia, Denmark, Belgium \nand Estonia; they range between 93% and 90%. The six countries with the lowest sum of satisfied and \nvery satisfied responses are Greece, Croatia, France, Spain, Italy and Latvia; their values range \nbetween 77% and 82%. \n\n**Figure 28: Satisfaction with working conditions in the main paid job – EWCS 2015246**", + "page_start": 88, + "page_end": 88, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**3 Status of working conditions**\nThis chapter on health and safety-related working conditions provides an overview on status and \ndevelopment of working conditions; it is mainly based on the indicators that were**selected for the data**\n**visualisation in the OSH Barometer**. This is a quite limited selection of major data; in surveys and \nstatistics many more indicators on working conditions are provided, particularly at national level. \n\nPractically all working conditions influence**mental health**, that is, they involve**psychosocial risks**, and \nall also involve**‘physical risks’**, including safety aspects of these risks. Mental health risks are \nillustrated in the OSH Barometer by datasets on time pressure, poor communication, dealing with difficult \nclients, discrimination and harassment, and similar.**Physical risks**include datasets on accidents at \nwork, exposures to chemical and biological substances, exposure to noise, vibrations, high or low \ntemperatures, and working tasks with ergonomic risks, like carrying, lifting heavy loads or work in tiring \nor painful positions; and also permanent physical inactivity, mainly sitting or long standing. 2 \n\nThe figure below shows the percentage of enterprises reporting OSH risks ‘present in the establishment’, \ncompared between 2014 and 2019 (ESENER) and covering mental and physical risks.3 \n\n**Figure 1: Risk factors present (% of establishments) – ESENER 2014 and 2019**\n\n\n\nNote: Prolonged sitting was a new item in the 2019 survey. \n\nBetween 2014 and 2019, some risk factors increased, like ‘Repetitive hand and arm movements’, ‘Lifting \nor moving people of heavy loads’, and ‘Having to deal with difficult customer, patient and pupils; many \nothers showed no changes, like ‘Risk of accidents with machines or hand tools’, ‘Chemical or biological \nsubstances’, and ‘Loud noise’, or minor decreases like ‘Risk of accidents with vehicles’.", + "page_start": 22, + "page_end": 22, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Has the average working week for employees working full-time decreased since 2006?", + "target_page": 31, + "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Figure 8: Hours worked per week of full-time employment, EU27 – Eurostat**\n\n\n\nThe**commuting time**between home and workplace is quite stable; in 2005 at EU27 level, it stood at \n42.4 minutes, and in 2015 Eurostat reports 40.2 minutes (time for both ways, to the workplace and \nback).19 \n\n**Work at atypical working times**is in general regarded as a working condition with negative health \nimpact, called**work extensity**. The two major indicators of atypical working times are work at**‘atypical**\n**working times’**and**‘long working hours’**. \n\nEurostat reports for**‘Employment at atypical working time’**20 a minor decrease between 2011 and \n2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. 21 \nSome**groups of self-employed**show a higher rate of atypical working times but also for most of the \ncategories of self-employed the rates decreased during the period 2011 to 2019.**High managerial self-**\n**employed**had a slight increase from 42.1% to 43.2% in this period. For the**low managerial self-**\n**employed**Eurostat finds a decrease from 69.2% to 64.5%. The figures for**small entrepreneurs**\ndropped slightly from 56.6% to 54.1%, the same applies for employed persons in**personal care work**\nwith a minor change (50.6% to 49.8%).**Agricultural self-employed**had the highest level of such \nworking times; they showed a decrease from 68.4% to 63.4%. \n\nThe length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are \nimportant factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease**of the**\n**average weekly working time for full-time employees**(15-64 years) from 40.2 to 39.9 hours between \n2006 and 2019.22 The data also document slight increases and decreases of work at atypical times \n(response option for frequency: ‘usual’).23 In 2006 and 2019, the following percentages of all employed \npersons worked at atypical times: on**Saturdays**the percentage decreased from 28% to 25%,**working**\n**on Sundays**remained stable at around 13.5%,**working in the evenings**decreased from 19% to 15%, \n**work at night**fell from 7% to 5% and**shift work**increased slightly from 17% to 18%.24 \n\n\n \n \n \n \n [html]\n
TableTable
European Agency for Safety and Health at Work – EU - OSHA31
", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 15: Percentage of employed persons with working time under pressure (per country, sum of**\n**responses ‘Always’ and ‘Often’) – LFS Ad hoc 2019**\n\n\n\nOne hypothesis to explain the increased time pressure is to draw a direct**connection between short**\n**weekly working time and more intense work**; or in other words, a short weekly working time leads to \nmore**intensification of work or more long hours or atypical working times**(‘trading flexibility for \neffort’). 38 \n\nThe analysis of EU survey data shows**a mixed picture**: Firstly, ESENER data corroborate this \nhypothesis, the three countries with highest percentage of work under time constraints — that is, Finland, \nSweden and Denmark — all have working hours under the EU average. Secondly, LFS data show a \ndifferent picture; a country like Greece has the longest working hours and also reports the highest time \npressure, the same ‘combination’ — but less extreme — applies to Austria, Cyprus and Malta. Trends \nof low or less than average working time and no time constraints are reported for Lithuania, and medium \nworking time and low time constraints for Italy and Ireland. \n\nAn analysis of EWCS data concluded39 that in general intensity increases with long working hours, in \nenterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises \nwith above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of \nthe**size of the enterprise**for time pressure and long working hours. \n\nLiterature — from very diverse disciplines — on work intensification points to**reasons for**\n**intensification on developments as:40**\n\n• Economic developments, particularly the dominance of neoliberalist policies and enhanced \ncompetition between workers, companies and states; reduction of state influence and \nprivatisation.41 \n\n• Pressure due to substantial organisational changes, for example, introduction of short-term \neconomic objectives in enterprise policies, 42 expansion into new markets or new countries, \nacquiring other enterprises or merging, being acquired, restructuring of management or of basic \nstaff working conditions (contracts, working time, flexibility).43 \n\n• Decrease of trade union influence or worker participation regarding labour relations. \n• Liberalisation of labour legislation, creation of ‘new forms of work’ and new contract types, \nbeyond the permanent full-time employment.44 \n\n• New forms of management, application of management concepts like just-in-time production or \nlean management, higher flexibility of production and higher customer orientation, 45 \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n36", + "page_start": 35, + "page_end": 35, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 9: Average working time and work during unsocial hours – Eurostat LFS**\n\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with \na high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% \nin shifts; for the EU27 this rate is 5.2% respectively and 18.3%.25 Regarding work on Sundays three \nother countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% \nand 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like \ntransport, tourism and agriculture.26 \n\nFor all these types of work it should be take into account that other groups of**workers under non-**\n**standard types of employment contracts**(self-employed, agency workers, students, pensioners, \nundeclared workers) might have taken over work at these atypical working times. \n\nConcluding, it can be stated that there is a**slight trend towards a reduction of weekly working hours**\n**for regularly employed**workers, including a stable commuting time. Working hours at atypical times \nshow a mixed picture. Looking at most types of employees,**atypical working time decreased, except**\n**work on Sundays**. For self-employed with employees, the working time at atypical hours is in general \nat a higher level. The number of employees in night work is decreasing. More employees in service and \nclient-related occupations at night or in shifts but also here the atypical times are slightly decreasing. \n\nProbably these changes**mirror the structural economic changes**, that is, the shift of workforce \nbetween sectors. Night work was common in many industries as part of a three 8-hours shifts, not only \nin industries with permanent production processes (steel, chemicals, etc.). 27 Moreover night work is and \nwas common in essential services like health, transport, technical infrastructure and security. The \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n32", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \n23 Eurostat definition of atypical work: The atypical work distinguishes between “evening or night work”, “Saturday \nor Sunday working”, and “shift work”. \n24 All data were retried from tables in: Labour market > Employment and unemployment (Labour force survey) M \n> LFS series - detailed annual survey results M > Population in employment working during unsocial hours - LFS \nseries \n25 Eurostat: Employed persons working at nights as a percentage of the total employment, by sex, age and \nprofessional status (%) \n26 Eurostat: Employed persons working on Sundays as a percentage of the total employment, by sex, age and \nprofessional status (%) \n27 Fiz Perez et al., 2019: Shift and night work management in European companies \n28 OSHWiki, 2022: Psychosocial issues – the changing world of work \n29 Eurofound, 2003: Time and work: Work intensity \nEurofound, 2009: Working conditions in the European Union: Working time and work intensity \n30 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). \n\n31 ESENER addresses the person in an enterprise responsible for or closest to the topic of OSH; the EWCS is a \nworker survey. In addition, the response options were different from the EWCS. Two options in ESENER, ‘Yes’ or \n‘No’, compared to three options in the EWCS: ‘(Almost) all of the time’, ‘Between ¼ and ¾ of the time’, ‘(Almost) \nnever’. \n\n32 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3), ESENER Data \nvisualisation, section ‘Comparisons 2014-2019’, section ‘Psychosocial risk factors present in the establishment’, \n‘Pressure due to time constraints’. \n33 Ibid., Section ‘Psychosocial risk factors present in the establishment’, ‘Long or irregular working hours’. \n34 Ibid., Section ‘Psychosocial risk factors present in the establishment’, The exact question was: ‘Please tell me \nfor each of the following risks whether or not it is present in the establishment?‘ ‘Pressure due to time constraints’. \nResponse option: Time pressure. \n35 Ibid., Section ‘Psychosocial risk factors present in the establishment’, The exact question was: ‘Please tell me \nfor each of the following risks whether or not it is present in the establishment?‘ ‘Pressure due to time constraints’. \nResponse option: Time pressure. \n36 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3), ESENER Data \nvisualisation, section ‘Comparisons 2014-2019’, section ‘Psychosocial risk factors present in the establishment’, \nThe exact question was: ‘Please tell me for each of the following risks whether or not it is present in the \nestablishment?‘ ‘Pressure due to time constraints’. Response option: Time pressure. \n\n37 Eurostat, 2019: Persons in employment by frequency of working under time pressure, educational attainment \nlevel and professional status, 20-64 years, percentages calculated from numerical data", + "page_start": 141, + "page_end": 141, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 7: Psychosocial risk factors – Differences between skill groups (Skill discretion)**\n\n\n\nFor ‘Decision authority’ and ‘Skill discretion’, the authors found a stable situation since 1995, even a \nsmall rise of skill discretion for manual workers after 2010. Regarding ‘Psychological demands’ and ‘Job \nstrain’, the major increase for all groups took place between 1995 and 2005. This growth decelerated \nafter 2005, this observation is also valid for other working conditions, like work intensity. \n\n***3.1.1 Working time in hours and at atypical times***\n\n**Too many hours of working time and/or working hours at atypical or unsocial times**can put**the**\n**mental**and**the physical health**of humans at risk. It is also regarded as a major**contributing factor**\n**to work accidents**, due to fatigue or exhaustion.16 \n\nThe main indicator to describe working time is the**number of the weekly average working hours**of \nfull-time employees. However, regarding its impact on health and safety,**other aspects of working**\n**time are of the same relevance**: \n\n• How long is the average working day? \n• At which times and days is this work done (typical, atypical times)? \n• How often do long working hours take place? \n• \n• How flexible are start and end? \n• How intense is the work during this time (breaks, deadlines)? \n• Which groups of workers have standard working times and which do not (e.g. depending on the \n\nIs the work split between two jobs? \n\nsector or the type of contract, e.g. sub-contracted workers or self-employed)? \n\nThere is a**slight trend towards fewer working hours**for full-time**employees**(not ‘Employed persons’) \nin the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, \na decrease of approximately 15 minutes.17 \n\nRegarding the weekly hours, there are**no striking differences**between the EU27 Member States. In \n2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation) \nhad the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands \nand Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes).18", + "page_start": 28, + "page_end": 28, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "***3.1.2 Work intensity***\nThere are numerous references showing that during the period**between 1990 and 2005 work intensity**\n**has considerably increased**.28 \n\nFor example, Eurofound has analysed the responses to the two EWCS questions on high speed at work \nand tight deadlines. The EWCS found a significant increase of work intensity between 1991 and 2005. \nIn 1991,**‘Working at a very high speed’**was for the majority of respondents not an issue. Fifty-two per \ncent of the workers responded to this statement ‘Never’ or ‘Almost never’; in 1991, 24% worked at high \nspeed and responded ‘Around ¾ of the time’, ‘Almost all of the time’ and ‘All of the time’; until 2005 this \nresponse rate went up by 11% to 35%. \n\n**Working to tight deadlines**was not an issue for 34% in 1990, and in 2005 only for 19%, a reduction \nof 15%. The percentage of the sum of responses ‘Around ¾ of the time’, ‘Almost all of the time’ or ‘All \nof the time’ to this question on tight deadlines increased between 1991 and 2005 from 29% to 37%. \nRegarding these two indicators,**work intensity has evidently increased**between 1991 and 2005. 29 \n\n**Figure 10: Development of work intensity indicators between 1991 and 2015 – Eurofound**\n\n\n\nAfter that first period between 1991 and 2005,**this development seems to stagnate between 2005**\n**and 2015**.30 The responses ‘Almost all of the time’ or ‘All of the time’ vary only slightly, between 33% \nand 37% depending on year and question (‘Working at high speed’ or ‘Working to tight deadlines’). \n\nDifferences can be seen regarding sector, company size and occupation.**Regarding work intensity**, \nESENER enterprise data on time pressure for the EU27 indicate a slight increase of 2.3% between 2014 \nand 2019 from 43% to 45%.31 Interestingly, according to ESENER, time pressure drastically**increases**\n**with the size of the enterprise**. In enterprises with 5 - 9 employees, 39% report time pressure, and in \nenterprises with above 250 employees 69%. 32 The same applies for long working hours, where \nenterprises with 5 - 9 employees report 19% ‘long working hours’, and in enterprises with above 250 \nemployees this percentage increases to about 39% (EU27, 2019).33", + "page_start": 32, + "page_end": 32, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "37 Eurostat, 2019: Persons in employment by frequency of working under time pressure, educational attainment \nlevel and professional status, 20-64 years, percentages calculated from numerical data \n\n38 Kelliher & Anderson, 2010: Doing more with less? Flexible working practices and the intensification of work \n39 Piaska, 2018: Scheduled to work hard: The relationship between non-standard working hours and work \nintensity among European workers (2005–2015) \n40 See also the overview in: EU-OSHA, OSHWiki, Guyot, S: Psychosocial issues – the changing world of work, \nhere \n41 Newer literature: James & Walters, 2022: Work and Health: 50 Years of regulatory failure. \n42 Davis & Kim, 2015: Financialization of the Economy \n43 Ethics & Compliance Initiative, 2020: Global Business Ethics Survey Report. Pressure in the Workplace: \nPossible Risk Factors and Those at Risk \n44 Johnstone et al., 2005: Statutory Occupational Health and Safety Workplace Arrangements for the Modern \nLabour Market \n\n45 Lorenz & Valeyre, 2005: Organisational Innovation, Human Resource Management and Labour Market \nStructure: A comparison of the EU-15", + "page_start": 141, + "page_end": 141, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Some important questions remain at the end of such a report: \n\n• The**quality of statistics and surveys fades the more irregular are the working**conditions \nbeing studied. Which research methods are adequate for a clearer and more reliable evidence \nbase on these working conditions? It might require research methods different from those used \ntoday, for example, more investigative case studies; it might also be helpful to evaluate the \n**existing national working conditions surveys or statistics**under this aspect. \n\n•**Fading employer–employee relations.**There are special research efforts necessary to study \nthe application of OSH regulations of work with weak or no employer–employee relations, for \nexample, for the self-employed and new forms of employment. \n\n•**Surveys usually suffer a participation bias, for example, for the migrant workforce.**The \nlow participation rate of migrants can contribute to a particular underestimation regarding their \noften unfavourable working conditions. \n\n•**Workers in manual occupations**report**better health than administrative workers**but**less**\n**expectations to do the job until being 60 years old**. What are the reasons behind this? Is it \nthe healthy worker effect, strong occupation-related differences regarding the perception of \nhealth and the expression of health problems? 502,503 \n\n• High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data \nsuggest that**work intensification stopped after 2005**. What might be the reasons? Are the \ncurrent indicators not specific enough to measure developments of work intensity? Has since \nthen the major burden of intensification been put on other types of workers, for example, \nsubcontracted or self-employed, temporary and seasonal workers, or on workers in the global \nsupply chain? \n\n• How much evidence is there that**dangerous work has been increasingly contracted out to**\n**small and medium-size enterprises and the self-employed**? Are there sufficiently detailed \ndata on whether a larger share of service and client-related work at atypical times or work \nrequiring long working hours has been taken over by self-employed or subcontractors? \n\n• The**influence of enterprise size**is often difficult to explain. In several aspects, the SMEs \nperform better, and in other important aspects worse. What might be the reason for this? \n•**How is it possible to overcome the ‘prevention gap’ that in general exists between mobile**\n**and stationary workplaces?**Can the solutions be technical or must there be organisational \nand legal measures, for example, a limitation of the prolonged use of ergonomically inadequate \nequipment like mobile phones? \nImpact of**international and global supply chains on OSH: Does it improve or worsen the**\n**working conditions in the EU?**Research could try to estimate the risk-reducing impact of the \nshift of some high-risk productions to enterprises outside the EU, for example, mining, base \nchemicals, recycling and so on (export of risks), and to estimate the OSH impact of EU export \nproduction, for example, vehicles, specialty chemicals, machines for risks at work inside the EU \n(import of risks). \nIt would also be a big step forward if research could achieve an agreed**standard value or a**\n**standard range**(as reliable as possible) for the**attributable fraction of work**to widespread \ndiseases, that is, cardiovascular diseases, mental and behavioural disorders, musculoskeletal \ndiseases and cancer. \n\n• \n\n•", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Concerning the complaints about**poor communication and cooperation**within the organisation, all \nthree Nordic EU Member States are represented in the seven countries with the highest burden, together \nwith several central European countries. This is valid for both selected groupings, ‘All sectors’ and \n‘HHSW’. \n\nRegarding**long or irregular working hours**, we see a mix of countries from all regions. The order of \ncountries in the sector HHSW — a mixture of countries from the East, South and North — is probably \ndue to specific sectoral regulations of working times. Sweden is at the top in HHSW with 57%, followed \nby Denmark, Cyprus, Latvia and Czechia, all between 44% and 48%. \n\nMany analyses of psychosocial risks include**other relevant factors like decision latitude**(or decision \nauthority) and**skill discretion**(level of skill and creativity required on the job). In a long-term analysis \nof the responses to the EWCS between 1995 and 2015, the authors conclude:15 \n\n*‘Our findings suggest that work stress generally increased from 1995 to 2015, and that the increase was*\n*mostly driven by psychological demands. People working in lower-skilled occupations had generally higher*\n*levels of job strain and effort-reward imbalance, as well as they tend to have a steeper increase in job*\n*strain than people working in higher-skilled occupations. Most of the change occurred from 1995 to 2005.’*\n\nAccording to this study, the**differences between the skills groups**are significant, below illustrated for \nthe development of**‘Psychological demands’**and**‘Job strain’**; for these two indicators high-skilled \nand low-skilled manual workers are at the top of the scale. \n\n**Figure 4: Psychosocial risk factors – Differences between skill groups (Job strain)**", + "page_start": 26, + "page_end": 26, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "In several occupations,**classical safety risks often add to the above-mentioned exposures**, that is, \nslips, trips and falls, risks related to moving parts of machinery, moving vehicles, exposure to hot, cold, \nor hazardous materials, loud noise, chemical or biological substances, and in general physically \nexhaustive work. \n\nA certain**ergonomic risk**of many administrative and supervisory jobs is**physical inactivity**(61%), in \npractice meaning sitting most of the working time in front of digital equipment, sitting to make phone \ncalls or sitting in meetings. Not only administrative tasks but also many occupations in transport and \nindustry require prolonged sitting (transport, cashiers, parts assembly, etc.). \n\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major \ndifferences in work intensity and working time patterns can be seen between occupations, forms of work, \nsectors and enterprise size, for example. The length of the daily or weekly working time and its allocation \nwith the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data \nshow a slight decrease**in the average weekly working time for full-time employees**(15-64 years) \nfrom 40.2 to 39.9 hours between 2006 and 2019. \n\nEurostat reports for all types of**‘employment at atypical working time’**a minor decrease between \n2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such \natypical time. The data also document slight increases or decreases of the different types of work during \natypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings \ndecreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell \nfrom 7% to 5%, and shift work increased slightly from 17% to 18%. Some**groups of self-employed**\nshow a higher rate of atypical working times: for**high-managerial self-employed**, this rate is 43.2% \nand for**low-managerial self-employed**64.5%. \n\n**Significant differences also exist between eastern/southern and central/northern/western**\n**European countries.**More physical and ergonomic risks (except inactivity) are reported from eastern \nand southern EU Member States but more emotional demands (e.g. difficult clients, poor communication \nand long working hours) in northern and central European countries. One of the major reasons might \nbe the reallocation of industrial production to eastern countries after the EU extension to 24 and later to \n27 Member States. \n\n**Conditions of employment and workforce development**\n\nDuring the past decades and at faster pace after 1990, a**greater variety of non-standard contractual**\n**relations**has emerged. Typical characteristics of non-standard work are part-time work, temporary (or \nfixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family \nwork. Currently, high public awareness is directed to those types of non-standard work that are \nconnected either to**new forms of contracts**(voucher, platform, zero-hours, portfolio, etc.) or increasing \n**types of work not bound to the premises of the employer**(mobile, at home, at client’s place), mostly \nmade possible by the increased use of modern information and communication technologies (ICT). \nThese forms of work often have as a — additional — major characteristic a**less clear employer–**\n**worker relationship**. \n\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce \n(EU27), 9% are ‘own-account’ workers, that is, self-employed without employees. The remaining 4% \nwere self-employed with employees (employers) and less than 1% were contributing family workers. Of \nall employed workers, 17.2% worked part-time and 13.3% had temporary contracts.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "What is the definition of a work accident according to the International Labour Organisation?", + "target_page": 38, + "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Table 18: People reporting an accident by group of occupations (ISCO) – LFS Ad hoc 2020156**\n\n\n \n \n \n \n [html]\n
Self - reported work accidents2020
Managers, professionals, technicians and associate professionals1.5 %
Clerical support workers, service and sales workers2.1 %
Skilled agricultural, forestry and fishery workers, craft and related trades workers4.1 %
Plant and machine operators and assemblers, elementary occupations3.4 %
Total2.3 %
\n\n\n\nIn the Member States there exist very**diverging perceptions of which level of severity of a work**\n**accident justifies a notification**— or in the case of the LFS survey a positive response. In the LFS \nAd hoc module of 2020, the figures vary significantly between Member States. Some countries \npractically report only accidents with ‘Off work’ periods, for example, Italy, Lithuania, Malta and Poland. \nIn other countries the shares of work accidents reported that result in ‘Off work’ are under 40%, for \nexample, for Sweden and Finland, Greece, Denmark and France. 157 That means that in these countries \nthe respondents reported more than 50% such work accidents that did not cause an absence. Cultural \ndifferences in health perception in society and working life will probably be the major reason for these \ndifferences. \n\n\n\nA \nH \nS \nO \nU \nE \n/ \ny \nc \nn \ne \ng \na \no \nt \no \nh \np \n\n- \n\no \nr \na \nc \n©", + "page_start": 68, + "page_end": 68, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "particularly dangerous work environments like road maintenance, combined with better organisational \nmeasures; quality systems that promote continuous repair and maintenance of tools; regular instructions \nby safety representatives and safety coordinators, and guarantee of minimum safety standards of \nmachines and products by European standards like CE and CEE. \n\n\n\nk \nc \no \nt \nS \ne \nb \no \nd \nA \n\n/ \nt \na \nw \na \nn \na \nT \n© \n\nIf an accident takes place, the technical and organisational measures were either not perfect for all \nconceivable situations or not fully implemented. Based on ESAW, Eurostat analysed the**physical**\n**activities per sector**that trigger non-fatal and fatal accidents at work in the EU27 (in 2019).127 \n\n**Table 14: Accidents at work by physical activity 2019 – Eurostat**\n\n\n\n\n \n \n \n \n [html]\n
2019 All SectorsNon - fatal – % of all accidentsNon - fatal – NumberFatal –% of all accidentsFatal – Number
Operating machine2.5680.3263.62123
Working with handheld tool7.01220.2975.73195
Driving / being on board at means of transport or handling equipment3.58112.51217.76605
Handling of objects12.53393.6476.74230
Carrying by hand9.34293.4272.6590
Movement18.58583.54516.09548
Presence1.7454.6468.38285
Other specific activities1.9360.6704.16142
", + "page_start": 62, + "page_end": 62, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "***4.1.2 Serious non-fatal and fatal work accidents***\n\nEurostat defines a fatal work accident as follows*: ‘A “fatal accident” means an accident which leads to*\n*the death of a victim within one year of the accident’.*160 \nFatal commuting accidents are excluded, or when counted at national level, excluded from the ESAW \ndata. \n\nIn the last decade, most EU Member States registered a**significant decrease of fatal work**\n**accidents**.161 From 2010 to 2019, for the EU27, the**incidence rate of fatal accidents decreased over**\n**all sectors from 2.31 to 1.74**, or a minus of 25%. In the period between 2010 and 2019 the sectoral \nfigures of five major sectors developed as follows: \n\n**Table 19: Incidence rates of fatal accidents per sector in 2010 and 2019 (EU27)162**\n\n\n \n \n \n \n [html]\n
Sectors, EU - 27Incidence rate 2010Incidence rate 2019Development 2010 to 2019
Agriculture ( A )4.554.44plus 10 %
Manufacturing ( C )2.271.6minus 30 %
Construction ( F )7.546.52minus 14 %
Wholesale ( G )1.431.0minus 30 %
Transport and storage ( H )7.164.84minus 32 %
All sectors2.311.77minus 23 %
\n\n\n\nAlso, large differences between countries can be noted. The following figure — taken from the OSH \nBarometer — calculates the number of fatal accidents in periods and compares the period 2010-2014 \nwith 2015-2020. The reason is that — particularly in smaller Member States — a year with one serious \nand large work accident and several fatalities, or another year without any fatal accident, would distort \nthe annual picture and create significant changes from year to year. Romania, Luxembourg and Bulgaria \nhave the highest incident rates, and the Netherlands, Sweden and Germany the lowest. In 25 countries \nthe rate fell or stagnated in these two periods, with exceptions being Luxembourg and Greece. \n\n**Figure 23: Comparison of the average incidence rate of fatal accidents in two periods: 2010-2014 and 2015-**\n**2020163**", + "page_start": 70, + "page_end": 70, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "ESAW provides more detailed data about the**severity of non-fatal accidents**. 164 According to \nEurostat’s evaluation of ‘Causes and circumstances’ of work accidents (**data from 2005, EU-15 and**\n**Norway**), in 2005, 3.9% of the non-fatal work accidents or 157,494 non-fatal accidents led to**permanent**\n**incapacity**(full or partly), and 138,568 (3,4% of all accidents) to absences from three to six months. 165 \n**In 2019**, the**outcome**‘Permanent incapacity or 183 days*(of time-off)*or over’**made up 4.4% of all**\n**non-fatal work accidents or a little more than 100,000 cases**.**As serious outcomes**we regard at \nleast the cases in the ESAW category: non-fatal accidents involving these consequences are more than \n**34 times more frequent than fatalities**. These detailed time-off and outcome data are only available \nfor the sectors A and C-N, not for the other sectors with lower accident rates. If we include in the \ndefinition of a serious accident also the**ESAW category ‘Time off between 3 and 6 months’, another**\n**5.4% or 129,150 non-fatal accidents**would be added to the category ‘Serious accident’. \n\n**Table 20: Severity of accidents in the EU27 in 2019 (sectors A and C-N)166**\n\n\n\n\n \n \n \n \n [html]Coefficient between nore than 6 months or permanent handicap / fatal34.5All Accidents in A, C - NCoefficient between time off between 3 and 8 months / fotal42.9All Accidents in A, C - NCoefficient between time of between 1 and months nore than 1 months or permanent helice77.4\n
All Accidents in A, C - NMore than 6 months or permanent handicapFatal
(% of all accidents )(% of all accidents )
2.377.146103.7423.008
100 %4.4 %0.13 %
Time off between 3 and 6 monthsFatal
(% of all accidents )(% of all accidents )
2.377.146129.1503.008
100 %5.4 %0.13 %
Time off between 3 and 6 months, more than 6 months or permanent hendicapFatal
(% of all accidents )(% of all accidents )
2.377.146232.8923.008
100 %9.8 %0.13 %
\n\n**National data**showed similar coefficients; a calculation for two EU Member States showed a coefficient \nof 27 for Germany (only permanent handicap) and 66 for France. 167 EU-OSHA used the severity data \nof Eurostat in its study on ‘The value of occupational safety and health and the societal costs of work- \nrelated injuries and diseases’ (2019). 168 \n\nAccording to the publication ‘Causes and circumstances of accidents at work in the EU’ (DG EMPL and \nEurostat), the types of work accidents**causing the longest average days of absence**are: ‘Slipping, \nstumbling and falling’ (46 absence days), followed by three more categories at the same level: ‘Loss of \ncontrol of machines or handheld tools’, by ‘Shock, fright, violence, aggression, threat, presence’,169 and \nby ‘Electrical problems, explosion and fire’ (all three types of accidents with an average of 38 days of \nabsence).170", + "page_start": 71, + "page_end": 71, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Indicator : Enforcement capacity ( descriptive )
Indicator : OSH statistics and surveys ( descriptive )
Imalliantiture levels, and expressional - rations [ expression of interventions of interventions ]
\n\nDuring this development, other indicators were discussed but**excluded due to complexity, necessary**\n**granularity**and**likely required effort**, for example, compensation and insurance systems (of work \naccidents and diseases), preventive capacities and services in and outside enterprises, training and \neducation capacities for OSH practitioners and professionals, OSH research capacities, OSH networks, \nmajor guidance and support offers for enterprises. \n\n***7.4.3 Relationship between preventive actions and outcomes***\n\nIt can be**difficult to demonstrate a causal relationship between working conditions and health**\n**and safety outcomes**, (outcomes = accidents including traffic and near-accidents, work-related \ndiseases or the level of wellbeing), that is, a reliable cause-effect relationship. Generally, in the field of \nsafety such a relation can be much easier identified (accidents ► injuries) than in the field of health, in \nalmost all cases an injury is an immediate consequence of an accident at work. \n\nScientists and practitioners have also often determined**clear connections between prevention**\n**actions and outcomes**, also between**certain exposures**and**recognised occupational diseases**, \nand between types and**quality of safety instructions and the occurrence of accidents**. 500 \n\nStill, there exist many**less visible and statistically hard-to-detect relations between working**\n**conditions, preventive actions and accidents, and health and workplace wellbeing**, and very \nspecific research and knowledge is needed to describe and analyse them more in detail. Most important \nare the confounding context factors, for example, the reduction of work accidents in a sector might be \nstrongly influenced by context developments, for example, economically induced sector shifts, or \nimportant technological changes.501 In addition, health and wellbeing are influenced by other aspects of \nworking conditions, like working time or contractual security. \n\nMoreover, due to effective preventive work,**extreme exposures at work**that in the past often led to a \nrecognised occupational disease**have been mitigated**, reduced or even eliminated by preventive \nmeasures and/or technological changes. Some examples are very loud noise, specific permanent tiring \npostures, very heavy loads, extreme dust and fume exposure, and reduction or elimination of well- \nstudied highly toxic chemical substances. In short, preventive measures — in particular if legally required \n— contributed to an overall reduction of the number of workers exposed to extremely ‘unhealthy’ \nworkplace exposures. \n\n***7.4.4 On the way to better evidence – major data, research gaps and open***\n\n***questions***\n\nThis report used EU-OSHA reports, foresight studies and reviews, and several EU-wide surveys and \nstatistics on working conditions, namely ESENER, EWCS, Eurostat’s statistical data, the Eurostat LFS \nand its Ad hoc modules, the Flash Eurobarometer, academic reviews, and data and reports from EU \ninstitutions or EU agencies like DG EMPL, DG SANTE, Eurofound, EIGE, FRA, Cedefop, ECHA and \nfrom international organisations like the ILO, WHO, OECD, ICOH, UN and UNEP. These statistics, \nsurveys and reports**mostly apply a harmonised EU-wide or international approach**to make the \nsituation in different countries comparable.", + "page_start": 138, + "page_end": 138, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**ICOH**stated in its Centennial Declaration: \n\n*‘The globalization process has not succeeded in equalising the conditions of work but in fact the opposite*\n*has occurred; the gaps are increasing. Poverty, inequality and under-development are closely*\n*associated with the poor safety, health and social conditions of work, as they are also linked with illiteracy,*\n*lack of education, poor access to health services and low or non-existent social protection.*323 \n\nInternational organisations like the ILO, WHO and UN have also taken up**the task to promote OSH**\n**worldwide**. The ILO has established a system of conventions; their implementation is monitored in the \nsignature states.324 The ILO has issued and decided on nine ‘Fundamental conventions’ that have been \nsigned by 92% of the ILO member states. 325 These fundamental conventions are: \n\n1. Freedom of Association and Protection of the Right to Organise Convention, 1948 (No. 87); \n\n2. Right to Organise and Collective Bargaining Convention, 1949 (No. 98); \n\n3. Forced Labour Convention, 1930 (No. 29) (and its 2014 Protocol); \n\n4. Abolition of Forced Labour Convention, 1957 (No. 105); \n\n5. Minimum Age Convention, 1973 (No. 138); \n\n6. Worst Forms of Child Labour Convention, 1999 (No. 182); \n7. Equal Remuneration Convention, 1951 (No. 100); \n8. Discrimination (Employment and Occupation) Convention, 1958 (No. 111); and \n\n9. (since 2022) Two conventions on Occupational Safety and Health, that is, C-155 Occupational \nSafety and Health Convention, 326 and C-187 Promotional Framework for OSH Convention.327 \n\nThe ILO also promotes the**‘Decent work’ approach**to improve working conditions, covering aspects \nlike fair income, social protection for families, better prospects for personal development and social \nintegration, and equal opportunities and treatment. In the frame of this approach, the ILO has developed \nflagship programmes like*‘Safety and Health for all’ 328*and the**‘Global Action for Prevention on**\n**Occupational Safety and Health’ (OSH-GAP)**, a programme to support and promote OSH globally. 329 \nIts priorities are: \n\n• \n*legal, regulatory and adjudicative frameworks that address and integrate OSH, including core*\n*OSH laws and technical regulations;*\n\n•*enforcement and compliance with OSH in workplaces, including public, private and non-*\n*governmental systems that operate independently or in concert;*\n\n•*employer and worker competencies that are necessary to achieve and sustain OSH at global,*\n\n*national and enterprise levels;*\n*social dialogue that supports OSH;*\n\n• \n•*public and private financial resources for investment in OSH;*\n•*occupational health services including public and private health services;*\n•*employment injury insurance programmes that support prevention of OSH fatalities, injuries*\n*and illnesses;*\n\n•*OSH professionals, institutions and networks;*\n•*OSH indicators and implementation of effective methodologies for OSH data collection; and*\n•*demand for the safety and health of workers and workplaces.*\n\nThe**International Social Security Association**(ISSA) developed the**Vision Zero initiative**. 330 ISSA \npromotes together with enterprises and many global OSH organisations this concept, aiming at the \ncomplete elimination of work accidents and occupational diseases. \n\nThe**UN**has developed a set of targets and indicators,**the Social Development Goals**(SDG).331 Target \n8 is dedicated to*‘Promote sustained, inclusive and sustainable economic growth, full and productive*\n*employment and decent work for all’.*Sub targets are: \n\n*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*", + "page_start": 115, + "page_end": 115, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "way by OSH legislation or OSH practice. The principle of employer responsibility for working conditions \nof workers is undermined or at least blurred in such situations. \n\nFuture solutions could focus on several aspects — a**new definition of ‘work’ or of ‘employment’,**\n**stronger individual responsibility, or extended state interventions to guarantee OSH**also in such \nworking and employment conditions. There are some examples of such solutions but to date most of \nthem focus on better information, that is, stronger individual responsibility. \n\n**Undeclared and illegal employment is scarcely visible**in the statistics. Due to the difficult conditions \nfor research, the overall OSH situation in these types of work is widely unknown; in case study-based \ninvestigative studies, the working conditions — including safety and health — for this group are mostly \nregarded as worse compared to workers with a regular work contract. It seems to be necessary to \nconsider different research and action initiatives for this type of work, also in collaboration with other \nstate supervising authorities. \n\nThe health data clearly show an ever-growing**share of work tasks that go along with or even require**\n**physical inactivity**. Inactive work is often characterised by permanent sitting combined with high \nrequirements for visual and mental focusing during work, for example, towards digital equipment or to \ntraffic situations. Serious indirect health consequences of such inactivity can be seen in the strong \nincrease in certain widespread diseases or disease-supporting factors, like obesity. \n\nEven 15 years after the enlargement of the EU in 2004,**significant differences between Member**\n**States**can still be observed regarding several working conditions. The data demonstrate that the worst \nstatus concerning physical risks, wellbeing, and expectations to do the job until the age of 60 — is almost \nalways present in eastern EU Member States, followed by southern Member States, all compared to the \nstatus in central, western and northern Member States**.**For psychosocial risks, it is just the other way \naround, these are more often reported in central, western and northern Member States. \n\n**International organisations complain about an unfair divide of OSH risks in globalised supply**\n**chains**, be it in mining, metallurgy, textile production, disposal of hazardous waste or other sectors. The \nILO decided in June 2022 to make OSH one of the Fundamental Principles and Rights at Work. In this \ncontext, 10 ILO conventions and instruments are considered now as fundamental, including two OSH \nconventions: the Occupational Safety and Health Convention, of 1981 (No. 155) and the Promotional \nFramework for Occupational Safety and Health Convention, of 2006 (No. 187). Ethical, fairness and \njustice considerations have led to more activities on decent, safe and healthy work in developing \ncountries and a fair share of risks at work in global supply chains. These are important initiatives, but \nuntil now they only slightly changed the overall situation when looking at the global scale of the issue.", + "page_start": 18, + "page_end": 18, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "147 In 2019, there were 3.141 million non-fatal accidents that resulted in at least four calendar days of absence \nfrom work and 3,408 fatal accidents in the EU27, a ratio of approximately 922 non-fatal accidents for every fatal \naccident, here \n148 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An \nexploratory semi-quantitative study – ‘What goes unreported goes unfixed’ (p. 20 ff). \n\n149 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex; Eurostat: Fatal Accidents at work by \nNACE Rev. 2 activity \n\n150 Detailed studies from hospitals in Denmark show that even a large share of serious work accidents (25%) \nresulting in amputations and fractions are not registered, see: LO Denmark, 2012: Underrapportering af \narbejdsulykker Table 14; and the Danish Working Environment Authority published a report concluding a total of \n50% in underreporting, here \n151 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An \nexploratory semi-quantitative study – ‘What goes unreported goes unfixed’ (p. 20ff). \n152 LFS Ad hoc module: Accidents at work and other work-related health problems (2020, 2013 and 2007) \n153 Eurostat: EU labour force survey 2020 module on accidents at work and other work-related health problems : \nassessment report : 2021 edition. The exact question is (p. 47):*‘Thinking of the year before [last day of reference*\n*week], have you had any accident at work? Accidents outside working hours and accidents during the journey*\n*from home to work or from work to home are excluded. However, accidents during a journey in the course of work*\n*are included.’*\n154 Eurostat, Statistics in focus, Theme 3 – 16/2001: Accidents at work in the EU 1998-1999, here \n155 ISCO-Groups: 1. Managers, 2. Professionals, 3. Technicians and Associate Professionals, 4. Clerical Support \nWorkers, 5. Services and Sales Workers, 6. Skilled Agricultural, Forestry and Fishery Workers, 7. Craft and \nRelated Trades Workers, 8. Plant and Machine Operators and Assemblers, 9. Elementary Occupations, 0. Armed \nForces Occupations. \n\n*156 Eurostat: Persons reporting an accident at work by sex, age and occupation*\n\n157 Eurostat, 2021: Self-reported accidents at work - key statistics \n\n158 Ibid. \n\n159 Agilis, 2015: Final statistical report on the quality assessment and statistical analysis of the 2013 Labour Force \nSurvey ad hoc module (p. 45) \n\n160 Eurostat, 2013: European Statistics on Accidents at Work (ESAW) - Summary methodology - 2013 edition \n(p. 6). \n161 Fatal work accidents are seen as a more reliable data source than non-fatal accidents. \n162 Eurostat: Fatal accidents at work by NACE Rev. 2 activity, Filter: Incidence rate. \n\n163 The OSH Barometer shows the ESAW data from Eurostat’s Fatal accidents in a column diagram showing the \nincidence rate per 100,000 workers for two periods, here \n\n164 Communication from the Commission to the European Parliament, the Council, the European Economic And \nSocial Committee and the Committee of Regions on the practical implementation of the provisions of the Health \nand Safety at Work Directives 89/391 (Framework), 89/654 (Workplaces), 89/655 (Work Equipment), 89/656 \n(Personal Protective Equipment), 90/269 (Manual Handling of Loads) and 90/270 (Display Screen Equipment), \nhere (p. 15). \n165 European Commission, 2009: Causes and circumstances of accidents at work in the EU (p. 101 and Table \nA1.6. p. 130).", + "page_start": 146, + "page_end": 146, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "80 EU-OSHA’s maintenance campaign revealed that maintenance and repair work has an accident risks far over \naverage. EU-OSHA, 2010: Safe maintenance in practice (p. 10):*‘Occupational accidents during maintenance*\n*work are numerous. Based on the data from several European countries, it is estimated that 10-15% of fatal*\n*accidents at work, and 15-20% of all accidents, are connected with maintenance*.’ \n81 No statistical data available for EU. \n82 Persons in employment by main place of work, frequency of working at other locations and working from home, \nLFS Ad hoc module: Work at home, percentage of Employed persons \n83 Eurostat: Working from home in the EU \n84 LFS Ad hoc module Work at home, percentage of Employed persons and LFS regular data collection Employed \npersons working from home as a percentage of the total employment \n85 EU-OSHA, 2021: Home-based teleworking and preventive occupational safety and health measures in \nEuropean workplaces: evidence from ESENER-3 \n86 Employed persons working from home as a percentage of the total employment, by sex, age and professional \nstatus (%), here \n87 There are more workers who spend most of their working time in private homes, e.g. technicians for \nmaintenance and repair of technical systems like heating water supply or electricity, or gardeners. According to \nthe ILO definition of domestic work they are not regarded as such. Care at home can be borderline if the care is \nmainly done for a few persons in a few homes. \n88 C189 European Alliance, 2021: Step up efforts towards decent work for domestic workers in the EU: 10th \nAnniversary of ILO Domestic Workers Convention, 2011 (No. 189) \nSee there in the introductory chapter the difficulties to achieve reliable figures. For more info: ILO, 2021: Making \ndecent work a reality for domestic workers: Progress and prospects ten years after the adoption of the Domestic \nWorkers Convention, 2011 (No. 189) \n89 EU-OSHA, 2020: Well-being at work in the service voucher sector in Belgium", + "page_start": 143, + "page_end": 143, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Table 17: Self-reported work accidents during the last 12 months (EU27) – LFS Ad hoc modules**\n\n\n \n \n \n \n [html]\n
UFS Ad hoc modulesSelf - reported work accidents200720132020
Percentage of respondents reporting one work accident3.20 %2.80 %2.30 %
Percentage of respondents reporting more than one work accident, Estimate EU - OSHA : 2.2 accidentsNot askedNot asked0.40 %
Persons in labour force ( EU - 27 )/ to ( former name : Active persons )184 m183 m194 m
- 2006- 2012
- 2019Extrapolated number of accidents ( in millions ) For 2020 also added 0.4 % with two or more accidents5.89 m5.12 m
1.94 × 2.3 = 4.461.94 × 0.4 = 0.785.24 mESAW Registered non - fatal accidents **( four days or more of obsence, 2006.2012.2019.6, 0.27 )**3.96 m2.94 m
3.14 m- 2006- 2012- 2019
\n\n\n\nIn 2007, 3.2% of the respondents reported an accident, in 2013 this fell to 2.8%, and in 2020 2.3% of \nthe ‘Person in labour force’, aged 15-64, responded with a ‘Yes’. This corresponds to a decline of 28% \nfrom 2007 to 2020. The decline of the total estimated number of work accidents shows a similar trend, \na 24% decrease from 5.89 million to 4.46 million (if the persons with more than one accident from the \n2020 survey are not taken into account to achieve a better comparability with 2007 and 2013). \n\nFor 2020,**an estimate of the number of accidents based on the Ad hoc module results in a figure**\n**of 5.24 million**. The number of ESAW-registered non-fatal accidents in 2019 was 3.14 million, \napproximately 60% of the self-reported. One reason for this difference surely is that the respondents to \nthe question in the LFS Ad hoc module**might refer to every work accident**, including those resulting \nin under four days of absence.153 \n\n**Estimations**\nEurostat itself estimated in 1999 that approximately 37% of the non-fatal accidents did not need to be \nregistered because they resulted in fewer than four days of absence:*‘Around 37% of accidents at work*\n*in the EU result in fewer than 4 days’ loss of work.’*154 .In the estimate above the figures are in a similar \nrange. The**LFS surveys also reveal strong differences between occupational groups**. The ISCO \ngroups 1-3 have less than half the accidents compared to groups 6-7 and 8-9.155", + "page_start": 67, + "page_end": 67, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", + "target_page": 1, + "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "**Reasoning and problem-solving**\n\nEarly researchers developed algorithms that imitated step-by-step reasoning that humans use when they \nsolve puzzles or make logical deductions.[13] By the late 1980s and 1990s, methods were developed for \ninformation, employing concepts from probability and \ndealing with uncertain or \neconomics.[14] \n\nincomplete \n\nMany of these algorithms are insufficient for solving large reasoning problems because they experience a \n\"combinatorial explosion\": They become exponentially slower as the problems grow.[15] Even humans \nrarely use the step-by-step deduction that early AI research could model. They solve most of their \nproblems using fast, intuitive judgments.[16] Accurate and efficient reasoning is an unsolved problem. \n\n**Knowledge representation**\nKnowledge representation and knowledge engineering[17] \nallow AI programs to answer questions intelligently and \nmake deductions about real-world facts. Formal knowledge \nrepresentations are used in content-based indexing and \nretrieval,[18] scene \ninterpretation,[19] clinical decision \nsupport,[20] knowledge discovery (mining \"interesting\" and \nactionable inferences from large databases),[21] and other \nareas.[22] \n\nA knowledge base is a body of knowledge represented in a \nform that can be used by a program. An ontology is the set \nof objects, relations, concepts, and properties used by a \nparticular domain of knowledge.[23] Knowledge bases need \nto represent things such as objects, properties, categories, \nand relations between objects;[24] situations, events, states, \nand time;[25] causes and effects;[26] knowledge about \nknowledge (what we know about what other people \nknow);[27] default reasoning (things that humans assume are true until they are told differently and will \nremain true even when other facts are changing);[28] and many other aspects and domains of knowledge. \n\nAn ontology represents knowledge as a set \nof concepts within a domain and the \nrelationships between those concepts. \n\nAmong the most difficult problems in knowledge representation are the breadth of commonsense \nknowledge (the set of atomic facts that the average person knows is enormous);[29] and the sub-symbolic \nform of most commonsense knowledge (much of what people know is not represented as \"facts\" or \n\"statements\" that they could express verbally).[16] There is also the difficulty of knowledge acquisition, \nthe problem of obtaining knowledge for AI applications.[c]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, \nXuyi Chen, Han Zhang, Xin Tian, Danxiang \nZhu, Hao Tian, and Hua Wu. 2019b. ERNIE: \nEnhanced Representation through Knowledge \nIntegration. arXiv:1904.09223 [cs]. James Yi Tian, Alexander P Kreuzer, Pai-Hung \nChen, and Hans-Martin Will. 2019. WaL- \nDORf: Wasteless Language-model Distillation", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "170. Clocksin & Mellish 2003, pp. 237–238, 252–255, 257, The Relation of Prolog to Logic; \n\nDaintith & Wright 2008, Logic Programming Languages (https://www.encyclopedia.com/com \nputing/dictionaries-thesauruses-pictures-and-press-releases/logic-programming-languages). \n\n171. O'Regan 2016, p. 49; Calderbank & Sloane 2001, pp. 768. \n172. Daintith & Wright 2008, Logic Gate (https://www.encyclopedia.com/computing/dictionaries-th \n\nesauruses-pictures-and-press-releases/logic-gate). \n\n173. Janssen & Zimmermann 2021, pp. 3–4; Partee 2016; King 2009, pp. 557–8; Aloni & Dekker \n\n2016, pp. 22–23 (https://books.google.com/books?id=ltSgDAAAQBAJ&pg=PT22). \n\n174. Warren 2020, 6. The Epistemology of Logic; Schechter. \n175. Warren 2020, 6. The Epistemology of Logic. \n176. Schechter. \n177. Gómez-Torrente 2019. \n178. Warren 2020, 6. The Epistemology of Logic; Gómez-Torrente 2019; Warren 2020, 1. What is \n\nConventionalism. \n\n179. Chua 2017, pp. 631–636; Wilce 2021; Putnam 1969, pp. 216–241. \n180. Lagerlund 2018. \n181. Spade & Panaccio 2019. \n182. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4), 1. \n\nIntroduction; Hintikka & Spade, Modern logic, Logic since 1900. \n\n183. Kline 1972, \"A major achievement of Aristotle was the founding of the science of logic\", p. \n\n53; Łukasiewicz 1957, p. 7; Liu & Guo 2023, p. 15. \n\n184. Lear 1980, p. 34. \n185. Knuuttila 1980, p. 71; Fisher, Gabbay & Vila 2005, p. 119. \n186. Berman 2009, p. 133. \n187. Frede; Groarke. \n188. Ewald 2019; Smith 2022. \n189. Hasse 2008; Lagerlund 2018. \n190. Washell 1973, pp. 445–50; Kneale & Kneale 1962, pp. 229, 266. \n191. Goodman 2003, p. 155. \n192. Goodman 1992, p. 188. \n193. Hintikka & Spade, Arabic Logic (https://www.britannica.com/topic/history-of-logic/Medieval-lo \n\ngic#ref65928). \n\n194. Iqbal 2013, pp. 99–115, The Spirit of Muslim Culture. \n195. Marenbon 2021, Introduction; 3. The Logical Text-Books; Hintikka & Spade. \n196. Hintikka & Spade; Hasse 2008; Spade & Panaccio 2019. \n197. Willman 2022; Rošker 2015, pp. 301–309. \n198. Sarukkai & Chakraborty 2022, pp. 117–8. \n199. Dasti, Lead section; 1b. Inference; Mills 2018, p. 121 (https://books.google.com/books?id=s \n\nGhqDwAAQBAJ&pg=PA121). \n\n200. Emmanuel 2015, pp. 320–2; Vidyabhusana 1988, p. 221. \n201. Chakrabarti 1976, pp. 554–563. \n202. Groarke; Haaparanta 2009, pp. 3–5 (https://books.google.com/books?id=0jXavKsArnIC&pg \n\n=PA3), 1. Introduction. \n\n203. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4); \n\nHintikka & Spade, Modern logic, Logic since 1900. \n\n204. Ewald 2019. \n205. Ewald 2019; Schreiner 2021, p. 22.", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia1.pdf" + }, + { + "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud-", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
q. Sometimes called a “ robopocalypse ”[ 299 ]
r. “ Electronic brain ” was the term used by the press around this time. EQTRECT3
s. Darriel Crevier wrote, \" the conterence is genorrally recognized as the official birthdate of the new science.\" 32.4 \" Russell and Nonyig called the conference \" the inception of artificial intelligence :\" 0.55
t. Russell and Nonigs wrote \" for the next 20 years the field would be clominated by these people and their students............................
u. Russell and Norvig wrote, “ It was astonishing wherever a computer did anything kind of smarteah ”...
v. The programs described are Arthur Samuel ' s checkers program for the IBM 70L Daniel Bobrow ' s STUDENT, Newell and Simon ' s Logic Theorica and Terry Winograrae ' s SHBDL1.
w. Russell and Nonvig write. “ in almost all cases, these early systems failed on more difficult problems ”[ 33 ]
x. Embodied approaches to ARTIT were championed by Hans Morave2 / 2RT and Rodney Brooks ( SSSIII ) and went by many names : Nouvelle ALTDevelopmental robotics [ 54 ]
y. Matters Worge arrate in The Adartic “ Wherenes for decaders, computer - science fields such as natural - target processing, compader vision, and robotics used externely different methods, now they all use a programming method calleie
z. Jack Clark wrote in Bloomberg : “ After a half - decade of quiet breakthroughts in artificial infeliogence, 2015 has been a landmark year. Computers are smater and learning baber than ever ”, and noted that the number of software projecte
aa. Nils Nilsson wrote in 256S : “ Simply put, there is wide disagreement in the field about what AI is all about 1999
ab. Dankei Crevier wrote that \" time has proven the accuracy and perceptiveness of some of Dreyfus ' s comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\"[ 7.9 ]
ac. Search presented thickefolistion of “ citrong all ” in 12090 EPH Toxaries ’ original fromtolation was “ The appropriately programmed computer really to a mind, in the sense that computers given the right programmes can be let - being an
", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] \n\n**Evaluating approaches to AI**\nNo established unifying theory or paradigm has guided AI research for most of its history.[aa] The \nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much \nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean \n\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics \nargue that these questions may have to be revisited by future generations of AI researchers. \n\n**Symbolic AI and its limits**\nSymbolic AI (or \"GOFAI\")[370] simulated the high-level conscious reasoning that people use when they \nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\" \ntasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems \nhypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent \naction.\"[371] \n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning, \nrecognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level \n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult.[372] \nPhilosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious \ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than \nexplicit symbolic knowledge.[373] Although his arguments had been ridiculed and ignored when they \nwere first presented, eventually, AI research came to agree with him.[ab][16] \n\nThe issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that \nhuman intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research \ninto symbolic AI will still be necessary to attain general intelligence,[375][376] in part because sub- \nsymbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a \nmodern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial \nintelligence attempts to bridge the two approaches. \n\n**Neat vs. scruffy**\n\n\"Neats\" hope that intelligent behavior is described using simple, elegant principles (such as logic, \noptimization, or neural networks). \"Scruffies\" expect that it necessarily requires solving a large number of \nunrelated problems. Neats defend their programs with theoretical rigor, scruffies rely mainly on \nincremental testing to see if they work. This issue was actively discussed in the 1970s and 1980s,[377] but \neventually was seen as irrelevant. Modern AI has elements of both.", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia3.pdf" + }, + { + "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. \n\nThere are a number of vendors emerging who are using the technology in very productive ways and are \nproviding the foundation for federated knowledge graphs that can scale to hundreds of millions of triples \nor more and provide a framework for all corporate data. I’ve listed several in the bibliography but those \nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve \nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz \nInc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the \ncommercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool \nto emulate a Linux server. \n\nI first started working with classification-based languages when I worked at the Information Sciences \nInstitute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US \nDepartment of Defense and their contractors. Since then, I’ve followed the progress of the technology, \nespecially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great \npromise in the technology. When I first discovered Protégé it was a great experience. It is one of the best \nsupported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more \ncorporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope \nthis tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.", + "page_start": 88, + "page_end": 88, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
SexTable
PTable
This :Table
Parameter101.1
StateTTTCT
\n\nDeductive reasoning in logic is the process of proving a new \nstatement (conclusion) from other statements that are given and assumed to be true (the premises).[81] \nProofs can be structured as proof trees, in which nodes are labelled by sentences, and children nodes are \nconnected to parent nodes by inference rules. \n\nGiven a problem and a set of premises, problem-solving reduces to searching for a proof tree whose root \nnode is labelled by a solution of the problem and whose leaf nodes are labelled by premises or axioms. In \nthe case of Horn clauses, problem-solving search can be performed by reasoning forwards from the \npremises or backwards from the problem.[82] In the more general case of the clausal form of first-order \nlogic, resolution is a single, axiom-free rule of inference, in which a problem is solved by proving a \ncontradiction from premises that include the negation of the problem to be solved.[83] \n\nInference in both Horn clause logic and first-order logic is undecidable, and therefore intractable. \nHowever, backward reasoning with Horn clauses, which underpins computation in the logic \nprogramming language Prolog, is Turing complete. Moreover, its efficiency is competitive with \ncomputation in other symbolic programming languages.[84] \n\nFuzzy logic assigns a \"degree of truth\" between 0 and 1. It can therefore handle propositions that are \nvague and partially true.[85] \n\nNon-monotonic logics, including logic programming with negation as failure, are designed to handle \ndefault reasoning.[28] Other specialized versions of logic have been developed to describe many complex \ndomains. \n\n**Probabilistic methods for uncertain reasoning**\n\nMany problems in AI (including in reasoning, planning, learning, perception, and robotics) require the \nagent to operate with incomplete or uncertain information. AI researchers have devised a number of tools \nto solve these problems using methods from probability theory and economics.[86] Precise mathematical \ntools have been developed that analyze how an agent can make choices and plan, using decision theory, \ndecision analysis,[87] and information value theory.[88] These tools include models such as Markov \ndecision processes,[89] dynamic decision networks,[90] game theory and mechanism design.[91]", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", + "target_page": 1, + "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK \n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. \n\n\n\n\n\n\n \n \n \n \n [html]\n
Text2Onto, 2005, [ 1 ]It is the reference in the field as it defines a representation - agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a CATE module.Ontologies can be exported in various formats. CATE system adds great visualisations. But it is not maintained since 2011.
OntoCain, 2010, [ 2 ]It focusives on multivord terms to construct a “ lexicalised contology ” by adapting an agglomerative clustering and an PCA method. It impliements & steps text preprocessing, concept extraction ( C / NC - value ). Takonomy construction, aIt considers only multiword terms and relies on WordNet and POS tags. It cloes not distinguish between terms and concepts and implements different adaptable approaches.
OntoLearn ( Reloaded ), 2O13, [ 3 ]It focuses on “ lexicalised ontologies ” and uses seed knowledge. It implements 5 steps : terminology extraction. hypermym graph construction, domain filtering of hypernyms. hypernym graph pruning and edge recovery.It relies on WordNet and PDS tags and does not distinguish between terms and concepts It implements different adaptable approaches.
\n\nMost ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. \n\n***C-value-based filtering***\n***Linguistic-based filtering***\n***TF-IDF value-based filtering***\n\nOur implementation is largely based on the**Python NLP**\n**library spaCy**. The text processing on spaCy helps us \nwork with data in**many different languages**while \nstaying flexible on the methods used. The only constraint \nis to end up with a list of**spaCy Doc objects**. \n\nTerm Extraction \n\n***Embedding-based similar term extraction***\n***ConceptNet synonym extraction***\n***WordNet synonym extraction***\n\nTerm Enrichment \n\n***ConceptNet-based extraction***\n***Grouping terms based on synonyms***\n***Term cooccurrences-based extraction***\n***Similarity-based extraction***\n*Formal concept Analysis*\n\n**OLAF**\n\nConcept/Relation \nExtraction \n\n***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "***Term subsumption algorithm***\n*Hierarchical clustering* Different**serialization techniques**can be used to export and \nleverage the learned ontology in an application system. \nHierarchisation \n\nWe designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". \n\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 \nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: \nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 \nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665–707. DOI: \n10.1162/COLI_a_00146 \nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, \nDatabase, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 \n\n**1 author:**", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Neumann, Bernd; Möller, Ralf (January 2008). \"On scene interpretation with description logics\". \n*Image and Vision Computing*.**26**(1): 82–101. doi:10.1016/j.imavis.2007.08.013 (https://doi. \norg/10.1016%2Fj.imavis.2007.08.013). S2CID 10767011 (https://api.semanticscholar.org/Co \nrpusID:10767011). \n\nNilsson, Nils (1995), \"Eyes on the Prize\",*AI Magazine*, vol. 16, pp. 9–17", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, \nXuyi Chen, Han Zhang, Xin Tian, Danxiang \nZhu, Hao Tian, and Hua Wu. 2019b. ERNIE: \nEnhanced Representation through Knowledge \nIntegration. arXiv:1904.09223 [cs]. James Yi Tian, Alexander P Kreuzer, Pai-Hung \nChen, and Hans-Martin Will. 2019. WaL- \nDORf: Wasteless Language-model Distillation", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Tiago Pimentel, Josef Valvoda, Rowan Hall Maud- \nslay, Ran Zmigrod, Adina Williams, and Ryan \nCotterell. 2020. Information-Theoretic Probing \nfor Linguistic Structure. arXiv:2004.03061 [cs]. \n\nNina Poerner, Ulli Waltinger, and Hinrich Schütze. \n2019. \nBERT is not a knowledge base \n(yet): Factual knowledge vs. name-based rea- \narXiv preprint \nsoning in unsupervised qa. \narXiv:1911.03681. Jiaqi Mu and Pramod Viswanath. 2018. All-but- \nthe-top: Simple and effective postprocessing for \nword representations. In International Confer- \nence on Learning Representations.", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. \n\nBERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. \n\nOut-of-the-box BERT is surprisingly brittle to \nnamed entity replacements: e.g. replacing names \nin the coreference task changes 85% of predictions \n(Balasubramanian et al., 2020). This suggests that \nthe model does not actually form a generic idea of \nnamed entities, although its F1 scores on NER prob- \ning tasks are high (Tenney et al., 2019a). Broscheit \n(2019) find that fine-tuning BERT on Wikipedia \nentity linking \"teaches\" it additional entity knowl- \nedge, which would suggest that it did not absorb all \nthe relevant entity information during pre-training \non Wikipedia. \n\n3.4 Limitations \n\nMultiple probing studies in section 3 and section 4 \nreport that BERT possesses a surprising amount of \nsyntactic, semantic, and world knowledge. How- \never, Tenney et al. (2019a) remarks, “the fact that \na linguistic pattern is not observed by our probing \nclassifier does not guarantee that it is not there, and \nthe observation of a pattern does not tell us how it \nis used.\" There is also the issue of how complex a \nprobe should be allowed to be (Liu et al., 2019a). If \na more complex probe recovers more information, \nto what extent are we still relying on the original \nmodel? \n\n3.3 World knowledge", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. \n\nThere are a number of vendors emerging who are using the technology in very productive ways and are \nproviding the foundation for federated knowledge graphs that can scale to hundreds of millions of triples \nor more and provide a framework for all corporate data. I’ve listed several in the bibliography but those \nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve \nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz \nInc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the \ncommercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool \nto emulate a Linux server. \n\nI first started working with classification-based languages when I worked at the Information Sciences \nInstitute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US \nDepartment of Defense and their contractors. Since then, I’ve followed the progress of the technology, \nespecially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great \npromise in the technology. When I first discovered Protégé it was a great experience. It is one of the best \nsupported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more \ncorporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope \nthis tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.", + "page_start": 88, + "page_end": 88, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "David Vilares, Michalina Strzyz, Anders Søgaard, \nand Carlos Gómez-Rodríguez. 2020. Parsing as \npretraining. In Thirty-Fourth AAAI Conference \non Artificial Intelligence (AAAI-20). Wei Wang, Bin Bi, Ming Yan, Chen Wu, Zuyi \nBao, Liwei Peng, and Luo Si. 2019a. Struct- \nBERT: Incorporating Language Structures into", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "The original BERT paper [39] showed the effectiveness of the \narchitecture and the pretraining technique by evaluating on the \nGeneral Language Understanding Evaluation (GLUE) benchmark \n[138], the Stanford Question Answering Datasets (SQuAD 1.1 and \n2.0) [108], and the Situations With Adversarial Generations bench- \nmark (SWAG) [155], all datasets designed to test language under- \nstanding and/or commonsense reasoning. BERT posted state of \nthe art results on all of these tasks, and the authors conclude by \nsaying that “unsupervised pre-training is an integral part of many \nlanguage understanding systems.” [39, p.4179]. Even before [39] \nwas published, BERT was picked up by the NLP community and \napplied with great success to a wide variety of tasks [e.g. 2, 149]. \nHowever, no actual language understanding is taking place in \nLM-driven approaches to these tasks, as can be shown by careful \nmanipulation of the test data to remove spurious cues the systems \nare leveraging [21, 93]. Furthermore, as Bender and Koller [14] \nargue from a theoretical perspective, languages are systems of \nsigns [37], i.e. pairings of form and meaning. But the training data \nfor LMs is only form; they do not have access to meaning. Therefore, \nclaims about model abilities must be carefully characterized. \n\n4.4 Curation, Documentation & Accountability \nIn summary, LMs trained on large, uncurated, static datasets from \nthe Web encode hegemonic views that are harmful to marginalized \npopulations. We thus emphasize the need to invest significant re- \nsources into curating and documenting LM training data. In this, \nwe follow Jo et al. [62], who cite archival history data collection \nmethods as an example of the amount of resources that should be \ndedicated to this process, and Birhane and Prabhu [18], who call for \na more justice-oriented data collection methodology. Birhane and \nPrabhu note, echoing Ruha Benjamin [15], “Feeding AI systems on \nthe world’s beauty, ugliness, and cruelty, but expecting it to reflect \nonly the beauty is a fantasy.” [p.1541] \n\n19~26% of papers sampled from ACL, NAACL and EMNLP since 2018 cite [39]. \n20Specifically, that the mutual information between the input and the meaning given \nthe output is zero — what Spärck Jones calls “the model of ignorance”. \n\nAs the late Karen Spärck Jones pointed out: the use of LMs \nties us to certain (usually unstated) epistemological and method- \nological commitments [124]. Either i) we commit ourselves to a \nnoisy-channel interpretation of the task (which rarely makes sense \noutside of ASR), ii) we abandon any goals of theoretical insight into \ntasks and treat LMs as “just some convenient technology” [p.7], or \niii) we implicitly assume a certain statistical relationship — known \nto be invalid — between inputs, outputs and meanings.20 Although \n\n\n \n \n \n \n [html]\n
TableFF insiluteParameterCellstrateTableAge, yearTableTable*SpeciesAge ( years )TableTable
", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is Text2Onto still updated nowadays?", + "target_page": 1, + "target_passage": "But it is not maintained since 2011.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**13.4 Software update**\n\nThis section describes the operations to update your Storwize V7000 software to V8.1. \n\nThe format for the software update package name ends in four positive integers that are \nseparated by dots. For example, a software update package might have the following name: \n\nIBM_2145_INSTALL_8.2.1.0 \n\n**13.4.1 Precautions before the update**\n\nThis section describes the precautions that you should take before you attempt an update. \n\n\n \n \n \n \n [html]\n
Important : Before you attempt any IBM Storwize V7000 code update, read and
understand the Storwize VT000 concurrent compatibility and code cross - reference matrix.
For more information, see this website and click Latest Storwize V7000 code.
\n\nDuring the update, each node in your Storwize V7000 clustered system is automatically shut \ndown and restarted by the update process. Because each node in an I/O Group provides an \nalternative path to volumes, use the Subsystem Device Driver (SDD) to make sure that all I/O \npaths between all hosts and storage area networks (SANs) work. \n\nIf you do not perform this check, certain hosts might lose connectivity to their volumes and \nexperience I/O errors when the Storwize V7000 node that provides that access is shut down \nduring the update process. You can check the I/O paths by using**datapath query**SDD \ncommands. \n\n**13.4.2 IBM Storwize V7000 update test utility**\n\nThe software update test utility is a Storwize V7000 software utility that checks for known \nissues that can cause problems during a Storwize V7000 software update. For more \ninformation about the utility, see this website. \n\nDownload the software update utility from this page where you can also download the \nfirmware. This procedure ensures that you receive the current version of this utility. You can \nuse the**svcupgradetest**utility to check for known issues that might cause problems during a \nsoftware update. \n\nThe software update test utility can be downloaded in advance of the update process. \nAlternately, it can be downloaded and run directly during the software update, as guided by \nthe update wizard. \n\nYou can run the utility multiple times on the same IBM Storwize V7000 system to perform a \nreadiness check-in preparation for a software update. Run this utility for a final time \nimmediately before you apply the software update to ensure that there were no new releases \nof the utility since it was originally downloaded.", + "page_start": 708, + "page_end": 708, + "source_file": "sg247938.pdf" + }, + { + "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025.", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "**Summary of changes**\n\nThis section describes the technical changes made in this edition of the book and in previous \neditions. This edition might also include minor corrections and editorial changes that are not \nidentified. \n\nSummary of Changes \nfor SG24-7938-07 \nfor Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1 \nas created or updated on November 7, 2019. \n\n\n \n \n \n \n [html]\n
• Hot Spare node • RAS line items
Changed information
• Added new GUI windows throughout
Table
", + "page_start": 20, + "page_end": 20, + "source_file": "sg247938.pdf" + }, + { + "text": "The operation is successful. If you do not specify task=\"update\" in the input XML file, you \nsee a message that indicates that the object exists, as shown in bold in Example 3-5. In this \nscenario, user User1 is not updated with the new query restriction. \n\n*Example 3-5 Output of updating the user without using task=“update”*\n\n\n \n \n \n \n [html]\n
ARS68221 Attempt ing_1ogin_for_userid' User1 '
on serverodserver \" Updatingapp1icationGroup,
", + "page_start": 99, + "page_end": 99, + "source_file": "sg246915.pdf" + }, + { + "text": "43messa41ITIBTaCUOTI WIIT ITIE CaCTIB441low bandwidth 37interctuster linkLU 780796_ImpImplementing the IBM Stonwize V7000 with IBM Spectrum Virtualize V8.2. 1", + "page_start": 817, + "page_end": 817, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 13-31 Drive firmware display \n\n**13.4.5 Manually updating the Storwize V7000**\n\nThis example assumes that you have an 8-node cluster of the IBM Storwize V7000 cluster, as \nlisted in Table 13-8. \n\nTable 13-8 The iogrp \n\n\n \n \n \n \n [html]\n
iogrp ( 0 )iogrp ( 1 )iogrp ( 2 )iogrp ( 3 )
node 1 ( config node )node 3node 5node 7
node 2node 4node 6node 8
", + "page_start": 720, + "page_end": 720, + "source_file": "sg247938.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
13.4Software update
68713.4. 1
Precautions before the update687
13.4. 2IBM Storwize V7000 update test utility
68713.4. 3
Updating your Storwize V7000 to V8.2. 1688
13.4. 4Updating IBM Storwize V7000 drive code.
69613.4. 5
Manually updating the Storwize V7000699
13.5Health checker feature
70113.6
Troubleshooting and fix procedures702
13.6. 1Managing event log
70313.6. 2
Running a fix procedure705
13.6. 3Event log details
70813.7
Monitoring710
13.7. 1Email notifications and the Call Home function.
71013.7. 2
Remote Support Assistance717
13.7. 3SNMP configuration
72213.7. 4
Syslog notifications724
13.8Audit log
72613.9
Collecting support information by using the GUI and CLI727
13.9. 1Collecting information by using the GUI...
72813.9. 2
Collecting logs using the CLI730
13.9. 3Uploading files to the Support Center
73213.1
Service Assistant Tool.734
AppeAppe
AppeStorw
7000 performance overview....................................................740
Pe740
IBM Spectrum Virtualize performance perspectives741
Performance monitoring.
742Col
742Real - time performance monitoring
743Performance data colle
", + "page_start": 13, + "page_end": 13, + "source_file": "sg247938.pdf" + }, + { + "text": "The installation and use of this utility is nondisruptive, and does not require restart of any IBM \nStorwize V7000 nodes. Therefore, there is no interruption to host I/O. The utility is only \ninstalled on the current configuration node. \n\nSystem administrators must continue to check whether the version of code that they plan to \ninstall is the latest version. For the most current information, see this website. \n\nThis utility is intended to supplement rather than duplicate the tests that are performed by the \nIBM Spectrum Virtualize update procedure (for example, checking for unfixed errors in the \nerror log). \n\nConcurrent software update of all components is supported through the standard Ethernet \nmanagement interfaces. However, most of the configuration tasks are restricted during the \nupdate process. \n\n**13.4.3 Updating your Storwize V7000 to V8.2.1**\n\nTo update the IBM Spectrum Virtualize software to V8.2.1, complete the following steps: \n\n1. Open a supported web browser and navigate to your cluster IP address. A login window \nopens (see Figure 13-11).", + "page_start": 709, + "page_end": 709, + "source_file": "sg247938.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**\n\n\n\n**1**\n\n**8**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "You can navigate directly to the events menu by clicking**View All Events**option or see each \nevent message separately by clicking the**Details**icon of the specific message, analyze the \ncontent, and eventually run the suggested fix procedure (see Figure 5-13). \n\nFigure 5-13 External storage connectivity loss \n\n**Running jobs and suggested tasks**\nThe middle icon in the notification area provides an overview of currently running tasks that \nare triggered by administrator. It also includes the suggested tasks that recommend that \nusers perform specific configuration actions. \n\nIn the example that is shown in Figure 5-14 on page 141, we did not yet define any hosts \nattached to the systems. Therefore, the system suggests that we do so and offers us direct \naccess to the associated host menu. Click**Run Task**to define the host according to the \nprocedure that is explained in Chapter 8, “Hosts” on page 317. If you do not want to define \nany host now, click**Not Now**and the suggestion message disappears.", + "page_start": 161, + "page_end": 161, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", + "target_page": 91, + "target_passage": "6,685", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**\n\n\n\n\n\n**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$7.3 billion \n\n**3. 2**\nPOSTPAID VOICE**46%**\n\n$7.3 \nDATA**44%**\n**3.1**\nBILLION \n\nEQUIPMENT**7%**\nPREPAID VOICE**3%**\n**3.0**", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Within wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS \nservice revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the \nincrease in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 \nsubscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the \nchurn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the \nafter sales support. Competition in the wireless industry continues to have a significant impact on the results of the \nCompany’s PCS operation. \n\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of \nthe other party’s network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the \ngeographic size of the Company’s network service area, the overall number of Sprint wireless customers, their travel \npatterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 \nper minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the \nCompany agreed to maintain the travel rate at $0.058 per minute through December 31, 2006. \n\n45 ■ 2003 ANNUAL REPORT", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The percentage of subscribers with smartphones increased to 75% of \nour overall postpaid subscriber base, compared to 69% at the end of \n2012. Smartphone subscribers typically generate significantly higher \nARPU and are less likely to churn. \nOther operating expenses (excluding retention spending), were down \nslightly from 2012, due to a continued focus on cost productivity \ninitiatives we are implementing across various functions. \n\n**Higher Adjusted Operating Profit**\nAdjusted operating profit was 3% higher this year compared to last \nyear because of continued growth of wireless data, our improvements \nin cost management and efficiency and lower volumes of hardware \nsales and upgrades. Adjusted operating profit margin as a percentage \nof network revenue increased this year to 46.8% from 45.6% in 2012. \n\n**SMARTPHONES AS A PERCENTAGE OF POSTPAID SUBSCRIBERS**\n(%) \n\n**2013** **75%**\n\n2012 69% \n\n2011 56% \n\n**WIRELESS ADJUSTED OPERATING PROFIT**\n(IN MILLIONS OF DOLLARS) \n\nThe decrease in prepaid subscriber net additions was mainly because of \nincreasing competition at the lower end of the wireless market where \nprepaid products are mainly sold. \n\n**2013** **$3,157**\n\n2012 $3,063 \n\n2011 $3,036", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Wireless revenues from the Company’s paging operation were $0.3 million, a decrease of $0.1 million as the local \ncustomer base increasingly chose alternative digital wireless services. Paging service subscribers declined by 7.8% in \n2002 from 3,190 subscribers to 2,940 subscribers. \n\nWithin wireline revenues, the Telephone operation contributed $22.5 million, an increase of $0.9 million, or 4.0%. \nTelephone access revenues were $10.9 million, an increase of $1.4 million or 14.8%. The growth in access revenues \nwas driven by a 38.4% increase in access minutes of use on the Company’s network and an increased percentage of \nminutes in the intrastate jurisdiction, where rates are higher than the interstate jurisdiction. On January 1, 2002 the \nFederal subscriber line charge (SLC) for residential customers increased from $3.50 to $5.00 per month. The SLC \n\n49 ■ 2003 ANNUAL REPORT", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Network revenue was higher this year compared to last year. This was \nthe net effect of: \n(cid:129) higher data revenue related to an increase in subscriber levels and \n\n**WIRELESS DATA REVENUE**\n(IN MILLIONS OF DOLLARS) \n\n**2013** **$3,175**\nhigher usage of wireless data services \n\n(cid:129) partially offset by our introduction of new lower priced US and \ninternational roaming plans and rates which offer consumers more \nvalue, and \n\n2012 $2,722 \n\n2011 $2,325 \n\n(cid:129) the continued adoption of customer friendly simplified plans, which \noften bundle in certain features like voicemail, caller ID and long \ndistance that we have charged for separately in the past. \n\nExcluding the decline in US and international roaming revenue this year, \nnetwork revenue would have increased 1%. \n**47%**\n\n2012 41% \n\n2011 35% \n\nData revenue was 17% higher \nthe \ncontinued penetration and growing use of smartphones, tablet devices \nand wireless laptops, which increased the use of e-mail, wireless, \nInternet access, text messaging and other wireless data services. Data \nrevenue represented approximately 47% of total network revenue this \nyear, compared to approximately 41% last year. \n\nthis year mainly because of \n\n*Lower Equipment Sales*\nEquipment sales (net of subsidies) include revenue from sales to: \n(cid:129) independent dealers, agents and retailers \n(cid:129) directly to subscribers through fulfillment by Wireless’ customer \nPostpaid churn was 1.24% this year, compared to 1.29% in 2012. The \nlower churn rate is partly attributable to the new simplified plans and \nthe roaming plans we introduced. \nservice groups, websites, telesales and corporate stores. \n\nRevenue from equipment sales was lower this year, mainly because \nfewer existing subscribers upgraded their devices and there were fewer \ngross activations. \n\nGross postpaid subscriber additions were 1.4 million this year, or 3% \nlower than last year, which reduced net postpaid subscriber additions to \n228,000, despite a lower postpaid churn. We believe the industry \ntransition from three year to two year plans resulting from the recent \nadoption of the Canadian Radio-television and Telecommunications \nCommission (CRTC) Wireless Code may have slowed our overall \nwireless subscriber growth from the second half of the year. See \n“Regulation in Our Industry” for more information on the Wireless \nCode. \n\n**Lower Operating Expenses**\nWe assess operating expenses in two categories: \n(cid:129) the cost of wireless handsets and equipment \n(cid:129) all other expenses involved in day-to-day operations, to service \nexisting subscriber relationships and attract new subscribers. \n\nThe cost of equipment was $50 million lower than last year, or 3%, \nmainly because fewer existing subscribers upgraded hardware and \nfewer new customers were added during the year as discussed above. \nWe activated and upgraded fewer devices compared to 2012. \n\nWe activated and upgraded approximately 2.7 million smartphones this \nyear, compared to approximately 2.9 million in 2012. Approximately \n34% of these were for new subscribers. The decrease was mainly \nbecause there was a 10% reduction in hardware upgrades by existing \nsubscribers during the year, which we also believe is at least partly due \nto the move from three to two year contracts and the associated pricing \nchanges. \n\nTotal customer retention spending (including subsidies on handset \nupgrades) was $939 million, 0.3% lower than last year. The reduction \nwas mainly because fewer existing subscribers upgraded their hardware \nas discussed above, which we partially attribute to the recent shift to \ntwo year contracts.", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "QUARTERLY TRENDS \nOur operating results generally vary from quarter to quarter because of \nchanges in general economic conditions and seasonal fluctuations, in \neach of our business segments, which have a material impact. As such, \none quarter’s operating results are not necessarily indicative of our \nresults in a subsequent quarter. Wireless, Cable and Media each have \nunique seasonal aspects to their businesses. \n**Operating Revenue**\nWireless network revenue was lower this quarter compared to the same \nperiod last year, mainly because of the recent introduction of lower \npriced roaming plans and pricing changes made over the past year \nprimarily associated with our new simplified plans. \n\nCable operating revenue was higher this quarter compared to the same \nperiod last year, mainly because of Internet growth and the acquisition \nof Mountain Cable, partially offset by a decline in television revenue \nwith competitive TV subscriber losses. \n\nFluctuations in net \nto quarter can also be \nattributed to losses on the repayment of debt, foreign exchange gains \nor losses, changes in the fair value of derivative instruments, other \nincome and expenses, impairment of assets and changes in income tax \nexpense. \n\nincome from quarter \n\nBusiness Solutions operating revenue was higher this quarter compared \nto the same period last year, mainly because we completed the \nacquisitions of Blackiron Data and Pivot Data Centres earlier this year, \ncombined with the continuing growth in on-net and next-generation \nservices. \n\n**Wireless**\nThe trends in Wireless revenue and adjusted operating profit reflect: \n(cid:129) the growing number of wireless voice and data subscribers \n(cid:129) decreased churn \n(cid:129) higher usage of wireless data \n(cid:129) higher handset subsidies as more consumers shift to smartphones \n(cid:129) a slight decrease in blended ARPU due to changes in wireless price \nMedia operating revenue was higher this quarter compared to the same \nperiod last year, mainly because of revenue growth at Sportsnet and \nhigher sales at The Shopping Channel. \n\n**Adjusted Operating Profit**\nWireless adjusted operating profit was higher this quarter compared to \nthe same period last year, mainly because of cost management and \nproductivity initiatives implemented across various areas, including cost \nof equipment, offset by reduced network revenue described above. \n\nCable adjusted operating profit was higher this quarter compared to \nthe same period last year because of the continued shift in our product \nmix towards higher margin Internet and phone products. \n\nMedia’s adjusted operating profit was lower this quarter compared to \nthe same period last year. The increase in Media’s operating revenue \nthis year was more than offset by the combined impacts of the lower \nnumber of games broadcast in the fourth quarter of 2012 resulting \nfrom the NHL lockout compared with having to broadcast more NHL \nhockey games in the fourth quarter of 2013 because of the compressed \n2013-2014 schedule associated with the upcoming winter Olympics. \nExcluding the impact of these items, Media’s consolidated adjusted \noperating profit would have increased by 22%.", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "2013 CONSOLIDATED REVENUE AND ADJUSTED OPERATING PROFIT PROFILE \n\n**REVENUE** **ADJUSTED OPERATING PROFIT**\n\nWIRELESS**57%**\n\n$12.7 $5.0 \n\nCABLE**27%**\n\nBILLION BILLION \n\nMEDIA**13%**\nBUSINESS SOLUTIONS**3%**\n\n\n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**\n\n\n\n\n \n \n \n \n [html]PRS\n
FINANCIAL HIGHLIGHTSCON GAAP
( IN AAIU./ ONS OF 0.0U... ARIS, ISKCIPT PYR. 3HAPIL. 5URSCINRIN AND ( MPL. 0YB : 0.41A )20132012201120102009Revenue
$12.706$12.486$12.346$
11.999$11.537Adjusted operating profit 14.9934.8344.739
4.6684.407Adjusted operating profit margin 139 %39 %38 %39 %
38 %Adjusted net income 11.7691.7811.7361.7041.569
Adjusted diluted earnings per share 13.423.413.172.942.53Pre - tax free cash flow per share 1
3.973.913.633.793.09Annualized dividend rate at year - end1.74
1.581.421.281.16Total assets23.60119.618
18.36217.03317.018Long - term debt ( includes current portion )13.34310.78910.034
8.6548.464Shareholders ’ equity4.6693.7683.5723.760
4.273Market capitalization of equity24.90323.34620.73619.43519.476
Wireless subscribers ( 000s )9.5039.4379.3358.9778.494Television subscribers ( 000s )
2.1272.2142.2972.3052.296Internet subscribers ( 000s )1.961
1.8641.7931.6861.619Cable telephony subscribers ( 000s )1.1531.074
1.0521.003937Number of employees28.02626.80128.745
27.97128.985
\n\n\n1 For a definition of these measures (which are non-GAAP) see “Non-GAAP Measures” in Management’s Discussion and Analysis. \n\n\n\n\n**ONE-YEAR COMPARATIVE TOTAL RETURN: 2013**\n\n**RCI.B**\n**ON TSX**\n\nTOTAL SHAREHOLDER RETURN \n\n**TEN-YEAR COMPARATIVE TOTAL RETURN: 2004 –2013**\n\n**RCI.B**\n**ON TSX**\n**470%** **11%**\n\nTSX \nTELECOM \nINDE X TSX \nTELECOM \nINDE X \n**11%**\n\nS&P \nTELECOM \nINDE X S&P \nTELECOM \nINDE X \n**119%** **11%**\n\nS&P/ TSX \nCOMPOSITE \nINDE X S&P/ TSX \nCOMPOSITE \nINDE X \n**115%** **13%**", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Income from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income \nfrom discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the \ntwo months of its operations in 2003. \n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a \nresult recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes. \n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating \nresults in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations. \n\n**DISCONTINUED OPERATIONS**\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s \nlocal customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December \n31, 2002. The decline was the result of competition with digital technologies and increased competition from national \ncarriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to \ntransform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the \npartnership to one of the minority partners. The agreement was signed in November 2002, and closing was February \n28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, \n$7.4 million and $6.7 million, respectively. \n\n**CONTINUING OPERATIONS**\n\n**2002 compared to 2001**\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million \nof wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 \nmillion or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%. \n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS \nservice revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which \ntotaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end. \n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, \nwas $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the \nCompany’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The \nrate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 \nthrough April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from \nOctober 1, 2001 through December 31, 2001. \n\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 \nmillion of rebates and discounts given at the time of sale, which became more pronounced during the year to meet \nindustry competition for subscriber additions and subscriber retention. \n\nIn accordance with Sprint’s requirements, the Company launched third generation (3G 1X) service in August 2002. \nThe impact of 3G 1X-network enhancements on revenues was not significant in 2002. \n\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the \nresult of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the \n82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Through Sprint, the Company began receiving revenue from wholesale resellers of wireless PCS service in late 2002. \nThese resellers pay a flat rate per minute of use for all traffic their subscribers generate on the Company’s network. \nThe Company’s cost to handle this traffic is the incremental cost to provide the necessary network capacity. \n\nThe Company faces vigorous competition in the wireless business as numerous national carriers are aggressively \nmarketing their services in the Company’s markets. The competitive landscape could change significantly depending \non the marketing initiatives of our competitors, or in the event of consolidation in the wireless industry. \n\nThe wireline business is made up of traditional telephony, cable TV, fiber network operations and the Company’s long- \ndistance resale business. These businesses operate in a defined geographic area. The Company’s primary service area \nfor the telephone, cable TV and long-distance business is Shenandoah County, Virginia. The county is a rural area in \nnorthwestern Virginia, with a population of approximately 37,300 inhabitants, which has increased by approximately \n6,000 since 1990. The potential for significant numbers of additional customers in the current operating area is limited. \n\nThe Company’s telephone subscriber count declined in the third quarter and again in the fourth quarter of 2003. \nMigration to wireless and DSL services are believed to be driving this change. Based on industry experience, the \nCompany anticipates this trend may continue for the foreseeable future. \n\nOther revenues include Internet services, both dial-up and DSL high-speed service. The Company has seen a decline in \ndial up subscriptions over the last year. The DSL service has grown over 100% in the last year driven by customer \ndesire for faster Internet connections. \n\nThe Company is facing competition for revenues it generates in the other lines of business, which will require the \nCompany to differentiate itself from other providers through its service levels and evolving technologies that are more \nreliable and cost effective for the customer. \n\n**CRITICAL ACCOUNTING POLICIES**\n\nThe Company relies on the use of estimates and makes assumptions that impact its financial condition and results. \nThese estimates and assumptions are based on historical results and trends as well as the Company's forecasts as to how \nthese might change in the future. Several of the most critical accounting policies that materially impact the Company's \nresults of operations include: \n\n***Allowance for Doubtful Accounts***\n\nEstimates are used in determining the allowance for doubtful accounts and are based on historical collection and write- \noff experience, current trends, credit policies, and the analysis of the accounts receivable by aging category. In \ndetermining these estimates, the Company compares historical write-offs in relation to the estimated period in which \nthe subscriber was originally billed. The Company also looks at the historical average length of time that elapses \nbetween the original billing date and the date of write-off and the financial position of its larger customers in \ndetermining the adequacy of the allowance for doubtful accounts. From this information, the Company assigns specific \namounts to the aging categories. The Company provides an allowance for substantially all receivables over 90 days old. \n\nThe allowance for doubtful accounts balance as of December 31, 2003, 2002 and 2001 was $0.5 million, $0.9 million \nand $0.7 million, respectively. If the allowance for doubtful accounts is not adequate, it could have a material adverse \neffect on our liquidity, financial position and results of operations.", + "page_start": 44, + "page_end": 44, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "*Higher Cable Telephony Revenue and Growing Subscriber Base*\nPhone revenue was 4% higher in 2013, compared to last year, the net \nresult of: \n(cid:129) higher phone subscriber base \n(cid:129) partially offset by higher promotional pricing activity. \n\n(cid:129) the cost of programming \n(cid:129) all other expenses involved in day-to-day operations, to service \nexisting subscriber relationships and attract new subscribers. \n\nOverall operating expenses increased slightly this year compared to last \nyear mainly due to: \n(cid:129) operating expenses generated by Mountain Cable which we acquired \n\nPhone subscribers grew 7% in 2013, compared to last year and represent: \n(cid:129) 54% of our television subscribers, compared to 49% last year \n(cid:129) 29% of the homes passed by our cable network, compared to 28% \nearlier this year \n\n(cid:129) higher investments in customer care and network \n(cid:129) partially offset by savings from improvements in our cost structure last year. \nand productivity and lower subscriber additions. \n\n*Lower Equipment Sales*\nEquipment sales include revenues generated from the sale of digital \ncable set-top terminals and Internet modems. \n\nLower equipment revenue this year compared to 2012 reflects the \nreduction of cable boxes sales versus rentals. \n\n**Higher Adjusted Operating Profit**\nAdjusted operating profit was 7% higher this year mainly the net result \nof higher service revenue, partially offset by higher operating expenses. \nThe increase in the adjusted operating profit margin reflects a \ncontinued shift in product mix to the higher margin Internet and phone \nproducts combined with efficiency gains. This increased our adjusted \noperating profit margin to 49.4%, compared to 47.8% in 2012. \n\n**Discontinued Operations**\nIn 2012, we closed our Video store operations, which offered DVD and \nvideo game rentals of equipment and sales in many of our corporate- \nowned retail locations. The results of the Video business were treated as \ndiscontinued operations for accounting and reporting purposes. See \n“Review of Consolidated Performance”. \nExcluding the results of Mountain Cable which we acquired in the \nsecond quarter of 2013: \n(cid:129) revenue would have been 2% higher this year compared to last year, \ninstead of 3% higher as reported \n(cid:129) adjusted operating profit would have been 5% higher this year \n\n**Higher Operating Expenses**\nWe assess Cable operating expenses in three categories: \n(cid:129) the cost of equipment sales (cable digital set-top box and Internet \n\ncompared to last year, instead of 7% higher as reported. \n\nmodem equipment) \n\n**CABLE TELEPHONY SUBSCRIBERS AND CABLE TELEPHONY**\n**PENETRATION OF HOMES PASSED %** **CABLE ADJUSTED OPERATING PROFIT**\n**AND CABLE ADJUSTED PROFIT MARGIN %** (IN THOUSANDS) (IN MILLIONS OF DOLLARS) \n\n**2013** **1,153** **2013** **$1,718** **29%** **49.4%**\n\n2012 1,074 2012 $1,605 28% 47.8% \n\n2011 1,052 2011 $1,549 28% 46.8%", + "page_start": 47, + "page_end": 47, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What has Rogers Communications done to improve its television platform?", + "target_page": 2, + "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "OUR STRATEGY \nTo achieve our vision and drive our future growth, we have six strategic objectives. We made significant progress this year \nagainst each of these, across all business segments. See “Key Highlights” for more detail about individual highlights. \n\n1. DELIVER DIFFERENTIATED END-TO-END \nCUSTOMER EXPERIENCES \nFocus on evolving our cross-device, multi-screen integration to enable \nseamless, \nreliable and easy-to-use product experiences anytime, \nanyplace and anywhere; on delivering a differentiated range of devices \nand device-related services; and on enabling greater integration of our \nmedia assets across screens. We launched new products, including Rogers Smart Home Monitoring, \nto customers in Ontario’s Golden Horseshoe area and Atlantic Canada. \nWe completed several strategic acquisitions this year that strengthened \nour offering of cable television, Internet and telephony services in the \nHamilton, Ontario area, established Business Solutions as a leader in \nCanadian data centre and hosting services and increased the reach of \nour television broadcast network to over 80% of Canadian households. \n\nCable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement \n\n4. STRENGTHEN THE CUSTOMER EXPERIENCE \nConstantly improve the experience that customers have using our \nproducts and services by making it easier for them, providing the tools \nand resources customers need to use our products with confidence, \nbeing attuned to our customers’ evolving needs and continuing to \nsimplify our product offerings. OUR PROGRESS IN 2013 \nWe continued to evolve our wireless offering this year, redesigning and \nsimplifying wireless offerings and pricing tiers, and introducing \nCanada’s first wireless Share Everything plan. We also launched a hybrid \nwireless home and small business phone solution that operates on our \nnational wireless network. \n\nOUR PROGRESS IN 2013 \nWe launched several new programs this year to improve the customer \nexperience, \nfor \nindividuals, families and small businesses, our “worry free” $7.99 per \nday US wireless data roaming plan, a new suite of simplified travel value \npacks of voice, text and data roaming, and the Rogers First Rewards \nloyalty program, and we received regulatory approval for the Rogers \ncredit card. Connected for Success, our new broadband Internet pilot \nproject \nis designed to provide affordable broadband Internet, \ncomputers and software to residents of Toronto Community Housing as \npart of the Rogers Youth Fund program. \n\nincluding Canada’s first Share Everything plans \n\n2. MAINTAIN INDUSTRY-LEADING NETWORKS \nReinforce our network’s reliability and speed to capture and monetize \nthe growth in data consumption by expanding our LTE network to a \nwider proportion of the Canadian population, continuing to increase \nbroadband Internet speeds, and further enhancing our TV platforms \nwith next generation features and functionality. \n\n5. IMPROVE PRODUCTIVITY AND COST STRUCTURE \nContinue to focus on cost-optimization initiatives and organizational \nefficiency by improving service delivery, reducing complexity, focusing \non fewer projects with more impact, managing expenses and working \nmore closely with key suppliers. \n\nOUR PROGRESS IN 2013 \nWe continued to expand our high speed wireless LTE 4G broadband \nnetwork this year, and offered the largest selection of LTE devices of \nany carrier in Canada. Our LTE 4G network was the first in Canada, \nwhich covered approximately 73% of the Canadian population at \nDecember 31, 2013.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "DELIVERING WHAT’S NEXT \n\n\n\n\n\n\nLEADING \nNEXT GENERATION \nNETWORKS MACHINE-TO- \nMACHINE \nCOMMUNICATIONS \n\n\n\nMOBILE \nCOMMERCE \n\n\n\n\nMOBILE \nSTREAMING \nTELEVISION \n\n\n\nHOME \nAUTOMATION \n\n\n\nDIGITAL MEDIA \n\n\n\n\n\n\n\nINNOVATION AND A DRIVE TO BE FIRST TO DELIVER THE \nMOST ADVANCED INFORMATION, COMMUNICATIONS, \nENTERTAINMENT AND TRANSACTION SERVICES, SOLUTIONS \nAND DEVICES ARE AT THE VERY CORE OF ROGERS. \n\nAs one of the first carriers in the world to offer the telecommunications \n“quadruple play” of wireless, television, Internet and telephony services \nover its own networks, few have more capabilities or success in enabling \nsubscribers to enjoy their experiences across multiple screens. \n\nRogers has a long history of firsts, including the first cellular call in Canada, \nthe world’s first high-speed cable modem service, the first digital cellular \nnetwork in North America, Canada’s first video-on-demand and mobile \nTV services, the first HSPA and LTE networks and the first to offer iPhone, \nAndroid, BlackBerry and Windows 8 in Canada. With the combination of \nour advanced next-generation national wireless network, our powerful \nbroadband cable infrastructure and our category-leading media assets, \nwe are in a unique position to help Canadians to live like never before.", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**\n\nWIRELESS SEGMENT \n\nRogers Wireless provides wireless voice and data communications services across \nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido \nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the \nonly national carrier operating on the combined global standard GSM/HSPA+/LTE \ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless \nservices, and provides customers with the best and latest wireless devices and \napplications and the fastest network speeds. Rogers Wireless also provides \nseamless wireless roaming across the U.S. and more than 200 other countries, \nand is the Canadian leader in the deployment of mobile commerce and machine- \nto-machine communications. \n\n\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS \n\nRogers Cable is a leading Canadian cable services provider, whose service \nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and \nNewfoundland representing approximately 30% of the Canadian cable market. \nOur advanced digital hybrid fibre-coax network provides market leading high- \nspeed broadband Internet access speeds, the most innovative selection of digital \ntelevision and online viewing and telephony services to millions of residential \nand small business customers. Together with Rogers Business Solutions, it also \nprovides scalable carrier-grade business telecom, networking, hosting and \nmanaged data services, and IP connectivity and solutions to medium and large \nenterprise, government and carrier customers. \n\n\n\nMEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border \n\n**Wireless**provides wireless voice and data communication services, \nincluding machine to machine to both consumer and enterprise \nbusinesses, governments \nservice \nproviders.**Cable**provides voice and data communications, home \nmonitoring, \nto both \nconsumers and businesses.**Business Solutions**provides voice and data \ncommunications and advanced services including data centre based \nsolutions and cloud computing services to a wide range of medium to \nlarge businesses, \nincluding other service providers, and government \neither wirelessly or over our terrestrial network. Revenue generated \nfrom these segments is generally based on monthly subscription and \nnetwork usage rates. Costs include attracting, setting-up and retaining \ncustomers, content, and the costs of upgrading and maintaining the \nunderlying network. \n\nand other telecommunications \n\n**Media**provides television and radio broadcasting services to end \ncustomers over both traditional broadcast networks and new digital \nnetworks as well as multi-platform shopping, consumer and trade \npublications and sports media and entertainment experiences, primarily \nthrough its ownership of the Toronto Blue Jays. Revenue is largely \ndriven by advertising and, in the case of TV broadcasting and publishing \nby additional revenues from monthly subscriptions. Revenue is also \ngenerated by the sale of merchandise and event tickets. Costs include \nsports programming, broadcast content (including TV studios, writers \nand on air and on field talent), the cost of merchandise and the \nproduction costs associated with each medium. \n\nOur wireless network is currently one of the most extensive and \nadvanced independent high-speed wireless data networks in Canada, \ncapable of supporting wireless services on smartphones, \ntablets, \ncomputers and a broad variety of machine-to-machine and specialized \ndevices. We built the first Long Term Evolution (LTE) high speed \nnetwork in Canada, reaching nearly 73% of the Canadian population \nat December 31, 2013. We also have roaming agreements with \ninternational carriers in more than 200 other countries, including 5 LTE \nroaming operators and have network sharing arrangements with several \ncarriers in Canada. \n\nWe report our results of operations in four segments, which reflect how \nwe manage our operations and measure our performance. \nOur expansive fibre and hybrid fibre coaxial \ninfrastructure delivers \nservices to consumers and businesses in Ontario, New Brunswick and", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**\n\nFOUR BUSINESS SEGMENTS \nWe report our results of operations in four segments. \n\n\n \n \n \n \n [html]\n
WirelessWireless telecommunications operations for consumers and businesses
CableCable telecommunications operations, including cable television, Intermet and cable telephony for Canadian consumers and businesses.
Business SolutionsNetwork connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud - based services for medium and large Canadian businesses, governments, and other telecommunications provider
MediaA diversified portfolio of media properties, including television and radio broadcasting, digital media, multi - platform shopping, publishing and sports media and entertanment
", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "CONNECTED HOME \n\n\n\n\n\n\n\nHOME \nTELEPHONY \n\n\n\nWHOLE HOME \nPVR \n\n\n\nBROADBAND \nINTERNET \n\n\n\nANY SCREEN \nSTREAMING TV \n\n\nCATEGORY- \nLEADING MEDIA \nCONTENT \n\n\n\nE-MAIL \n& MESSAGING \n\n\n\n\n\n\n\nROGERS CONTINUES TO DEFINE HOW FAMILIES COME \nTOGETHER AND CONNECT WITH THEIR WORLD. MILLIONS OF \nCANADIANS DEPEND ON ROGERS TO KEEP THEM INFORMED, \nCONNECTED AND ENTERTAINED WITH A COMBINATION OF \nTHE FASTEST INTERNET SPEEDS AND THE MOST INNOVATIVE \nTELEVISION, TELEPHONY AND HOME MONITORING \nSOLUTIONS AVAILABLE. \n\nThe core of Rogers connected home strategy is to provide customers \nwith the fastest broadband connections, together with the ability to \nseamlessly shift – to shift time, to shift screens and to shift places so they \naccess what they want, when they want, on the screen of their choice. \n\nRogers offers the best in on-demand, sports, movies, specialty, episodic \nand multicultural programming. Customers can schedule, pause, rewind", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "BUSINESS SOLUTIONS \n\n\n\n\n\n\n\nBUSINESS \nTELEPHONY \n\n\n\nADVERTISING \nMEDIA SOLUTIONS \n\n\n\nWIRELESS \nVOICE & DATA \n\n\n\nMOBILE INTERNET \n& E-MAIL ADVANCED \nM2M SOLUTIONS DATA CENTRE & \nCLOUD SERVICES \n\n\n\n\n\n\n\n\n\n\n\nIN TODAY’S FAST-PACED DIGITAL WORLD OF BUSINESS, \nTHE ABILITY TO COMMUNICATE AND ACCESS INFORMATION \nANYTIME, ANYPLACE IS A COMPETITIVE ADVANTAGE THAT \nBUSINESS PROFESSIONALS LOOK TO ROGERS TO PROVIDE. \nROGERS ENSURES THE INFORMATION THAT DRIVES \nCOMMERCE FORWARD IS ALWAYS ON HAND AND HELPS \nBUSINESSES DEFINE HOW TO WIN IN THE DIGITAL WORLD. \n\nRogers provides a single reliable source for advanced business-focused \nvoice, Internet and data networking solutions designed specifically for \nthe most demanding of wireless and wired commercial requirements. \n\nBusinesses across Canada rely on Rogers for its national wireless \nnetwork, world-leading LTE technology, seamless global connectivity, \nand the broadest array of wireless applications and devices, because \nthey know that their mobility and remote connectivity needs are always \ncovered with the most advanced solutions available. Because Rogers", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "LEADING CONTENT \n\n\n\n\n\n\nNATIONAL \nRADIO \nPORTFOLIO \n\n\nCITY NATIONAL \nTELEVISION \nNETWORK \n\n\n\nLEADING \nSPORTSNET TV \nFRANCHISE \n\n\nTELEVISED \nSHOPPING \nNETWORK \n\n\nTORONTO \nBLUE JAYS \nBASEBALL TEAM \n\n\n\nOMNI \nMULTICULTURAL \nNETWORK \n\n\n\n\n\n\n\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "WIRELESS EVERYWHERE \n\n\n\n\n\n\nCANADA’S \nFASTEST WIRELESS \nNETWORK \nSMARTPHONES \n& TABLETS \n\n\n\n\n\nWIRELESS \nVOICE & DATA \n\n\n\nSOCIAL MEDIA \n& NETWORKING \n\n\n\nANYWHERE \nTV VIEWING \n\n\n\nMOBILE \nINTERNET \n\n\n\n\n\n\n\nROGERS KNOWS THAT NO MATTER WHERE ITS CUSTOMERS \nARE, BEING IN TOUCH WITH FRIENDS, FAMILY AND \nCOLLEAGUES MAKES THEIR LIVES MORE CONNECTED. \nAND BEING CONNECTED ANYTIME, ANYWHERE, TO THE \nINFORMATION AND ENTERTAINMENT THAT MATTERS \nMOST MAKES LIFE EASIER AND MORE ENJOYABLE. \n\nThat’s why, in the city and around the world, millions of Canadians rely \non Rogers to keep them connected, and to put the Internet in their \npockets with the most advanced wireless services, blistering-fast \nspeeds, and seamless coverage. And they do so with the flexibility and \npeace of mind that comes with Rogers Share Everything plans which \nallow families and businesses to share wireless data between their \nwireless devices and add additional devices to their plans.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", + "target_page": 39, + "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border \n\n**Wireless**provides wireless voice and data communication services, \nincluding machine to machine to both consumer and enterprise \nbusinesses, governments \nservice \nproviders.**Cable**provides voice and data communications, home \nmonitoring, \nto both \nconsumers and businesses.**Business Solutions**provides voice and data \ncommunications and advanced services including data centre based \nsolutions and cloud computing services to a wide range of medium to \nlarge businesses, \nincluding other service providers, and government \neither wirelessly or over our terrestrial network. Revenue generated \nfrom these segments is generally based on monthly subscription and \nnetwork usage rates. Costs include attracting, setting-up and retaining \ncustomers, content, and the costs of upgrading and maintaining the \nunderlying network. \n\nand other telecommunications \n\n**Media**provides television and radio broadcasting services to end \ncustomers over both traditional broadcast networks and new digital \nnetworks as well as multi-platform shopping, consumer and trade \npublications and sports media and entertainment experiences, primarily \nthrough its ownership of the Toronto Blue Jays. Revenue is largely \ndriven by advertising and, in the case of TV broadcasting and publishing \nby additional revenues from monthly subscriptions. Revenue is also \ngenerated by the sale of merchandise and event tickets. Costs include \nsports programming, broadcast content (including TV studios, writers \nand on air and on field talent), the cost of merchandise and the \nproduction costs associated with each medium. \n\nOur wireless network is currently one of the most extensive and \nadvanced independent high-speed wireless data networks in Canada, \ncapable of supporting wireless services on smartphones, \ntablets, \ncomputers and a broad variety of machine-to-machine and specialized \ndevices. We built the first Long Term Evolution (LTE) high speed \nnetwork in Canada, reaching nearly 73% of the Canadian population \nat December 31, 2013. We also have roaming agreements with \ninternational carriers in more than 200 other countries, including 5 LTE \nroaming operators and have network sharing arrangements with several \ncarriers in Canada. \n\nWe report our results of operations in four segments, which reflect how \nwe manage our operations and measure our performance. \nOur expansive fibre and hybrid fibre coaxial \ninfrastructure delivers \nservices to consumers and businesses in Ontario, New Brunswick and", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**\n\nWIRELESS SEGMENT \n\nRogers Wireless provides wireless voice and data communications services across \nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido \nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the \nonly national carrier operating on the combined global standard GSM/HSPA+/LTE \ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless \nservices, and provides customers with the best and latest wireless devices and \napplications and the fastest network speeds. Rogers Wireless also provides \nseamless wireless roaming across the U.S. and more than 200 other countries, \nand is the Canadian leader in the deployment of mobile commerce and machine- \nto-machine communications. \n\n\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS \n\nRogers Cable is a leading Canadian cable services provider, whose service \nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and \nNewfoundland representing approximately 30% of the Canadian cable market. \nOur advanced digital hybrid fibre-coax network provides market leading high- \nspeed broadband Internet access speeds, the most innovative selection of digital \ntelevision and online viewing and telephony services to millions of residential \nand small business customers. Together with Rogers Business Solutions, it also \nprovides scalable carrier-grade business telecom, networking, hosting and \nmanaged data services, and IP connectivity and solutions to medium and large \nenterprise, government and carrier customers. \n\n\n\nMEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "LEADING CONTENT \n\n\n\n\n\n\nNATIONAL \nRADIO \nPORTFOLIO \n\n\nCITY NATIONAL \nTELEVISION \nNETWORK \n\n\n\nLEADING \nSPORTSNET TV \nFRANCHISE \n\n\nTELEVISED \nSHOPPING \nNETWORK \n\n\nTORONTO \nBLUE JAYS \nBASEBALL TEAM \n\n\n\nOMNI \nMULTICULTURAL \nNETWORK \n\n\n\n\n\n\n\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "OUR STRATEGY \nTo achieve our vision and drive our future growth, we have six strategic objectives. We made significant progress this year \nagainst each of these, across all business segments. See “Key Highlights” for more detail about individual highlights. \n\n1. DELIVER DIFFERENTIATED END-TO-END \nCUSTOMER EXPERIENCES \nFocus on evolving our cross-device, multi-screen integration to enable \nseamless, \nreliable and easy-to-use product experiences anytime, \nanyplace and anywhere; on delivering a differentiated range of devices \nand device-related services; and on enabling greater integration of our \nmedia assets across screens. We launched new products, including Rogers Smart Home Monitoring, \nto customers in Ontario’s Golden Horseshoe area and Atlantic Canada. \nWe completed several strategic acquisitions this year that strengthened \nour offering of cable television, Internet and telephony services in the \nHamilton, Ontario area, established Business Solutions as a leader in \nCanadian data centre and hosting services and increased the reach of \nour television broadcast network to over 80% of Canadian households. \n\nCable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement \n\n4. STRENGTHEN THE CUSTOMER EXPERIENCE \nConstantly improve the experience that customers have using our \nproducts and services by making it easier for them, providing the tools \nand resources customers need to use our products with confidence, \nbeing attuned to our customers’ evolving needs and continuing to \nsimplify our product offerings. OUR PROGRESS IN 2013 \nWe continued to evolve our wireless offering this year, redesigning and \nsimplifying wireless offerings and pricing tiers, and introducing \nCanada’s first wireless Share Everything plan. We also launched a hybrid \nwireless home and small business phone solution that operates on our \nnational wireless network. \n\nOUR PROGRESS IN 2013 \nWe launched several new programs this year to improve the customer \nexperience, \nfor \nindividuals, families and small businesses, our “worry free” $7.99 per \nday US wireless data roaming plan, a new suite of simplified travel value \npacks of voice, text and data roaming, and the Rogers First Rewards \nloyalty program, and we received regulatory approval for the Rogers \ncredit card. Connected for Success, our new broadband Internet pilot \nproject \nis designed to provide affordable broadband Internet, \ncomputers and software to residents of Toronto Community Housing as \npart of the Rogers Youth Fund program. \n\nincluding Canada’s first Share Everything plans \n\n2. MAINTAIN INDUSTRY-LEADING NETWORKS \nReinforce our network’s reliability and speed to capture and monetize \nthe growth in data consumption by expanding our LTE network to a \nwider proportion of the Canadian population, continuing to increase \nbroadband Internet speeds, and further enhancing our TV platforms \nwith next generation features and functionality. \n\n5. IMPROVE PRODUCTIVITY AND COST STRUCTURE \nContinue to focus on cost-optimization initiatives and organizational \nefficiency by improving service delivery, reducing complexity, focusing \non fewer projects with more impact, managing expenses and working \nmore closely with key suppliers. \n\nOUR PROGRESS IN 2013 \nWe continued to expand our high speed wireless LTE 4G broadband \nnetwork this year, and offered the largest selection of LTE devices of \nany carrier in Canada. Our LTE 4G network was the first in Canada, \nwhich covered approximately 73% of the Canadian population at \nDecember 31, 2013.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "programs based on what customers are viewing, helping Canadians \nto explore and uncover more programming that appeals to their \nindividual tastes. \n\nWIRELESS \n(cid:129) Canada’s first and fastest wireless LTE 4G broadband network \ncontinued its expansion. Our network covered approximately 73% of \nthe Canadian population at December 31, 2013, while continuing to \noffer the largest selection of LTE devices of any carrier in Canada. We \nwere also the first carrier in North America and one of the first in the \nworld to offer international LTE roaming to wireless customers. \n\nBUSINESS SOLUTIONS \n(cid:129) Following the acquisition of Blackiron and Pivot Data Centres this \nyear, Business Solutions announced it is expanding its hosting and \ncolocation business in Western Canada through a newly expanded \ndata centre in Edmonton and a new Western Canada flagship data \ncentre in Calgary. \n\n(cid:129) Our wireless offerings and pricing tiers were simplified, reducing \ncomplexity and service times for our sales and support teams and \nadding customer value. These innovations include Canada’s first \ncomplete wireless Share Everything plan which allows individuals, \nfamilies and small businesses to share wireless data, unlimited \nnationwide talk and text and calling features across 1 to 10 wireless \ndevices. \n\n(cid:129) SIP Trunking, a new IP-based voice solution, was announced for \nenterprises designed to complement our fibre-based Internet and \nWAN connectivity services. Merging voice services with a business \ndata network, SIP Trunking solutions dynamically allocate bandwidth \nas needed to support voice and/or data needs depending upon \ncapacity requirements during peak hours and also provide a platform \nfor next generation IP-based video, mobile and productivity \napplications and services. \n\n(cid:129) Our “worry free” $7.99 per day US wireless data roaming plan was \nlaunched, with twice the daily data capacity (50 MB) typically used \ndaily by consumers for wireless Internet, as well as enhanced voice, \ntext and data roaming value packages. \n\n(cid:129) A hybrid wireless home and small business phone solution was \nlaunched, that operates on our national wireless network. The service \nis available in regions outside Rogers’ cable territories and offers a \ntraditional home or office phone service and features without the \nneed for a landline or Internet connection. \n\nMEDIA \n(cid:129) Exclusive NHL 12-year licensing agreement to broadcast national NHL \ngames beginning with the 2014-2015 season was signed. The \nagreement grants Rogers the exclusive distribution of all national live \nand in-progress regular season and playoff games within Canada, in \nmultiple languages, across all platforms. We executed separate \nagreements to sublicense certain of these broadcasting rights to TVA \nSports and CBC. \n(cid:129) The M2M World Alliance, an organization comprised of eight leading \ninternational mobile operators including Rogers, demonstrated a \nsingle global SIM card which makes it easier to deploy connected \ndevices in multiple countries and expected to drive further growth for \nour machine-to-machine business. \n\n(cid:129) Sportsnet 360 was launched, which is comprised of the rebranded \ntheScore assets. The acquisition of theScore received final regulatory \napproval in the first half of this year. \nCABLE \n(cid:129) Acquisition of Mountain Cable, Shaw Communications’ (Shaw) cable \n\n(cid:129) Sportsnet announced a 10-year partnership extension with the \nVancouver Canucks through the 2022-2023 NHL seasons, continuing \na 14-year network tradition as the regional television broadcaster of \nCanucks hockey. The new agreement features a comprehensive suite \nof multimedia rights \nincluding television, online and mobile, \ndelivering up to 60 regular season Vancouver Canucks games each \nseason. Sportsnet is also the official regional television broadcast \nrights holder for the Toronto Maple Leafs, Calgary Flames and \nEdmonton Oilers.", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**\n\nFOUR BUSINESS SEGMENTS \nWe report our results of operations in four segments. \n\n\n \n \n \n \n [html]\n
WirelessWireless telecommunications operations for consumers and businesses
CableCable telecommunications operations, including cable television, Intermet and cable telephony for Canadian consumers and businesses.
Business SolutionsNetwork connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud - based services for medium and large Canadian businesses, governments, and other telecommunications provider
MediaA diversified portfolio of media properties, including television and radio broadcasting, digital media, multi - platform shopping, publishing and sports media and entertanment
", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "WIRELESS \n\nROGERS IS CANADA’S LARGEST WIRELESS \nCOMMUNICATIONS SERVICE PROVIDER \nAs at December 31, 2013, we had: \n(cid:129) approximately 9.5 million subscribers \n(cid:129) approximately 34% share of the Canadian wireless market. \n\nDATA**44%**\n\nPRODUCTS AND SERVICES \nin innovative new wireless network \nRogers is a Canadian leader \ntechnologies and services. We provide wireless voice and advanced \nhigh-speed data communication services to subscribers across Canada \nunder the Rogers, Fido and Chatr brands, and provide our customers \nwith the best and latest wireless devices and applications including: \n(cid:129) mobile high speed Internet access \n(cid:129) wireless voice and enhanced voice features \n(cid:129) wireless home phone \n(cid:129) device protection \n(cid:129) text messaging \n(cid:129) e-mail \n(cid:129) global voice and data roaming \n(cid:129) machine-to-machine solutions \n(cid:129) advanced business solutions \n(cid:129) Suretap mobile wallet \n(cid:129) Rogers AnyPlace TV \n(cid:129) Rogers One Number \n(cid:129) Rogers First Rewards Loyalty Program. \n\nEXTENSIVE WIRELESS NETWORK \nRogers has one of the most extensive and advanced wireless networks \nin Canada: \n(cid:129) supports wireless services on smartphone, tablets, computers and a \nbroad variety of M2M, mobile commerce, retail point of sale and \nother specialized devices \n(cid:129) the first LTE high-speed network in Canada, which reached more \nthan 73% of the Canadian population at December 31, 2013 \n(cid:129) voice and data roaming agreements with international carriers in \nmore than 200 countries \n(cid:129) network sharing arrangements with several regional wireless \n\noperators in Canada. \n\nWe are continuously enhancing our IP service infrastructure for all of \nour wireless services. Advances in technology have transformed how \nour customers interact and how they use the variety of tools that are \navailable to them in their personal and professional lives. Technology \nhas also changed the way businesses operate. \nNATIONAL DISTRIBUTION \nWe distribute our wireless products using various channels including: \n(cid:129) independent dealer networks \n(cid:129) company-owned Rogers, Fido and Chatr retail stores \n(cid:129) customer self-serve rogers.com, fido.ca, chatrwireless.com, ecommerce \nsites \n\nNew technologies allow us to offer new services, such as Rogers One \nNumber, which makes enhanced wireless \nservices available to \nsubscribers on their computer, tablet, or smartphone and can be used \nas an alternative to fixed line telephony. Users enjoy the same services \nand features across the coverage area, \nthanks to the seamless \nintegrated nature of the Rogers network and those of our roaming and \nnetwork sharing partners. \n\n(cid:129) Rogers call centres and outbound telemarketing \n(cid:129) major retail chains and convenience stores.", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "ROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**A**\n**T**\n**A**\n**G**\n**L**\n**A**\n**N**\n**C**\n**E**\n\n**RoRogegersrs CCommumuninicacations Inc..**iiis s s aa a didiversified Canadian telecommunicationss anananddd memm dia cocompmpmpanaany.y. \nRoRoRogegegersrsrs Wireelelessss iiis s CaC nadaa’s’ss lllaarargeg st wireless voice and data telecommunications seervrvrvicicicesese provideder r r \nanananddd tht e cocoununntrtrtry’y’ss onlyy nnnatatatioioi nal carrier operating on the combined world standard GSMMM/H/H/HSPSPS A+A /LLTETE \ntetetechc nooloogygygy pplalatformsmsms... RRoRogers Cable is a leading Canadian cable services provider, offeringg hhhigigigh-h-speeedd \nInI ternnetett aaaccccess, ccababablelel television, and telephony products, and together with Rogers Business SSololutions,, \nprovovididdesees bbusinnesesessss tet lecom, networking, hosting, managed services and IP solutions to small, medididiumumum \nananddd lalal rgr e ennteteterrprprise, government and carrier customers. Rogers Media is Canada’s premier group \nofoff cccatategorry-y-y-lelleading broadcast, specialty, print and online media assets, with businesses in radio and \ntetetelelevisionnn bbbroadcasting, televised shopping, sports entertainment, magazine and trade journal publishingngg \nanana d digigigitatatal l media. We are publicly traded on both the TSX and NYSE stock exchanges and are included \nini thee SSS&P&& /TSX 60 Index of the largest publicly traded companies in Canada.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "CONNECTED HOME \n\n\n\n\n\n\n\nHOME \nTELEPHONY \n\n\n\nWHOLE HOME \nPVR \n\n\n\nBROADBAND \nINTERNET \n\n\n\nANY SCREEN \nSTREAMING TV \n\n\nCATEGORY- \nLEADING MEDIA \nCONTENT \n\n\n\nE-MAIL \n& MESSAGING \n\n\n\n\n\n\n\nROGERS CONTINUES TO DEFINE HOW FAMILIES COME \nTOGETHER AND CONNECT WITH THEIR WORLD. MILLIONS OF \nCANADIANS DEPEND ON ROGERS TO KEEP THEM INFORMED, \nCONNECTED AND ENTERTAINED WITH A COMBINATION OF \nTHE FASTEST INTERNET SPEEDS AND THE MOST INNOVATIVE \nTELEVISION, TELEPHONY AND HOME MONITORING \nSOLUTIONS AVAILABLE. \n\nThe core of Rogers connected home strategy is to provide customers \nwith the fastest broadband connections, together with the ability to \nseamlessly shift – to shift time, to shift screens and to shift places so they \naccess what they want, when they want, on the screen of their choice. \n\nRogers offers the best in on-demand, sports, movies, specialty, episodic \nand multicultural programming. Customers can schedule, pause, rewind", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", + "target_page": 6, + "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. \n\nIn addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. \n\n**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "at the Company’s annual general meeting in November 2000, it was proposed to invite each \n\nholder of the above options to subscribe for one new 30 November 2001, 0.75 cent option for \n\neach of the above options held on its expiry at a proposed issue price of 1 cent per new option. \n\nThere is no inherent right arising from these options to participate in any new issue of shares in \n\nthe Company which may be offered to shareholders from time to time prior to the exercise of \n\nthe options. The Company will ensure however, that during the exercise period, for the purpose \n\nof determining entitlement to any new issue, the relevant record date will be at least 12 business \n\ndays after the new issue is exercised, so as to give the holder of options an opportunity to exercise \n\ntheir options prior to the relevant record date of any new issue. \n\nIn accordance with the provisions of the E M P L O Y E E S H A R E O P T I O N I N C E N T I V E P L A N \n\nMermaid Marine Australia Limited Employee Share Option Incentive Plan (the “Employee \n\nOption Plan”), as at the date of this report a total of 42 employees have under option an aggregate \n\nof 615,000 ordinary shares in the Company. Of the 615,000 ordinary shares under option pursuant \n\nto the Employee Option Plan, half (307,500) may be purchased within 12 months of 18 June 2000 \n\nat an issue price of 60 cents per share and half (307,500) may be purchased within 12 months of \n\n18 June 2000 at an issue price of 70 cents per share. \n\nI N D E M N I T I E S A N D I N S U R A N C E P R E M I U M S F O R O F F I C E R S A N D A U D I T O R S \n\nDuring the Financial Year, Mermaid paid a premium for a contract insuring all of the directors \n\n\n \n \n \n \n [html]\n
Tableility incurred byAch director, secretary or executiveTableSensitivity, secCary or executive officer to theTableTableTableTableSpecimensSpecificity ( means )TableSpecificity ( months )PreparationsTableProportionalSignificance - basedTableTableTableTableTableTableTablePercentageProblems or otherwise during or since theTable1.10 ( 0.01 )TableTableRed to indemnifAn officer or auditor of the ccTableParametersTable
", + "page_start": 34, + "page_end": 34, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform. \n\nemmis communications 2004 abbreviated financial highlights \n*in thousands except where noted*\n\n’00 \n325,265 \n125,477 \n38.6% \n2.5x ’01 \n473,345 \n174,213 \n36.8% \n6.8x ’02 \n539,822 \n185,665 \n34.4% \n9.3x ’03 \n562,363 \n213,112 \n37.9% \n6.5x ’04 \n591,868 \n220,445 \n37.2% \n6.7x *year ended Feb. 28 (29)*\nnet revenues \nstation operating income*\nstation op income margin \nleverage \n\n**excluding noncash compensation*", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "It is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
TableTableTableTableTable
", + "page_start": 48, + "page_end": 48, + "source_file": "office-pdf.pdf" + }, + { + "text": "**LETTER TO THE SHAREHOLDERS**\n\n\n\nWe believe our commitment to good customer service, and our expanding PCS coverage area, will provide an advantage \nas we strive to profitably add customers. \n\nThe telecommunications industry remains in a period of rapid change, both from technological and regulatory \n\nperspectives. While these changes present challenges to our existing operations, they present opportunities as well. As an \norganization we need to address the continuing shift of minutes and customers away from our traditional networks to \nnewer wireless and Internet Protocol (IP)-based networks. Finding a way to profitably offer Voice Over IP services will \nbe one of our immediate goals. We have rapidly deployed broadband data capabilities, now making DSL access available \nto over 80 percent of our telephone customers. While DSL is currently provided over our wireline network, we need to \nlook to wireless technologies to deliver broadband services to more customers in a larger footprint. Our video service \nofferings are increasingly in competition with satellite based services, and thus need enhancements in order to be the \npreferred choice of our customers. As we work to identify new services to offer, a major objective will also be to find \nways to do so profitably. \n\nBeing able to deliver good financial results over the long term requires the efforts of many talented and dedicated \n\nemployees. In the pages of this annual report, you will get a glimpse of how many of our employees also make a \ncontribution to their communities. Our Company strives to be a good corporate citizen, a goal which is enhanced by our \nemployees' own effort to make a positive impact with their volunteer activities. \n\nWe have had a history of investing heavily in the capabilities of our networks, expanding and enhancing them in \norder to offer the best service possible. As our business has continued to grow and become more complex, we also need \nto invest in additional management resources. One of the recent steps in this direction was to hire Earle MacKenzie, who \njoined our organization as Executive Vice President in June. Earle brings 30 years of telecommunications experience to \nour Company, having worked for a range of organizations, including Contel, Arthur Andersen, startup ventures, and \nconsulting firms. In his position, he will serve as Chief Financial Officer of the organization, freeing up Larry Paxton to \nfocus on our information technology needs. In addition to the new management positions, we have underway a \nreorganization of our management structure to more closely align it with our functional areas. \n\nIn addition to the normal challenges of managing a growing business, our Board of Directors and members of \n\nmanagement have spent considerable time and effort to ensure compliance with the numerous new rules and requirements \nresulting from the various corporate scandals over the past few years. While a valid argument can be made as to whether \nall the new requirements are necessary, or even if they would have avoided the scandals that were uncovered, we have \napproached these efforts as an additional opportunity to further improve what we hope is already a well governed \norganization. The cost of complying with the new rules will be significant, but the cost of not doing what is right would \nbe worse, and certainly not acceptable to you as owners of the Company. \n\n\n\nAs announced last October, the Board of Directors declared a two-for-one stock split to shareholders of record as of", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Outperform \n\nEmmis Communications 2004 Annual Report", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Under the Plan, eligible employees may be offered the opportunity to subscribe for or acquire fully paid ordinary shares in the capital of the \nCompany at a discount to market price, subject to restrictions, including on disposal, determined by the Board (which has been a period of one \nyear for issues so far). The subscription or acquisition price is Market Value (being the weighted average sale price of the Company’s ordinary \nshares on the Australian Stock Exchange during the one week period up to and including the offer date) less any discount determined by the \nBoard (5% for issues so far). Under the Plan, at the discretion of the Board, financial assistance may be provided to employees to subscribe for \nand acquire shares under the Plan. The 5% discount constitutes financial assistance for these purposes. Participants are entitled to vote, receive \ndividends and participate in bonus and rights issues while the shares are restricted. \n\nOn 26 November 2004, the Company issued 32,400 ordinary shares to 49 eligible employees at a subscription price of $8.14 per share under \nthe Plan. The total market value of those shares on the issue date was $287,064 and the total amount received from employees for those shares \nwas $249,480.", + "page_start": 64, + "page_end": 64, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "‚***Share Repurchases.***\n\nIf we are unable to identify opportunities that satisfy our growth strategy, we \nintend to continue to use our free cash Öow to repurchase shares of our common stock at prices that \nprovide value to our stockholders. As of December 31, 2004, we had repurchased a total of 35.2 million \nshares, or approximately 20% of our common stock outstanding at the commencement of our share \nrepurchase program in 2000, for $750.4 million. In October 2004, our board of directors authorized the \nrepurchase of up to an additional $275.0 million of our common stock, of which $274.6 million \nremained available at December 31, 2004. We believe that our share repurchase program will continue \nto enhance stockholder value. \n\n‚***Dividends.***\n\nIn July 2003, our board of directors initiated a quarterly cash dividend of $.06 per share. \nEÅective October 2004, our quarterly cash dividend was increased to $.12 per share. We may consider \nincreasing our quarterly cash dividend if we believe it will enhance stockholder value. \n\n‚***Minimize Borrowings.***To the extent that the opportunities to enhance stockholder value mentioned \nabove are not available, we also intend to continue to use our free cash Öow to minimize our \nborrowings. \n\nAnother key component of our Ñnancial strategy includes maintaining an investment grade rating on our \nsenior debt. This has allowed us to secure favorable, long-term, Ñxed-rate Ñnancing that reduces our exposure \nto changing interest rates. This has also allowed us, and will continue to allow us, to readily access capital \nmarkets. \n\nFor certain risks related to our Ñnancial strategy, see \"\"Risk Factors.'' \n\n**Operating Strategy**\n\nWe seek to leverage existing assets and revenue growth to increase operating margins and enhance \nstockholder value. Our operating strategy to accomplish this goal is to: \n\n‚ utilize the extensive industry knowledge and experience of our executive management, \n\n‚ utilize a decentralized management structure in overseeing day-to-day operations, \n\n‚ integrate waste operations, \n\n‚ improve operating margins through economies of scale, cost eÇciencies and asset utilization, \n\n‚ achieve high levels of customer satisfaction, and \n\n‚ utilize systems to improve consistency in Ñnancial and operational performance. \n\nFor certain risks related to our operating strategy, see \"\"Risk Factors.'' \n\n‚***Experienced Executive Management Team.***We believe that we have one of the most experienced \nexecutive management teams in the solid waste industry. \n\nJames E. O'Connor, who has served as our Chief Executive OÇcer since December 1998, also \nbecame our Chairman in January 2003. He worked at Waste Management, Inc. from 1972 to 1978 and \nfrom 1982 to 1998. During that time, he served in various management positions, including Senior Vice \nPresident in 1997 and 1998, and Area President of Waste Management of Florida, Inc. from 1992 to \n1997. Mr. O'Connor has over 30 years of experience in the solid waste industry. \n\nMichael J. Cordesman, who has served as our Chief Operating OÇcer since March 2002 and also as \nour President since February 2003, has over 24 years of experience in the solid waste industry. He \njoined us in June 2001 as our Eastern Region Vice President. From 1999 to 2001, Mr. Cordesman \nserved as Vice President of the Central Region for Superior Services Inc. From 1980 to 1999, he served \nin various positions with Waste Management, including Vice President of the Mid-Atlantic Region \nfrom 1992 to 1999. \n\n3", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "[html]acknowledgment from theof options traded in the optionsBest Practice Recommendato each exchangeChairman or his representativemarket. Directors and executivesare for full copies of certainshares are listera( and executives from themay not deal in securities onpolicies and charters to beand NZX. The CrSecretary or a person appointconsiderations of a short - termincluded on the website. Theis responsible forby the Board ) of an intentionnature.Company has been workingwith the excharprior to any dealings in11. CONTINUOUS DISCL0SURthis during the year, togethrinformation dissecurities either by themselve or by their associates, and mu1.1. CUNT1 / NOUU3030303030303030303030303030303030303030303030303030503030303030303030503050305030503050305030503050305050505050505050505050505050505050505050505050505050with the update of the webs itself. These will shortly beis posted on th website at wwwpromotiv notify details followCommunicationavailable on the Corporateincludes ASX anthe dealing.The Company is committed to nivinnGovernance section of theannual reportsThe Company ' s policy is thatStrains and equal access to informationwebsite.therefore this Ctrading in Santos securities isconcerning the Company.These policies establishParameterspermitted, with approval as seTissue, removascular, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, disease, distprocedures to ensure thator meeting, CECout above, only during theTile Cullipally Tias UEVEU / βEU nolicieve aorticular activityDirectors and management aTeletases, and metastasesfollowing periods :post - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - calcium - ca -aware of and fulfil theiraccessions• the period commencingalcoholicated to fulfilling its obligations toobligations in relation to the direction of evaluationfacility is also company (%)two clear days after theshareholders and the broaderUnitineing understanding sensesshareholders. Wannouncement of themarket for continuous disclosuprice sensitive information.material presenCompany ' s annual resultsThe policies are summarised irLintorination must not beannual and halfand ending 1 July ; andthis Statement, which may beselectively disclosed prior tcpresentations, iStatisticsaccessed at the Company ’ sDelTy attituded by the transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transferral transthe benefit of stwo clear days after thewebsite at www. santos. com.*Exchange Ltd ( NZX ). Directoregardless of thannouncement of theIne Lompany TS currentiy In", + "page_start": 35, + "page_end": 35, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Who is the President of the TV Department of Emmis Communications?", + "target_page": 6, + "target_passage": "Randall Bongarten Television Division President", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. \n\nWith its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "First of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. \n\nOur TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi-", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform \n\nEmmis Communications 2004 Annual Report", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. \n\nIn addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. \n\n**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform. \n\nemmis communications 2004 abbreviated financial highlights \n*in thousands except where noted*\n\n’00 \n325,265 \n125,477 \n38.6% \n2.5x ’01 \n473,345 \n174,213 \n36.8% \n6.8x ’02 \n539,822 \n185,665 \n34.4% \n9.3x ’03 \n562,363 \n213,112 \n37.9% \n6.5x ’04 \n591,868 \n220,445 \n37.2% \n6.7x *year ended Feb. 28 (29)*\nnet revenues \nstation operating income*\nstation op income margin \nleverage \n\n**excluding noncash compensation*", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "[html]Board of DirectorsExecutive TeamAuditorsTimothy R. Banks ( 3 ) President & CEO,Philip Fraser President &Ernst & Young, LLP Halifax, NSAPM Group of CompaniesRobert Richardson, FCA Executive Vice PresidentSolicitorsCharlottetown, Prince Edward Island& Chief Financial OfficerBennett Jones, LLPPresident & CEO,Ruth BuckleCalgary, ABKillam Properties Inc.Vice President, Property ManagementStewart McKelveyHalifax, Nova ScotiaErin Cleveland, CAHalifax, NSRobert G. Kay ( 1 )Vice President, FinanceChairmen of the Board,StatesticsRegistrar andKillam Properties Inc.Pamela CrowellTransfer AgentChairman,Vice President,(%)Springwall Group InternationalProperty Management ( MHCs )Services Inc.Springwall Sleep Products Inc.Jeremy JacksonSuite 2008. Purdv ’ s Wharf.Moncton, New BrunswickVice President, MarketingTower IIJames C. Lawley ( 1 )( 2 )Michael McLeanHalifax, NS B3.3R7General Manager, Scotia Fuels Ltd.Vice President, DevelopmentHalifax, Nova ScotiaDale Noseworthy, CA, CFAShare ListingArthur G. Lloyd [ 2 ]Vice President, Investor RelationsToronto Stock Exchange ( TSX )Executive Vice President Investments,and Corporate PlanningTrading Symbol : KMPWestern North America,TableTableIvanhoe CambridgeInvestor InquiriesMonthly DividendCalgary, Albertainvestorrelations @ killamproperties. com$ 0.05 per shareKarine L. MacIndoe902.442.0388Corporate Director,Head OfficeToronto, OntarioSuite 100Robert G. Richardson, FCA3700 Kempt RoadExecutive Vice President & CFO,Halifax, NS B3.4X8Killam Properties Inc.902.453.9000Halifax, Nova Scotia866.453.8900Manfred J. Walt, CA ( 2 )[ 3 ]President & CEO,Walt & Co. Inc.Toronto, OntarioAnnual GeneralG. Wayne Watson, CA ( 2 )( 3 )MeetingCorporate Director,The Annual GeneralHalifax, Nova ScotiaMeeting of Shareholders( 2 ) member of the Audit Committee ( 2 ) member of the Corporate Governance,will be held on Wednesday,Nomination and Succession Committee ( 3 ) member of the Compensation CommitteeMay 7.2014, at 2 : 00 pmAdantic Time at the HalifaxMarrioft HarbourfrontHotel, 1919 Upper", + "page_start": 96, + "page_end": 96, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
who replaced us — have created more than EDDI billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen an a
We are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial valub
We unveled this concept at the faltional Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we ’ re calling the Broadcasters ’ Initit
We ’ I continue to use innovation to push us forward. Meanwhile, we ’ I also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company bet
In other words, you can count on Emmis to continue to do what it has always done : Outperform.
Thank you for your belief and investment in Emmis.
", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "[html]2 | EMPLOYEESControlledMile GrifthPaul HartmanAlaway HollisJames Iness. Ir.Marty JowesOristooherKolbJustin LewisOverall diagnoseAnthory GrillettBreft HorveyBrett HollowChris Infante. InMarvin Jones. Ir.IrshKwonReviewishJerry GeorgellJet1GrimKeith HarveyStere HollowayTotal IngallsMile JonesTomKoestaLawrence Lewis Jr.Brien EibbsJef16rindstaffRick HorveyWilliam HollowayTailngerickMissy JenesJen Koper.Mitheal LewisBrien EibbsJef16rindstaffRick HorveyWilliam HollowayTailngerickMissy JenesJen Koper.Mitheal LewisJohn Gibbs IIIChad GrinnellChristopher HarvilleAllison HolmJeff IngersorRustin :/ ovesIIIiliam - foskPaulivBloodLane - GibbsClay GrissemKerreth - Fasker IrJames HolmanPeal hgramStefanie JonesRenKosteckyUrshwal. efsrendeChris GibsonTara - GrossNathanHassingerLincoln - HulnsanNicholas InthirathTim J. Jones.Derek KraischerEabriel LichtenbergerHogrey GittoonVertis forummerKelly HestingsCori RelimesBrien IrvingRifreginald Jeres( ody RrollMitchUellJ. D. GiddensJohn - GryderMattHastingsEric HolmesBrian IrwinChalain JordarBrett KrosickRasey LilleyTricia GiffinJose - GuajardiKody RestsNick HolmesJensifer loaxTenathen lordenTames RroppThird limbergMatt Gilbert6 GGuerraTimothy HateChadHols1Richant IsbellKenneth londan IrNicKruckebergTravis. Linderfelseslamy - fillespir. Ir.Homero - fairro. It.Alan RefferKerra RolsfedRyantsemTavier InslinSoft RruegerTaborn UndiseyMatthex GilliamMatt GuerrensFranklin Hawes. Ir.Eric HolsterJasan leesTrace Joyce IIIBryan KrusemarkJereny LindseyCharles GIIIIIMigrate ( GivernersJemes RegKevinHol1Trey IveyAlejandro luorezTrevid RuntzRylelinibeyTracy favensRoy - GuerrenoJeffHaedenConradifistibAl JadisonClaudio JuarezTed KuschelMike LitsaDestitudeAmaxt GuillemardDamielHaresRagenHomesleyBenjamin JackssmTotal lifesAnde RuykendallLimeood Lirette JrJames GlassAgustinGuillenKevin HayesMatt HoodBrandi lacksonMatt luliasOverseaffygerRandy LittleChristina GlavianoDeniel GuinaneRyanHoyesWilliamHood ItDevid lacksonRevin JustinTony KaleJacob LittlefieldDasisfieasinMichael faulkersDrew fraymakesHudson HoosierGreg JadxsonStipman Kahanu. ir.MacLaasMelinda LittlefieldRonnie GlenesyinkelBrendo EuronRrwdy HownesJoeHooverJames JacksonTanner KanciliaFrank LaborWhitney LivelyRonnie", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": ")BARBARA D. EMERY Age 53Vice President − Human ResourcesJOHN M. LEYO Age 61Vice President – North Atlantic AreaKURT J. WEINHEIMER Age 56Vice President − Western Area", + "page_start": 45, + "page_end": 45, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", + "target_page": 7, + "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. \n\nWith its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. \n\nTransfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. \n\nQuarter Ended \nMay 2002 \nAugust 2002 \nNovember 2002 \nFebruary 2003 \nMay 2003 \nAugust 2003 \nNovember 2003 \nFebruary 2004 High \n31.85 \n30.15 \n24.05 \n24.86 \n21.24 \n23.87 \n24.06 \n28.65 \n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A \nCommon Stock and one record holder of the Class B Common Stock. \n\nEmmis intends to retain future earnings for use in its business and does not anticipate \npaying any dividends on shares of its common stock in the foreseeable future. \n\nExecutive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. \n\nIn addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. \n\n**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform \n\nEmmis Communications 2004 Annual Report", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform. \n\nemmis communications 2004 abbreviated financial highlights \n*in thousands except where noted*\n\n’00 \n325,265 \n125,477 \n38.6% \n2.5x ’01 \n473,345 \n174,213 \n36.8% \n6.8x ’02 \n539,822 \n185,665 \n34.4% \n9.3x ’03 \n562,363 \n213,112 \n37.9% \n6.5x ’04 \n591,868 \n220,445 \n37.2% \n6.7x *year ended Feb. 28 (29)*\nnet revenues \nstation operating income*\nstation op income margin \nleverage \n\n**excluding noncash compensation*", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "First of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. \n\nOur TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi-", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Consumptionemmis entitiesRULC countKFTK - FM ( 97.1 ), TalkKIHT - FM ( 96.3 ), Cassic HillsOriando, Fia., WKCF - TV ( Channel 18 ), WB programmingPortiand, Ore., KOIN - TV ( Channel 6 ).
PrimaryKDHT - FM ( 93.3 ), Rhythmic CHRKEVi - FM ( 10.5 ), OlderKGSR - FM ( 107.1 ), Adult AlternaHSPNT - FIM ( 105.7 ), Alternative RockASHE - FM ( 94.7 ), Album Oriented RockWRDA - FM ( 156.1 ), Neurodiation ( 55.54.1 ), Neurodiation ( 55.54.1 ), Neurotic Loss ( 57 %), Neuronide ( 156.155.154.155.155.166.159.169.199.199.199.199.19CBS programming / local newsTers Hauts, Ind., WTH - TV ( Channel 10, CBS programming / local newsTopeka, Kan, KSNT TV ( Channel 27 ), WBP, sensensitivities
KUBJ - AM ( 590 ), News / TalkKLBJ - FM ( 93.7 ), Album Oriented RockHealthcare, consumption, consumption, consumptionTucson, Ariz, KGUN - TV ( Channel 9 ), ABC programming / local newsCharacteristics ( n = 3 ), pharmacistics ( n = 3 ), abernatium ( n = 3 )
", + "page_start": 6, + "page_end": 6, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "**Note 7. Significant Contractual Relationship**\n\nIn 1999, the Company executed a Management Agreement (the Agreement) with Sprint whereby the Company \ncommitted to construct and operate a PCS network using CDMA air interface technology, replacing an earlier PCS \nnetwork based on GSM technology. Under the Agreement, the Company is the exclusive PCS Affiliate of Sprint \nproviding wireless mobility communications network products and services in its territory which extends from \nAltoona, York and Harrisburg, Pennsylvania, and south along the Interstate 81 corridor through Western Maryland, the \npanhandle of West Virginia, to Harrisonburg, Virginia. The Company is authorized to use the Sprint brand name in its \nterritory, and operate its network under the Sprint radio spectrum license. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 28", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**We must serve well to prosper – We must prosper to serve well**\n\nShenTel Service Company • Shenandoah Long Distance Company • Shenandoah Mobile Company \nShenandoah Network Company • Shenandoah Telephone Company • Shenandoah Valley Leasing Company \nShenandoah Cable Television Company • ShenTel Communications Company \nShenandoah Personal Communications Company \n\nPO Box 459 \nEdinburg, VA 22824-0459 \nPhone 540-984-4141 • Fax 540-984-8192 \nwww.shentel.com", + "page_start": 59, + "page_end": 59, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on \nthe products and services each provides. Each segment is managed and evaluated separately because of differing \ntechnologies and marketing strategies. \n\nThe reporting segments and the nature of their activities are as follows: \n\nShenandoah Telecommunications Company (Holding) \nHolding company, which invests in both affiliated \nand non-affiliated companies. \n\nShenandoah Telephone Company (Telephone) \n\nProvides both regulated and unregulated telephone \nservices and leases fiber optic facilities primarily \nthroughout the Northern Shenandoah Valley. \n\nShenandoah Cable Television Company (CATV) \nProvides cable television service in Shenandoah \nCounty. \n\nShenTel Service Company (ShenTel) \n\nProvides Internet access to a multi-state region \nsurrounding the Northern Shenandoah Valley, hosts \nTravel 511 for Virginia, and sells and services \ntelecommunication equipment. \n\nShenandoah Long Distance Company (Long Distance) Provides long distance services. \n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities. \n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation. \n\nShenandoah Personal Communications Company (PCS) \n\nAs a PCS Affiliate of Sprint, provides digital wireless \nservice to a portion of a four-state area covering the \nregion from Harrisburg, York and Altoona, \nPennsylvania, to Harrisonburg, Virginia. \n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting \npolicies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties. \n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows: \n\n\n \n \n \n \n [html]\n
YearHoldingTelephoneConsolidated Totals
( in thousands )
2003$( 441 )$ 65
$ _ ( 376 )2002$( 822 )
$ 45$ ( 777 )2001$
", + "page_start": 36, + "page_end": 36, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "What are the two components considered in the expected free energy?", + "target_page": 4, + "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "ρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex-", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a \n\ngradient expansion of the free energy functional of a continuous system [84]. However, here we \n\nhave made the mapping from the free energy of the lattice KMC system. \n\nThe chemical potential for the nanoparticles may be determined from the functional derivative \n\nµn = δF [ρn, ρl]/δρn(r). In equilibrium it is constant throughout the system, but it may vary \n\nspatially in a non-equilibrium system, i.e., µn = µn(r, t). We assume that the dynamics of the \n\nnanoparticles is governed by the thermodynamic force ∇µn – i.e. that the nanoparticle current \n\nis j = −Mnρn∇µn, where Mn(ρl) is a mobility coefficient that depends on the local density of \n\nthe liquid. Combining this expression for the current with the continuity equation, we obtain the \n\nfollowing evolution equation for the nanoparticle density profile \n\n(cid:20) \nMnρn∇ \n\n(cid:21) \n\n∂ρn \n∂t \nδF [ρn, ρl] \nδρn \n= ∇ · . (6) \n\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have \n\nover-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "-0.5 \n) \n1 \n- \nPair Fraction \nL \n\n. \nl \no \nm \n-1 \n( \n0.2 \nx \ne \nv \nf \nβ \n0.1 \n\n-1.5 \n0 1 0.5 \n\n3 \n\n2 \n\n1 \n\n0 \n\n(b) \n3 \n\n2 \n\n1 \n\n0 \n\n4 8 6 10 \nr (Å) \n\nFIG. 3: Effective pair potentials derived for MSA3 and \nBIMSA3. (a) Cation anion (dashed line: without taking the \npair into account), (b) pair cation, (c) pair anion, and (d) pair \npair. The internal potential of the pair β eVint(r) is set equal \nto βV eff ij (r) for distances less than 4 ˚A. \n\n0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. \n\ntrapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, \n\n3i (k) = \nV SR \n33 (k) = \nV SR \ne \ne \nwhere \n\n(k), \nw(k/2) \n1i + V SR \nV SR \n2i \n(cid:3) \n(cid:2) \nw(k/2)2 \n22 + 2V SR \n11 + V SR \nV SR \ne \n12 \n(cid:2) \ni = 1, 2 \n(k) \n\n(2a) \n\n(2b) \n(cid:3) \ne \nw(r) is the pair probability distribution \n\n\n \n \n \n \n [html]\n
TablePatientsTable1.
Parameters.FigureP
PatientsPatientsTableTable
Table=TableTable
\n\nwe have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne \n\nw(k) (1 − δij ) + \nρ3 \nw(k/2) \ng3j \nρj \ng3i + \nρi \nρ3 \ne \ne \ne \ne \n(cid:2) \nw(k/2)]2 \ng33(k) \nρ 2 \n3 [ \ne \ne \ne \ne \ne \ngij(k) \n(k) \ne \n(cid:3) \n\nρi ρj \n\ne \n\nThe excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j \n\nWe first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. \n\nwhich depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. \n\n0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. \n\nmolecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. \n\n] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. \n\n2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. \n\nTo conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . \n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- \n\nuids (Academic Press, 1986). \n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79, 569 (1995). \n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109, 9873 (2005). \n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106, 1259 \n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R. \nSoc. London, Ser. A 359, 1545 (2001). \n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65, \n(2006). 041202 (2002). \n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. \nColloid Interface Sci. 9, 1 (2004). \n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. \n96, 147801 (2006). \n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo- \ndynamic and Transport Properties, vol. I-II (Coimbra Ed- \nitora, Lisbon, Portugal, 1984). \n[19] G. Ciccotti, P. Turq, and F. Lantelme, Chem. Phys. 88, \n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130, 134507 333 (1984). \n(2009). [20] J.-F. Dufrˆeche, T. O. White, and J.-P. Hansen, Mol. \n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110, Phys. 101, 1741 (2003). \n10878 (2006) [21] The average contact distance between a symmetric \n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52, dumbbell and an infinite plane at β = 0. \n3730 (1995).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) \n\nG(iω, ~k)G(iω + iΩ, ~k) + F (iω, ~k)F (iω + iΩ, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ(iΩ) = T \n\nω \nX \n1 \nπ \n\nX~k \n(cid:16) \n0 \n\nG′′(ω, ~k)G′′(ω + Ω, ~k) + F ′′(ω, ~k)F ′′(ω + Ω, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′′(Ω) = − dω \nΩ \nZ \nX~k \n(cid:16) \n− \n\n1 \nπ2 nF (y) − nF (x) \ny − x \n\n′ ′ \n\nG′′(x, ~k)G′′(y, ~k) + F ′′(x, ~k)F ′′(y, ~k) \n(cid:17) \n\n(∇~kε~k)2 \nΠ′(Ω) = dx dy \n\nZ Z \nX~k \n(cid:16) \n\n′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k \n\nF (ω, ~k) = \nZ 2 \nk,ω(ω2 − ∆2 \n\n+ iδsgn(ω) \n(9c) \n\nWe will first use Eq 3 and compute WK in NS and SCS. \nThis will tell us about the magnitude of ∆W (ωc = ∞). \nWe next compute the conductivity σ(ω) using the equa- \ntions listed above, find W (ωc) and ∆W (ωc) and compare \n∆f (ωc) and ∆WK. \n\nwhere Zk,ω = 1 − Σ(k,ω) \n, and ∆k,ω, is the SC gap. Fol- \nlowing earlier works31,33, we assume that the fermionic \nself-energy Σ(k, ω) predominantly depends on frequency \nand approximate Σ(k, ω) ≈ Σ(ω) and also neglect the \nfrequency dependence of the gap, i.e., approximate ∆k,ω \nby a d−wave ∆k. The lattice dispersion ε~k is taken from \nRef. 38. To calculate WK , one has to evaluate the Kubo \nterm in Eq.3 wherein the distribution function n~k, is cal- \nculated from \n\nFor simplicity and also for comparisons with earlier \nstudies, for BCSI, EB, and MFLI models we assumed \nthat the gap is just a constant along the FS. For CB \nmodel, we used a d−wave gap and included into consid- \neration the fact that, if a CB is a spin fluctuation, its \npropagator develops a resonance when the pairing gap is \nd−wave. \n(10)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "A + 2b \n2b(cid:12) \nA \n(cid:12) \n(cid:12) \n(cid:12) \niλhhh + \nh + iMhΓh \n\nI22 + J22 ln , \n\n(cid:12) \n(cid:12) \n(cid:12) \ni \n(cid:12) \n\n(cid:19) − \n− \n\ns \n− \n\n, \n\n4 \n\n∂Ψ \n∂h (cid:19) \n8 \n(cid:18)− \n2 \n\n(B8) \n\n∂Ψ \n∂h (cid:19) \n4m2 \n2b \n\n∂Ψ \n∂h \n(cid:18) \nN + A \n\n∂Ψ \n∂H \n\ni \n∗2 = 4mN λ3 \n2 M1M \n\nN (cid:18) \ns \n\nM 2 \nA + 2b \n2b(cid:12) \nA \n(cid:19) \n(cid:12) \n(cid:12) \n(cid:12) \n\nM 2 s \nH + iMHΓH \n− \n\n4 + ln (B9) − \n\n(cid:12) \n(cid:12) \n(cid:12) \n(cid:12) \nwhere θ is the scattering angle in the center of mass frame. The auxiliary functions appear \n\n(cid:18)− \n− \n\nabove are defined as \n\ns(A + m2 3m2 4m2 \nN (s N ) N ) \nI22(s) , (B10) − − \n\n4a2 2m2 \nN )(m2 m2 \nh) \n2A(A + 2a) (s \nN − − − \n\n(B11) \n\n(B12) \n\nm2 b(s, mN , mh) (B13) \nhr ≡ r \n\n(A + 2a)2 2(s + 4m2 \n\nN )A \n− \nA2 \nA(s + 4m2 \n\n4 − \n\n4b2 \n− \nN ) + A2 \n\n≡ \n\n1 \nAb \n(cid:0) \n+3m2 \ns \n2 \ns \n4 − \n\nJ22(s, mh) \n≡ \n\n− \nN ) \n\n− \n\n4m2 \nN (s \n, \n\n− \n+ m2 \nh, \n(cid:1) \nA(s, mh) \n≡ − \n\ns \n4 − \nm2 \nN . \n\nIn partial wave expansion, the thermal averaged cross section is given by \n\ndw \nds (cid:19) \n\nT \nmN (cid:21)(cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n1 \nm2 \nN (cid:20) \ndw \nds (cid:12) \ns=4m2 \n(cid:12) \nN \n(cid:12) \n(cid:12) \n\n3 \n2 (cid:18) \n4m2 \nN \nσv w(s) 2w(s) = \nh i − − \n\nT \nmN \n, = 6 \n\nwith \n\n4m2 \ns \n\ns d cos θ \n\n1 \n8π r \n2 = 2, \nfinal \n4w(s) dLIPS − \n\n2 X |M| \n≡ Z \nX |M| \nZ \n\nwhere mfinal is the mass of final state particle. \n\n[1] T. Yanagida, in Proceedings of Workshop on the Unified Theory and the Baryon Number in \n\nthe Universe, Tsukuba, Japan, edited by A. Sawada and A. Sugamoto (KEK, Tsukuba, 1979), \n\np 95; M. Gell-Mann, P. Ramond, and R. Slansky, in Supergravity, Proceedings of Workshop,", + "page_start": 11, + "page_end": 11, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "How could the heart rate be estimated by means of an active inference paradigm?", + "target_page": 6, + "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The second panel of Fig. 2 shows the Shannon surprise of \nan inference model that estimates the current heart rate using \nthe two standard components of a generative model. The for- \nmer component is the prior, which encodes the person’s a priori \nprobabilistic belief (i.e. probability distribution) about her “nor- \nmal” heart rate range; here, the prior is a Gaussian centered on \n67 and has a precision of 0.11. The latter component is the likeli- \nhood, which encodes the probabilistic mapping between sensory \n(heartbeat) observations and the hidden state (heart rate); here, \nthe likelihood is a Gaussian centered on the current heart rate \nwith an additional bias of 15 pulses, and the panel shows the \nresults for 10 values for precision obtained by subdividing the \nrange [0.1,10] into equal intervals. The results shown in the second \npanel of Fig. 2 show that Shannon surprise increases dramatically \nduring episodes of tachycardia and bradycardia, which are far \nfrom the normal range. The pattern of results is the same across \nall levels of likelihood precision. However, the inference with a \nvery high precision (a precision of 10) tracks more closely the noise \nsensory signals and can therefore lead to more extreme results. \n\nIn general, the accuracy of the inference of hidden bodily \nstates, the “embodied self,” or other aspects of the model depends \non the signal-to-noise ratio of the sensations and on the quality of \nthe model. For example, it is difficult to self-localize in a city if it \nis dark (low signal-to-noise ratio) or if one does not know the city \nwell (poor model). The inference of hidden bodily and emotional \nstates might function in an analogous manner. If the quality of \nthe afferent interoceptive (e.g. cardiac) signals is low, or if one has \na poor model of how one’s body functions, then it would estimate \none’s bodily states such as fatigue incorrectly (which in turn would \nalso impair its adaptive regulation of the same bodily states). Inte- \nroceptive signals could be “too noisy” for various reasons, which \nmight be related to physiology, inflammation, or stress. The body \nmodel can be poor in various ways, too. For example, it could \npoorly characterize the statistical relations between interoceptive \nsensations and hidden bodily states (e.g. systematically mischar- \nacterize high heart rate as caused by hunger but not fatigue \nor joy). \n\nThe third panel shows the Bayesian surprise (or the Kullback- \nLeibler divergence between posterior and prior probability distri- \nbutions) over time. This is a measure of how much dissimilar the \nposterior and the prior are, and it always decreases as a result of \ninference, but note that it decreases much more rapidly when the \nprecision of the likelihood is 10, which is another indication that \nthe posterior is “overfitting,” meaning that the inference result is \nexcessively biased by the likelihood distribution. \n\nFinally, the two bottom series of panels are organized in two \n(left and right) columns, which show the first five time steps of \ninference for the two cases with high precision (of 10) and low pre- \ncision (of 0.1) of the likelihood, respectively. In these plots, the prior \ndistributions are in blue, the posterior distributions are in green, \nand the likelihoods are in red. It is possible to note that in the left \n(high precision) panels, the posterior inference closely follows the \nlikelihood (it “overfits”) after five time steps and the inferred heart \nrate is slightly biased (i.e. it is 79). Differently, in the right (low \nprecision) panels, the inference converges much slower to a high \nprecision posterior, but without overfitting.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Figure 2. A simplified example of (Bayesian) inference of one’s heart rate. First panel: simulated time series of heartbeat observations. Second panel: \nShannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a \nlikelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10, \nsee the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels: \nthe two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high \nprecision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of \nthis figure. \n\nthe current model generate significant surprise, and sometimes, \nthe surprise can remain relatively high for long periods before the \nmodel adapts (or the world changes), especially with some param- \neterizations of the generative model. This is particularly relevant \nin this context since active inference agents strive to minimize \ntheir surprise (and the long-term average of surprise, entropy, \nwhich is a measure of uncertainty) by changing their model, or \nchanging the world, or both. Second, these examples illustrate the importance of precision \ncontrol and the appropriate setting of precision parameters in \nguiding inference. Remarkably, the inference can be more or less \naccurate or fast using the same data, depending on the precision \nparameters. Note that in Fig. 2, we manipulated only the precision \nof the likelihood. However, it would also be possible to manipulate \nthe precision of the prior, together or in alternative to the precision \nof the likelihood. Generally speaking, when the precision of the", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed1.pdf" + }, + { + "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**\n\n1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. \n\n**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 \n\n**MSC:**91-08 \n\n\n \n \n \n \n [html]\n
Citation : Nehrer, S. W.; EhrenreichTable
Laursen, J,; Heins, C.; Friston, K ;Mathys, C.; Thestrup Waade, P.
Introducing Active Inference. j1 : AJulia Library for Simulation and
Parameter Estimation with ActiveInference Models. Entropy 2025.27.62.
https :// doi. org / 10.3390 / e27010062Copyright : © 2025 by the authors.
Licensee MDPI, Basel, Switzerland.This article is an open access article
distributed under the terms andconditions of the Creative Commons
Attribution ( CC BY ) license( https :// creativecommons. org /
licenses / by / 4.0 /).
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Active inference, interoceptive processing, \nand uncertainty reduction \n\nActive inference is based on the idea that in order to engage in \nadaptive allostatic regulation and goal-directed behavior, living \norganisms continuously strive to minimize the surprise of their \nsensations or, more formally, an upper bound to surprise: varia- \ntional free energy (Parr et al. 2022). Notably, the (expected) free \nenergy minimization processes that drive active inference jointly \nconsider two complementary objectives. The former (utilitarian) \nobjective is to realize one’s preferences, such as being satiated \nor safe, by minimizing the discrepancy between preferred sensa- \ntions (encoded as “priors over observations” in active inference) \nand current sensations in different modalities (e.g. interoceptive \nor exteroceptive). The latter (epistemic) objective is to reduce", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "inference that tracks the noise rather than the correct state of \nthe estimated variable system (i.e. overfitting), whereas assigning \nexcessively low weight to sensations (or excessively high weight to \nprior knowledge) makes the system poorly responsive to incom- \ning observations that might signal a change in the state of the \nsystem—and both are examples of aberrant inference (Friston \net al. 2014). \n\nFigure 2 provides a formal illustration of the above by plot- \nting some examples of Bayesian inference using generative models \nunder various levels of precision of the model components. For \nsimplicity, we focus on a simplified example of inference of an \ninteroceptive variable: one’s heart rate. Heart rate is a “hidden \nvariable” in Bayesian parlance since it is not directly observable \nbut needs to be inferred through two sources of information: \nprior knowledge about the most likely heart rate and sensory \n(heartbeat) observations. The top panel of Fig. 2 shows a series \nof (noisy) heartbeat observations. In the beginning, they are \nin the normal range for an adult (time steps 1–10), then they \nincrease significantly, simulating tachycardia (time steps 11–20), \nthen they go back to the normal range (time steps 21–30), then \nthey decrease significantly, simulating bradycardia (time steps \n31–40), and finally, they go back to the normal range (time steps \n41–50). \n\nparticipants processed faces expressing fear (but not neutral \nfaces or faces expressing other emotions) when their heart rate \nwas high—hence congruent with the fearful expression (Pez- \nzulo et al. 2018, Yu et al. 2021). The generative model shown \nin Fig. 1 could support this kind of inference by using interocep- \ntive information from the heart (i.e. high heart rate) as evidence \nthat “there might be something fearful out there” (Pezzulo 2013). \nAnother more complex example regards emotional awareness \nand self-awareness—which significantly engage the brain regions \ninvolved in interoception and the representation of physiologi- \ncal processes (Garfinkel et al. 2013). The generative model shown \nin Fig. 1 might support processes of emotional awareness in a \nway that is neither purely bottom-up (i.e. as if interoceptive sig- \nnals cause emotional awareness) nor top-down (i.e. as if emotional \nawareness causes interoceptive signals), but rather through a \ncircular causality between central predictions about bodily state— \nthat engage autonomic reflexes—and interoceptive streams—that \nupdate the predictions (Seth and Friston 2016). In this perspec- \ntive, any representation that induces interoceptive predictions \ncould be associated with emotional or affective content; cru- \ncially, this is also the case with some aspects of self-awareness \n(e.g. recognizing one’s own face) that require integrating intero- \nceptive streams with concurrent exteroceptive (e.g. visual) and \nproprioceptive cues. These examples illustrate that the genera- \ntive model of Fig. 1 natively implements both the multisensory \nintegration required to unite (for example) interoceptive and exte- \nroceptive streams and the active aspects that are supposed to \nsupport emotional and self-processing—and the construction of \nan “embodied self” (i.e. the circular causality between engag- \ning autonomic reflexes and capturing the ensuing interoceptive \nsignals).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "[html]Pavalus MP, Peinstein JS, Khalsa SS. An active inference approach to interceptive psychopathology Annu. Bor. Clin Psychol 2019, IS - 87 - 122Pezzalo G. Why do you fear the Bogerman? As embodied predictive coding model of perceptual inference. Cogn Affect Behwn Nrunsst 2013 ; 14 : 902 - 31.Pezzalo G, Barca L, Triston KJ. Active inference and cognitive - emotional interactions in the brain. Behav Brain So 2015.38 e85.Pezzulo G ; lodice P ; Barca L et al. Increased heart rate after exercise facilitates the processing of fearful but not disgusted faces Sci Rep 2018 ; 86 : 398.Pezzulo G, Maisto D, Barca L et al. Symptom. perception. from a predictive processing perspective. Clin Psycholi Dar 2019 ; IL1 - 14. Quigley KS, Kanoiki S, Grill WM et al. Punctions of interopertion.from energy regulation to experience of the self. Thervils Neurosci 2001.44 : 29 – 38.Rao RP, Ballard DH. Predictive coding in the visual cortex : a functional interpretation of some extra - classical receptive - field effects. Nat Neurosc 1999 ; 2 79 – 87.Reichl C, Kaess M. Self - barm in the context of horderline personality disorder. Curr Opin Psychol 2021, < underline > SP 139 – 44.Sagv E, Grion Y. A multi factorial model of self - harm behaviors in anorexia - nervosa and bulimia - nervosa. Compr Psychiatry 2023 ; 96 : 152142.Schmitz M, Back SN, Seitz KI et al. The impact of traumatic childhood experiences on interceptizn. diaregarding one ’ s own hody Borderline Fers Disord Dyspregulation 2023 ; 10 S.Sellby EA, Kranzler A, Lindqvist J et al. The dynamics of pain during nonsuicidal self - injury. Clin Psychol 5.2019 ; P 302 – 20.Serino S. Scorpina F. Dakanalis A et al. The role of age on multisensory bodily experience an experiencestal study with a virtual reality full - body illusion. Cylergychol Behav Soc Netur 2018.21304 – 10.Setb AK. Interoceptive inference, emotion, and the embodied self. Thenis Cogn Sci 2013 ; IP565 – 73.Setb AK, Priston KJ. Active interoceptive inference and the emotional brain. PhiliosTrans R Soc Lowd B biol Soi 2016.371.20160007.Setb AK, Suzukii K, Critchley HD An interoceptive predictive coding model of conscious presence. Print hychol 2012 ; Z : 395.Sforza A. Bufalari. 1, Haggard P et al. My face in yours. visuo - tactile facial stimulation influences sense of identity. Soc Neurosi 2013 ; 5 : 148 – 42.Shiner RL, Klimstra TA, Denississen [] et al. The development of narrative identity and the emergence of personality disorders in adolescence. Carr Opin Pcychol 2021,< underline > 89 53.Skegg K. Self - harm. Lanort 2005 ; 366 : 1471 – 83Smith R, Peinstein J5, Kuplicki R et al. Perceptual insensitivity to the modulation of interceptive signals in depression, anxiety and substance use disorders Sti Rep 2021.11 : 2108.Smith R, Kilgore WD, Lane KD. The structure of emotional experience and its relation to trait emotional awareness : A theoretical review. Dnstion 2018 ; 1.670 – 92.Sexith H, Kuplicki R, Feinstein J et al. A Bayesian computational model revenula a failure to adapt interceptive precision estimates across depression, anxiety, exting, and substance use disorders. PLo5 Cowput Biol 2000.06 e10084849Sesith R, Lane RD. The neural basis of one ’ s own conscious and unconscious emotional states. Neurosci. Biohehavirus 2015.571 – 29.Smith R, Parr T, Priston XJ, Simularizing emotions : an active inference model of errotional state inference and envotion concept learning. Prort Psychol 2019 ; total :", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": ": 1 – 29.Smith R, Parr T, Prisron XJ Simularizing emotions : an active inference model of emotional state inference and emotion concept learning. I ' writ hydril 2013 ; t0 : t844.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": "[html]Pavalus MP, Peinstein JS, Khalsa SS. An active inference approach to interceptive psychopathology Annua Roo. Clin Psychol 2019, IS - 97 - 122Pezzalo G. Why do you fear the Bogerman? An embodied predictive coding model of perceptual inference. Cogn Affect Behwn Newnst 2013 ; 14 : 900 - 11.Pezzulo G, Barca L, Priston IQ. Active inference and cognitive - emotional interactions in the brain. Behav Brain Sci 2015.38 e85Pezzulo G ; lodice P ; Barca L et al. Increased heart rate after exercise facilitates the processing of fearful but not diagusted faces. So Rep 2018 ; 898.Pezzulo G, Maisto D, Barcx L et al. Symptom perception from a predictive processing perspective. Clin Psychol Ear 2013 ; 14.Quigley IGS, Kanosiki. S, Grall WM et al. Punctions of isteroception : from energy regulation : to experience of the self. Thenils Neurosi 2021.44 : 29 – 38.Race RP, Ballard DH. Predictive coding in the visual cortex : a functional interpretation of some extra - classical receptive - faeld effects. Nat Neurosi 1999 ; 2 79 – 87.Reich3 C, Kaess M. Self - barm in the context of horderline personality disorder. Curr Opin Psychol 2021.37 139 – 44.Sagir E, Grion Y : A multi factorial model of self - harm behaviors in anorexia - nervosa and bulinia - nervosa. Compr Psychiatry 2003 ; 96 : 152142.Schmitz M, Back SN, Seitz KI et al. The impact of traumatic childhood experiences on interception. diaregarding one ’ s own hody Borderline Pers Disord Emet Dyonegulation 2023 ; 1.5.Sellby EA, Kranzler A, Lindqvist J et al. The dynamics of pain during nonsuicidal self - injury Clin Psychol Sci 2019 ; P. 302 – 20.Serino S. Scorpina F. Dakanalis A et al. The role of age on multisensory hodily experience : an experimental study with a visttual reality full - body illusion. Cylerpsychol Behav Soc Netur 2018.2194 – 10.Setb AK. Interoceptive inference, emotion, and the embodied self. Thmils Coge Sci 2013 ; 17 : 565 – 73.Setb AK, Priston KJ. Active interoceptive inference and the emotional brain. PhiliosTrans R Soc LowM B Biol Soi 2016.371.2016007.Setb AK, Suzukii K, Critchley HD An isteroceptive predictive coding model of conscious presence. Pront hychol 2012 ; 2395.Sforza A, Bufalari. 1, Haggard P et al. My face in yours. vissuo - tactile facial stimulation influences sense of identity Sw. Newnaci 2013 $ 148 – 62.Shinee RL, Klimstra TA, Denississen [] et al. The development of narrative identity and the emergence of personality disorders in adolescence. Carr Opin Psychol 2021 ; BP 49 – 53.Slargg K. Self - barm. Lancet 2005 ; X66 : 1471 – 83. Smith. B, Peinstein J5, Kuplicki R. et al. Perceptual inserusitivity to the modulation of isteroceptive signals in depression, assiety.and substance use disorders. So. Rep 2021.11 : 1108Smith R, Killgore WD, Lane RD. The structure of emotional experi -ence and its relation to trait emotional awareness : A theoretical review. Dnotion 2018 ; 1B : 670 – 92Smith R, Euglicki R, Peinstein J et al. A Bayesian computational model revenula a failure to adapt interceptive precision estimates across depression, anxiety, exting, and substance use disorders. PLoS Cowput Biol 2000.06 e10094HHSmith R, Lane RD. The neural basis of one ’ s own conscious and unconscious esotional states. Neuroci. Bidehaviorito15.57 : 1 – 29.Smith R, Parr T, Prisron XJ Simularizing emotions : an active inference model of emotional state inference and emotion concept learning. I ' writ hydril 2013 ; t0 :", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": "*Modeling and controlling the body in maladaptive ways* 9 \n\nWe next turned to active inference and discussed how reduc- \ning uncertainty (not just maximizing utility) is a key imperative \nin this framework. This implies that an active inference agent \ncan sometimes privilege uncertainty minimization over utility \nmaximization. In extreme conditions, such as when interocep- \ntive uncertainty is excessive or difficult to reduce, a person could \ndevelop maladaptive strategies to deal with it, such as acting on \nthe body to produce interoceptive sensations of pain or starvation \nthat reduce interoceptive uncertainty. \n\nDiscussion \n\nCurrent theories of predictive processing and active inference \nassume that, to steer adaptive perception and action, the brain \nforms internal generative models of the environment and of the \nbody within it. Various studies reveal that the brain has rich \nmodels of the body; for example, it integrates somatosensory \nand proprioceptive information into a coherent representation \nof things like body size and limb position—i.e. a “body schema.” \nMore recently, this model-based perspective has been extended to \ninteroception—and the rich sensations we constantly receive from \nthe internal body. Theories of interoceptive processing propose \nthat the brain continuously estimates key bodily and homeo- \nstatic variables, such as thirst or fatigue levels, perhaps forming \nsomething like an “interoceptive schema.” \n\nThe centrality of physiological processes and bodily informa- \ntion for the sense of self has been widely discussed by intero- \nceptive research (Seth et al. 2012, Quigley et al. 2021). Here, in \ncontinuity with previous works (Barca and Pezzulo 2020), we sug- \ngest that (i) some pathological behaviors—that “act on the body” \nin maladaptive ways—might be considered as strategies for mod- \nifying internal models and the sense of self when it is deficient, \nthrough bodily sensations and (ii) the sense of self can be defi- \ncient when bodily information is uncertain, and this can happen \nnot only in clinical conditions but also during pivotal periods of \ndevelopmental transition, e.g. in adolescence. \n\nA key reason for forming bodily or interoceptive models is \nthat they permit us to exert accurate control over the variety of \nsignals (e.g. somatosensory and interoceptive) that the body pro- \nduces. Forming an accurate body schema is prominent for motor \ncontrol, whereas modeling interoceptive variables (e.g. thirst) \nis key to keeping them under control by engaging autonomic \nreflexes (e.g. vasodilation) and allostatic or goal-directed actions \n(e.g. drinking) when they have incorrect values. The generative \nmodeling perspective can also be extended hierarchically to con- \nsider richer models of multimodal experiences and “embodied \nself” that persists in time and anchors our experiences, permit- \nting us to select adaptive courses of action to achieve our favorite \ngoals.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed1.pdf" + }, + { + "text": "Schwartenbeck, P.; Friston, K. Computational Phenotyping in Psychiatry: A Worked Example. eNeuro**2016**, 3, ENEURO.0049- \n16.2016. [CrossRef] \n\n14. \n\n15. Albarracin, M.; Demekas, D.; Ramstead, M.J.D.; Heins, C. Epistemic Communities under Active Inference. Entropy**2022**, 24, 476. \n\n[CrossRef] [PubMed] \n\n16. Lanillos, P.; Meo, C.; Pezzato, C.; Meera, A.A.; Baioumy, M.; Ohata, W.; Tschantz, A.; Millidge, B.; Wisse, M.; Buckley, C.L.; et al. \n\nActive Inference in Robotics and Artificial Agents: Survey and Challenges. arXiv**2021**, arXiv:2112.01871. [CrossRef] \nFriston, K.; Stephan, K.; Li, B.; Daunizeau, J. Generalised Filtering. Math. Probl. Eng.**2010**, 2010, 621670. [CrossRef] \n\n17. \n18. Waade, P.T.; Mikus, N.; Mathys, C. Inferring in Circles: Active Inference in Continuous State Space Using Hierarchical Gaussian \nFiltering of Sufficient Statistics. In Machine Learning and Principles and Practice of Knowledge Discovery in Databases; Kamp, M., \nKoprinska, I., Bibal, A.; Bouadi, T., Frénay, B., Galárraga, L., Oramas, J., Adilova, L., Krishnamurthy, Y., Kang, B., et al., Eds.; \nCommunications in Computer and Information Science; Springer: Cham, Switzerland, 2021; pp. 810–818. [CrossRef] \n\n19. Weber, L.A.; Waade, P.T.; Legrand, N.; Møller, A.H.; Stephan, K.E.; Mathys, C. The generalized Hierarchical Gaussian Filter. arXiv \n\n**2023**, arXiv:2305.10937. [CrossRef] \nFriston, K.J.; Trujillo-Barreto, N.; Daunizeau, J. DEM: A variational treatment of dynamic systems. NeuroImage**2008**, 41, 849–885. \n[CrossRef] \n\n20. \n\n21. MATLAB, Inc. MATLAB, version: 9.13.0 (R2022b); MATLAB, Inc.: Natick, MA, USA, 2022. \n22. Penny, W.D.; Friston, K.J.; Ashburner, J.T.; Kiebel, S.J.; Nichols, T.E. Statistical Parametric Mapping: The Analysis of Functional Brain \n\nImages; Elsevier: Amsterdam, The Netherlands, 2011; Google-Books-ID: G_qdEsDlkp0C. \n\n23. Heins, C.; Millidge, B.; Demekas, D.; Klein, B.; Friston, K.; Couzin, I.D.; Tschantz, A. pymdp: A Python library for active inference \n\nin discrete state spaces. J. Open Source Softw.**2022**, 7, 4098. [CrossRef] \n\n24. Rossum, G.v.; Drake, F.L. The Python Language Reference, Release 3.0.1 [repr.] ed.; Number Pt. 2 in Python Documentation Manual; \n\nvan Rossum, G., Drake, F.L., Eds.; Python Software Foundation: Hampton, NH, USA, 2010. \n\n25. Gregoretti, F.; Pezzulo, G.; Maisto, D. cpp-AIF: A multi-core C++ implementation of Active Inference for Partially Observable \n\nMarkov Decision Processes. Neurocomputing**2024**, 568, 127065. [CrossRef] \nJosuttis, N.M. The C++ Standard Library: A Tutorial and Reference; Addison-Wesley: Boston, MA, USA, 2012; Google-Books-ID: \n9DEJKhasp7gC. \n\n26. \n\n27. Bagaev, D.; Podusenko, A.; Vries, B.d. RxInfer: A Julia package for reactive real-time Bayesian inference. J. Open Source Softw. \n\n**2023**, 8, 5161. [CrossRef] \n\n28. Bezanson, J.; Karpinski, S.; Shah, V.; Edelman, A. Julia Language Documentation. 2016. Available online: https://readthedocs. \n\norg/projects/julia-wf/downloads/pdf/stable/ (accessed on 26 May 2024). \nvan de Laar, T.W.; de Vries, B. Simulating Active Inference Processes by Message Passing. Front. Robot. AI**2019**, 6, 20. [CrossRef] \n29. \n30. Vanderbroeck, M.; Baioumy, M.; Lans, D.v.d.; Rooij, R.d.; Werf, T.v.d. Active inference for Robot control: A Factor Graph \n\nApproach. Stud. Undergrad. Res. E-J.**2019**, 5, 1–5. [CrossRef] \n\n31. van de Laar, T.; ¸Senöz, ˙I.; Özçelikkale, A.; Wymeersch, H. Chance-Constrained Active Inference. Neural Comput.**2021**, \n\n33, 2710–2735. [CrossRef] \n\n32. Busemeyer, J.R.; Diederich, A. Cognitive Modeling; SAGE: Thousand Oaks, CA, USA, 2010; Google-Books-ID: R7KDF35g5LQC. \nSmith, R.; Friston, K.J.; Whyte, C.J. A step-by-step tutorial on active inference and its application to empirical data. J. Math. \n33. \nPsychol.**2022**, 107, 102632. [CrossRef] [PubMed] \n\n34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course, 1st ed.; Cambridge University Press: Cambridge, \n\nUK, 2014. [CrossRef]", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "At what stage of childhood does the construction of narrative identity take place?", + "target_page": 3, + "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "F et al. Inpatient adolescents with borderline personality disorder features : identity diffusion and narrative incoherence. Pers Disord Theory Res Treat 2019.103389 – 93θ3Lind M. Vanswoerden S. Penner F et al. Narrative coberence in adolescence. relations with attachment, mentalization, and psychology J Fen Assess 2010 ; 300 – 9-Linson A, Parr T, Friston KJ. Active inference, stressors, and psychological trauma : a neuroethological model of ( mal ) adaptive-explore - exploit dynamics in ecological context. Behav Brain Resil2020 ; 380 : 1124 : 21.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed1.pdf" + }, + { + "text": "NSSI in adolescence \n\nAdolescence is the period of developmental transition from child- \nhood to adulthood, which might be stretched up to the early \n20s due to current sociocultural changes (e.g. delays in complet- \ning education, occupational attainment, and parenthood) (Patton \net al. 2018). Among the challenges that adolescents have to face \nare the structuring of a “narrative identity” or self-story, featuring \nthe development of a sense of personal identity that integrates \npast experiences with current, and future goals and meanings in \na coherent whole over time (McAdams and McLean 2013, McLean \nand Lilgendahl 2019). The definition of the new boundaries of \nadolescents’ personal identity involves significant changes in the", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed1.pdf" + }, + { + "text": "uncertainty about one’s estimated state. This means that active \ninference agents tend to avoid ambiguous states, encompass- \ning the avoidance of ambiguous places where self-localization is \nchallenging, ambiguous social situations where safety is uncer- \ntain, and ambiguous bodily states, such as unsure feelings of \nfatigue. However, one apparent exception to this aversion to ambi- \nguity arises when exploring novel states implies the opportunity \nto learn new things and enhance one’s model; see Friston et al. \n(2017) for a discussion. Furthermore, and importantly, active infer- \nence agents will actively operate in the environment to reduce \ntheir ambiguity; for example, by actively seeking informative sen- \nsations that disambiguate in which location they are (e.g. by \nlooking for traffic signs), whether their social context is safe \nor unsafe (e.g. by trying to understand other’s intentions from \ntheir facial expressions and actions), or whether they are cur- \nrently fatigued (e.g. by putting attention to one’s heart), happy, \nor sad. \n\nreciprocity with caregivers and peers. Thus, in parallel to the \nnegotiation of identity with caregivers (through a relative detach- \nment from them, a renegotiation of intimacy, and the questioning \nof their confirmatory authority), the modifications of friendship \nstructures—from childhood to adolescence—lay the ground for \nthe progressive recognition of social contexts and peer relation- \nships as the elite territories for the modulation and exploration \nof personal identity. The redefinition that the adolescent has to \nface in these territories of exploration (of the self as an individ- \nual separated from the other and of the self with the other) might \npass through a phase of reduced coherence in the narration of \nthe self and hence an increased level of uncertainty. Coherence \nin the self’s narrative is considered a measure of well-being and \nhas been associated with psychopathology in adulthood (Klim- \nstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner \net al. 2021). For example, narrative incoherence has been found \nto be associated with personality disorders in adolescents (Lind \net al. 2019), where “identity diffusion” (e.g. feelings of emptiness \nand being fragmented and lack of a sense of continuity over time) \nmight be considered an expression of high levels of uncertainty of \nthe self. \n\nThe last examples—disambiguating one’s fatigue and emo- \ntional states—may seem strange if one assumes that we do have \ndirect access to the body- and allostasis-related states (e.g. states \nof satiation, thirst, and fatigue) and to our emotions (e.g. we \nautomatically know whether we are happy or sad). However, one \nassumption of active inference is that one’s bodily and emotional \nstates are not necessarily observable but, instead, “hidden states” \nthat need to be inferred on the basis of sensations (especially, \nbut not exclusively, of interoceptive sensations from the inside \nof the body) and of an implicit, unconscious model of how the \nbody functions (Barrett and Simmons 2015, Pezzulo et al. 2015, \nSeth and Friston 2016). In other words, the same inferential pro- \ncess that allows active inference agents to estimate the hidden \nstate of the external environment (e.g. the presence or absence of \nan object in the environment) is also used to estimate other hid- \nden states, such as fatigue, happiness, or sadness. This implies \nthat one can also be wrong, or be fooled, about these states; for \nexample, we could experience the “interoceptive illusion” of feel- \ning more fatigued than our physiological parameters would afford \n(Iodice et al. 2019).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "and rephrased and asked follow-up questions to clarify and confirm \nthe correct understanding of participants’ answers. \n\nAs similar themes arose repeatedly and no new themes \nemerged in the final interviews, data saturation was achieved (23). \n\nidentified meaning units \nand \ncoded them into groups. Condensates of the subgroups were \nwritten by SSHD and discussed by all researchers. SSHD then \nrecontextualized \ncategories \ndescribed as analytical texts supplemented by quotes, a process \nthat was discussed and revised several times by all authors. \nAll \nthe manuscript. \nEnactive theory was used to interpret the results, aiming at \ninformants \nextracting new knowledge beyond what \nhad provided (28). \n\nadhering to these themes \n\nthe material by forming \n\nThe transcribed material was analyzed using systematic text \ncondensation (STC) (30) and was organized utilizing NVivo \n(version 1.7.1). STC is a method for cross-case analysis inspired \nidentification \nby phenomenology. \noverall \nthemes from the empirical material, (2) extraction of \nmeaning units from the text which were then coded into groups, \n(3) condensation of all meaning units within the subgroups into \nrepresents \nan \nparticipants’ voices, (4) recontextualization of the material into \ncategories, presented as analytical texts. The process is iterative, \nresulting in continuous movement between the transcripts and \nwithin different steps of the analysis. An example of the STC \nprocess is illustrated in Figure 1. \n\nIt involves four-steps: (1) \n\n3 Results \n\nParticipants were interviewed one-on-one by the first author \n(SSHD) in November and December 2021 (mean = 14 days post- \noutdoor group). The time and place of \nthe interviews were \nagreed upon according to participants’ preferences (undisturbed \noffice (n = 14), participant’s home (n = 1)). None dropped out. \nThe interviews lasted between 40 and 70 min (mean = 54, total = \n822) and were audio-recorded. \n\nThe first author (SSHD) transcribed the interviews and read \nall material several times, while BN and ECA read most of the \ninterviews before preliminary themes were agreed on. SSHD The results are presented as four categories summarized in \nFigure 2 and described below as analytic texts and illustrative \nquotes referenced with the participant ID and EDSS score.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed13.pdf" + }, + { + "text": "[html]Liotti G. A model of dissociation based on attachment theory and research. JTnuma Dissoos 2006 ; P35 – 73. Maged : W, Nylsot Terpatoleg A. Schnij41, C. Tregle R. PsrsistMagerl : W, Burkart D, Fernandez A, Schmidt LG, Treede R. Persistent antinociception through repeated self - injury in patients with borderline personality disorder. Pain 2012 ; 575 – 94.Maisto D. Barca L. Wan den Bergh O et al. Perception and misperception of bodily symptoms from an active inference perspective. modelling the case of panic disorder. Psyckil Rev 2021.128 – 590 – 710.Malter Cohen M, Jing D, \" fang \" RR et al. Early - life stress has persistent effects on anygiplala function and development in mice and burnius. Pric Narl Acel Sci 0.5 A. 2013.110 : 182 \" 4 – 8McAdams DP, McLean KC. Narrative identity. Curr Dir Psychol. Sci 2013 ; Z2 : 233 – 8.McEvry PM, Mahoney AE. To be sure, to be sure : intolerance of uncertainty mediates symptoms of various araiety disorders and depression. Behav Ther 2012 ; 43 : 533 – 45McLean RC, Lilgendah1 JP. Narrative identity in adolescence and adulthood : pathways of development. In. Handlook of Pressulty Deorlopment. New Yisrk. United States : The Guilford Press, 2015 ; 418 – 32Miller M, Kiverstein J, Kietveld E. Embodying addiction : a predictive processing account. Brain Cogn 2000.13.105485.Moeller FG, Barratt ES, Dougherty DM et al. Psychiatric aspects of impulsivity Am J Psychiatry 2001 ; 158 : 1783 – 93.Murphy J. Viding E. Bird G. Does atypical intersception following physical change contribute to sex differences in mental illness? Psychol Rev 2015 ; 126 : 787 - 3Nock MK. Self - injury. Annu. Rev Clin Psychol 2010 ; 6.339 – 63.Nock MIC, < underline > osiner TTL Gordon XH et al. Non - suicidal self - injury among adolescents : diagnostic correlates and relation to suicide attempts. Psychiatry fies 2006 ; 54 : 65 – 72.Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social problem - solving deficits arroong, widolescent self - injurers. J Conswith Clin Psychol 2008a, 7628 – 38.Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social : problees - solving deficits among adolescent self - injurees. J Consist Clin Psychol 2008b, 7.28 – 38Nock MIC, Prinstein MJ A functional approach to the assessment of self - mutilative behavior. J Consult Clin Psychol 2004.72.885 – 90Nock MIC, Prinstein MI, Sterba SK Revealing the form and function of self - injurious thoughts and behaviors : a real - time enological assessment study among adolescents and yesurg adults ; J Almorm Psychol 2009 ; 11.816 – 27.Ogawa [ 8, Stoufe LA, Weinfeld NS et al. Development and the fragmented self : longitudinal study of dissociative symptomatology in a nonclinical sample. Doo hys / hystopothol 19978855 – 79 )Oxmanajpoijha N, Cressrell C, Dodd HF. Intolerance of uncertainty, anxiety, and worry in children and adolescents : a meta - analysis. J Affect Disord 2018.22.80 – 90.Paluska SA, Schwenk TL Physical activity and mental health : current concepts Sports Med 2000.29 : 167 – 80.Pair T, Pezzulo G, Trisston IQ. Active Inference. The Tree Dengy Principle in Mind, Body, and Behaviour. Carebridage, Massrachusetts, United States : The MIT Press, 2022Patton GC, Olsson CA, Skirbekk V et al. Adolescence and the oest generation. Nature 2018.554 : 458 –", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": "Emotion-wise, a developmental trend toward an increased \nspecificity of emotion-related maps of bodily sensations (Barca \net al. 2023)—a proxy of \ninteroceptive representations of \nemotions—has been reported from children aged 6 years to adult- \nhood (Hietanen et al. 2016). Pubertal changes encompass dramatic \nbodily and neuroendocrine system changes, comprising—but not \nreduced to—changes in the reproductive, adrenal, and growth \naxes (Cameron 2004). Thus, adolescents might face at least four \nsources of uncertainty: (i) the uncertainty due to physiological \nalterations related to bodily changes and to modification in hor- \nmonal levels leading to sexual maturity; (ii) the uncertainty in self- \nidentity (i.e. the structure of self-awareness) and personal identity \n(i.e, the narrative diachronic self) (Drummond 2021), which might \nbe coupled with changes in body image and the development of \ngender identity; (iii) the uncertainty in affect regulation, with the \nemergence of new forms of affectivity as feelings of love and sex- \nual attraction toward a partner; and (iv) uncertainty in the social \ncontext, with respect to their social status and role expectations \nin the adult society. Such high levels of uncertainty might lead \nto a poorly defined sense of self, with unclear boundaries and a \nsense of emptiness. In this context, pain becomes a possible way \nto recover a bodily sense of self, and self-injurious behavior might \nbe instantiated as an attempt to reduce the rise in the levels of \nuncertainty in these (and potentially other) domains, toward the \ntransition to adulthood (see Miller et al. 2020 for a closely related \napproach on addiction). \n\nExtending this idea even further, one can assume that cer- \ntain emotional states, as well as self-awareness and the (embod- \nied) sense of self—and the feeling of continually being the same \nperson—could be constructed similarly: it would be the result of \nan inferential process that integrates bodily sensations and other \nexperiences over time (Gu et al. 2013, Seth 2013, Stephan et al. \n2016, Barrett 2017). Figure 1 illustrates graphically this perspective \nby showing a (schematic) hierarchical generative model that links \n(exteroceptive, interoceptive, and proprioceptive) sensations at \nlower levels with multimodal models of hidden bodily states, such \nas fatigue and hunger at intermediate layers, and, finally, with \ntemporally extended, integrative models of the emotional and \nembodied self at the higher hierarchical level. The hierarchical \ngenerative model recapitulates a simple predictive coding archi- \ntecture, which includes various putative brain areas or networks \n(gray ovals) arranged hierarchically. In the schematic, networks for \nunimodal (exteroceptive, proprioceptive, and interoceptive) pro- \ncessing are situated at the lowest hierarchical level, multimodal \nnetworks are at an intermediate level, and networks for process- \ning a persistent model of the self are at the highest level. Note \nthat this simple schematic is not supposed to recapitulate brain \nanatomy but to illustrate the basic principles of hierarchical gen- \nerative models and predictive coding; (for a discussion of the \nmapping between predictive coding networks and brain anatomy, \nsee Parr et al. 2022). Each network includes cells encoding predic- \ntions (black nodes) and prediction errors (red nodes). These units \n\nActive inference, interoceptive processing, \nand uncertainty reduction", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "We focused on adolescence as a potentially critical period for \nNSSI, given that it is associated with high levels of uncertainty \nabout several central domains in human life. However, there \nare other (gender-related) developmental periods in which bod- \nily changes might be coupled with increased levels of uncertainty \n(e.g. in physiology, in the sense of self, in the social role) and vulner- \nability. Pregnancy and transition to menopause, e.g. are periods of \nendocrine and hormonal upheavals that might impact a woman’s \naffective life and well-being. These physiological changes are cou- \npled with a fundamental developmental transition that requires a \nredefinition of personal identity and narrative integration (McLean \nand Lilgendahl 2019), with increased uncertainty of one’s inter- \nnal states and role in the social context. Taking into account \nthe perimenopausal and menopausal transition, the physiologi- \ncal, psychological, and affective experiences associated with it are \nvery heterogeneous. Some women might experience it as a new \nbeginning, whereas for others, it may be more critical (Deeks 2003). \nIn some cases, e.g. the menopause transition might perturb the \ncontinuity of one’s sense of self, inducing discrepancies in inter- \nnal self-coherence (e.g. the end of childbearing years, the aging \nprocess), which might increase the level of distress (Barca and De \nMarchis 2018). \n\nReferences \nAbraham E, Hendler T, Zagoory-Sharon O*et al.*Interoception sensi- \ntivity in the parental brain during the first months of parenting \nmodulates children’s somatic symptoms six years later: the role \nof oxytocin.*Int J Psychophysiol*2019;**136**:39–48. \nAdams RA, Stephan KE, Brown HR*et al.*The computational anatomy \nof psychosis.*Front Psychiatry*2013;**4**:1–26. \n\nArciero G, Bondolfi G.*Selfhood, Identity and Personality Styles*. 1st edn \nHoboken, New Jersey, United States: John Wiley & Sons Inc, 2009. \nBarca L, Candidi M, Lancia GL*et al.*Mapping the mental space \nof emotional concepts through kinematic measures of decision \nuncertainty.*Philos Trans R Soc Lond B Biol Sci*2023;**378**:20210367. \nBarca L, De Marchis MD. The case of Sofia: an example of the dynamic \nproperties of the therapeutic relationship. 2018. \n\nBarca L, Pezzulo G. Keep your interoceptive streams under control: \nan active inference perspective on anorexia nervosa.*Cogn Affect*\n*Behav Neurosci*2020;**20**:427–40. \n\nThe dramatic changes that a women’s physiology undergoes \nduring life have been suggested to concur with the atypical \ninteroception often reported (e.g. heightened interoceptive atten- \ntion but poor interoceptive accuracy), which might contribute \nto their greater vulnerability to mental illness (Murphy et al. \n2019). Although this is still a speculative hypothesis that needs \nto be tested empirically, the effect of these transition periods on \nwomen’s well-being is currently overlooked and deserves more \nattention. \nBarrett LF.*How Emotions Are Made: The Secret Life of the Brain*. Boston, \nMassachusetts, United States: Houghton Mifflin Harcourt, 2017. \nBarrett LF, Quigley KS, Hamilton P. An active inference theory \nof allostasis and interoception in depression.*Philos Trans R Soc Lond*\n*B Biol Sci*2016;**371**:20160011. \n\nBarrett LF, Simmons WK. Interoceptive predictions in the brain.*Nat*\n*Rev Neurosci*2015;**16**:419–29. \n\nBowlby J.*Attachment and Loss: Attachment*. London, UK: Pimlico, 1997. \nBresin K, Gordon KH. Endogenous opioids and nonsuicidal self- \ninjury: a mechanism of affect regulation.*Neurosci Biobehav Rev*\n2013;**37**:374–83.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed1.pdf" + }, + { + "text": "font-size: 10px;\n }\n \n \n \n [html]", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed1.pdf" + }, + { + "text": "Abraham et al. (2019) evaluated a number of features of the \nneurobiological interoceptive circuit (e.g. the functionality of the \namygdala, insula, and oxytocinergic system) in parents and chil- \ndren over the first 6 years of parenthood. Results revealed a critical \nassociation between parental interoceptive sensitivity—indexed, \ne.g. by increased bilateral activation of the anterior insula in \nresponse to a video of his/her interacting with his/her infant— \nthe consolidation of the child’s interoceptive circuit and mental \nhealth. Taken together, thus, consistent evidence indicates that \nparental ability to respond appropriately to the children’s needs \nand bodily signals supports the child’s ability to adequately repre- \nsent his/her internal bodily states, concurring in the development \nof self-processes (Fotopoulou and Tsakiris 2017, Ciaunica et al. \n2021a, 2021b). The degree of predictability of caregivers’ response \nappears to be critical for the development of affect regulation \nand a cohesive sense of the self (Ilyka et al. 2021). When care- \ngivers’ behavior is less reliable, children have more difficulties in \ndistinguishing their own internal states, making self-other dis- \ntinctions (Ogawa et al. 1997, Dutra et al. 2009), and—in the most \nsevere cases—developing an integrated sense of the self (Liotti \n2004, 2006). \n\nA central theme of inferential models of cognition, like active \ninference, is that actions are motivated by both “utilitarian” imper- \natives, such as reward achievement, and the “epistemic” impera- \ntive to reduce uncertainty about one’s state (intended in a broad \nsense, from bodily state to one’s identity and self-models). Var- \nious researchers proposed that paradoxical behaviors could be \nmotivated by reward achievement since they have (paradoxically) \npositive effects, such as relief from emotional distress and nega- \ntive affect (Nock and Prinstein 2004, Chapman et al. 2006, Bresin \nand Gordon 2013, Selby et al. 2019). Here, we advance a com- \nplementary perspective by suggesting that these behaviors might \nappear less paradoxical when considering that they could serve \nuncertainty minimization imperatives. For example, we recently \nsuggested that the starvation observed in restrictive anorexia \nnervosa could serve the imperative of minimizing “interoceptive \nuncertainty” or the uncertainty about one’s interoceptive state— \nstretched up to the uncertainty of the self—which might be partic- \nularly severe when people receive ambiguous interoceptive signals \nfrom the body, when they have poor models of their bodily or emo- \ntional state, or when they are particularly intolerant to high levels \nof uncertainty (Barca and Pezzulo 2020).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + }, + { + "text": "Barca*et al.*\n2 \n\nsituations—from reduced affective reciprocity during parental \ninteractions (Conradt and Ablow 2010). Development theories \nunderscore the role of parental care in shaping the experience of \nself and others and integrative processes of consciousness (Bowlby \n1997, Liotti 2004, 2006, Fonagy et al. 2023). \n\n**Highlights**\n\n• Predictive processing theories assume that the brain \nforms internal body and self-models at multiple levels \nof detail and strives to reduce their uncertainty. \n\n• High levels of uncertainty in internal models of the body \nand the self are common across several clinical condi- \ntions. \n\n• Excessive levels of uncertainty might also be experienced \nin the typical population during development transitions. \n• This excessive uncertainty might hinder the mainte- \nnance of a coherent model of the embodied self and \nconfidently engage in adaptive courses of actions. \n\n• Maladaptive behaviors, such as non-suicidal self-injury, \nmight emerge as paradoxical but effective strategies to \n“act on the body” to reduce uncertainty \n\nDuring infancy, a child starts making sense of her internal \nexperiences through the information she gets from the external \nworld, most notably from caregivers whose behavior has a fun- \ndamental regulatory function shaping emotional development, \nstress physiology, and refinement of limbic circuitry (Gee 2016). \nIn addition to the quality of caregivers’ response to the infant’s \nneed for proximity, its “predictability” supports the development \nof emotions’ regulatory capacity (Gee and Cohodes 2021; Wu and \nFeng 2020) and a cohesive sense of self (Arciero and Bondolfi \n2009), increases prosociality (Deneault et al. 2023), and influ- \nences the development of social brain structure (see Ilyka et al. \n2021 for a review). Self-report assessment of exposure to unpre- \ndictability during early life appears to predict symptoms of anx- \niety, depression, and anhedonia in adulthood (Glynn et al. 2019). \nEvidence from cross-species studies indicates that the predictabil- \nity of caregivers’ behavior in rodents may specifically influence \nthe offspring’s development of corticolimbic circuitry involved in \nemotion-related functioning (Glynn and Baram 2019). Rodents \nexposed to unpredictable maternal care exhibit atypical amygdala \nfunctioning (Malter Cohen et al. 2013) and weaker connectivity \nwith the medial prefrontal cortex (Guadagno et al. 2018). \n\nsimilar because they explicitly target the body, with self-induced \nhunger or painful sensations, to modify bodily and interocep- \ntive experiences. This perspective helps contextualize harmful \nbehaviors within an “interoceptive inference” framework, which \nassumes that (interoceptive) bodily sensations and their regula- \ntion are key for affectivity, mental health, conscious processes, \nand the self (Craig 2002, Seth et al. 2012, Barrett and Simmons \n2015, Pezzulo et al. 2015, Paulus et al. 2019, Quigley et al. 2021), \nwhich could provide novel insights on why people do things to \nharm themselves intentionally.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", + "target_page": 46, + "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "T E C H N O L O G Y \n\n\n\nWe have succeeded in shortening our production \n\npipeline, too, using a new vehicle development process \n\ncalled V3P that our engineers devised over the past three \n\nyears. V3P, which stands for Value-up innovation of \n\nProduct, Process, and Program, has helped us cut our \n\ndevelopment time almost in half, from 20 months to just \n\n10.5 months. I believe this makes Nissan the world \n\nbenchmark in development. That improvement is having a \n\nmajor effect on the flexibility and execution of R&D at \n\nNissan, and will ultimately boost the company’s profitability. \n\nThe number of new products we have brought to \n\nmarket over the past three years is equally significant— \n\nmore than thirty new vehicles. That’s an impressive \n\nengineering achievement, and the reason you are seeing \n\nso many new Nissan models on the road. \n\nOur R&D infrastructure, however, is still in need of \n\nexpansion. We’ve therefore begun building new facilities at \n\nthe Nissan Technical Center, NTC, and at the Nissan \n\nAdvanced Technical Center, NATC, both of which are in \n\nJapan. These additions represent a major investment, and \n\nshow Nissan’s dedication to maintaining and enhancing its \n\ntechnological skills. \n\nOur technology base is in Japan, where we have some \n\nten thousand people involved in R&D, but we also have two \n\nmajor centers in North America and Europe, and smaller \n\noperations in Taiwan, China, Thailand, South Africa and \n\nBrazil. In the past, these entities were mostly standalone \n\noperations, but today there are many more joint projects \n\n**Pursuing Value Through**\n**Technological Excellence**\n\n“I have two prime objectives. The first is to realize our \n\ncorporate vision, ‘Enriching people’s lives,’ from an \n\nengineering standpoint. The second is to create a \n\nfuture vision for people working in R&D. Research and \n\ndevelopment is all about providing practical value to \n\nthe customer via technological excellence, which in \n\nturn creates value for our shareholders. Nissan has \n\nmade a major commitment to technological excellence \n\nso that we can accomplish these objectives. \n\n**Research and Development**\n\nNissan’s investment in R&D has been rising. In fiscal 2004 \n\nwe devoted approximately ¥400 billion to it, equivalent to \n\n4.6 percent of our turnover. We estimate that our financial \n\ncommitment to R&D will continue to range between 4.5 \n\nand 5 percent. R&D investments take a lot of time to pay \n\noff, of course, so it’s difficult to evaluate our evolution \n\nover the short term. Given our expanded output, however, \n\nI believe that we are headed in the right direction. \n\nFor example, the number of patents we have generated \n\nis growing quickly, exceeding 4,000 in fiscal 2003—more \n\nthan twice the fiscal 1999 figure. And the number of \n\nresearch papers we present at societies such as The Japan \n\nSociety of Mechanical Engineers rose dramatically in fiscal \n\n2004. These are direct results of our commitment to \n\nresearch. We are also generating more new technologies \n\nrelated to safety and the environment, such as the Around \n\nView Monitor and the lane-keeping system.", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "DESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS \n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED \n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR \n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH \n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS. \n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will \n\nbe evaluated based on the price-earnings ratio (PER) and \n\nvolatility relative to our major competitors. PER is used to \n\nmeasure how successfully the IR team manages market \n\nexpectations about Nissan in order to maintain the Nissan \n\nshare price close to an intrinsic value. The other measure, \n\nvolatility, is used to measure the risk investors perceive \n\nwhen considering Nissan stock. If Nissan can successfully \n\nreduce volatility, the minimum return required by investors \n\nshould decline. The IR team believes that a strengthening \n\nof disclosure activities is required to improve both \n\nmeasures. The team plans to disclose not only financial \n\nresults but also more forward-looking information about \n\nNissan fundamentals such as technology and product. \n\nSuch forward-looking information helps investors to \n\nforecast future performance more precisely and reduces \n\nuncertainty about the future. As a consequence, Nissan will \n\nincrease the number of investor conferences, events, and \n\nteleconferences during fiscal 2005. \n\n**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. \n\n**Five-Year Share Performance**\n(Index: April 3, 2000=100) \n400 \nNissan \n300 \n\n200 \nTOPIX Transportation Equipment Index \n100 \nTOPIX \n80 Apr. \nMay June July Aug. Sept Oct. Nov Dec. \nJan. \n**2005**\n**’01** **’02** **’03** **’04** **’05**\n0 \n**2004**", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. \n\nIn light of these factors, our forecast for fiscal 2005 is as follows. This is based on a foreign \n\nexchange rate assumption for the year of ¥105 per dollar and ¥130 per euro: \n\n• Net revenue is predicted to be ¥9 trillion, up 4.9 percent. \n\n• Operating profit is expected to be ¥870 billion, up 1 percent. \n\n• Ordinary profit is expected to reach ¥860 billion, up 0.5 percent. \n\n• Net income is predicted to be ¥517 billion, up 0.9 percent. \n\n• Capital expenditures are expected to reach ¥540 billion, up 13.1 percent. \n\n• R&D expenses are forecast to reach ¥450 billion, or 5 percent of net sales, up 13.0 percent. \n\n• ROIC is expected to remain at or above 20 percent.", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n
co - etribdiznent to co - bameostasis in early life. Conscious Cogn 2002.1a, 91 : 1091.17Clautica A, Safron A, Delafa6l6 Rutt J. Back to square one : the bodini. ly roots of conscious experiences in early 10 %. Newnsol Conscious 20021. niab037.
Consradt : E, Ablow J. Infant, physiological : response to the still - face paradigm : contributions of : maternal sessitivity and infants ' early regulatory behavior. Infant Behav Des 2013.251 – 65.Craig AD : How do you feel? Interoception : the sense of the physiological crandition of the body. Nat Research 2002 ; B < 55 – 66. Cruziazedili L, Knabe C, Jeskizoon PM et al. Interceptive ingredients of hody ownership : affective touch and ca
rubber band illusion. Cortex, a Journal Devoted to the Study of the Nemsous Sjostem and Behavior 2018.104 : 180 – 92.Deeks AA. Psychological aspects of menopause management. Best Pract. Res Clin Drdocrinol Metab 2003 ; < underline > D 17 – 31.
Denexult A, Hammond Sl, Madigan S. A meta - analysis of child - parent attachment in early childhood and prosceiality. Deolop - mental Psychology 2023 ; 58 : 236 – 55Diegsest S, Lopez C The bodi. ly self. insights from clinical and experimental research. Arm Phys Rehaliil Mell 201.60 : 598 – 207.
Drustsmond JJ, Self - identity and personal identity. Phenomenol Coge Sci 2021.201235 – 67.Dutra L. Bureeus J - F, Holznes B et al. Quality of early care and child - hood trauma. a prospective study of developmental partbways to dissociation. J. Nerv Ment Dis 2009.507.983 – 90.
Forwagy P, Caregibell C, Luyten. P. Attachment, mentalizing and traucess then ( 3993 ) sed now ( 2002 ). Invision So : 2003 : 33.459Fotopoulosa, Tliakiris M. Mentalizing homeostasis the social origins of istereoceptive inference. NewngTriston IC A theory of cortical responses. Philiss Trans R. Soc Lonil B Biol Sci 2005 ; 36.815 – 36.
Priston K, Lin M, Frith CD et al Active inference, curiosity and insight. Noural Comput 2017.29 2633 – 83.Friston KJ, Stephan KE, Montague R et al. Computational psychiatry : the brain as a phantastic organ. Lanort Psychiatry 2014.1148 – 58.
Garfinkel SN, Nagai Y, Seth AK et al. Neuroimaging studies of interroception and self - awareness. In : Neuroimaging of Concinumonas Springer Berlin, Heidelberg Springer, 2013.207 – 24Gee DG. Sensitive periods of emotion regulation : influences of parental rare on frantoamygdala circuitry and plasticity. Nnu Dir Child Adolesc Dev 2016 ; 2016 ; 2016 ; 87 – 210.
Gee DG and Cohodes EM. Influences of Caregiving on Development : A Sensitive Period for Biological Embedding of Predictability and Safety Cues. Cwr Div Psychol Sci 2021, D0 376 – 83.Glynn LM, Biram TZ. The influence of varpredictable, fragmented parestal signals on the developing brain. Pront Neuroeniborinel 2013 ; 53 : 100756.
Glynn LM, Stem IHS, Howland MA et al. Meanaring tovel antecedents of mental illness : tbe questionnaire of unpredictability in child - hood. Neuropsychopharmacol 2013 ; 44 : 876 – 82.Guadagpo A, Kang MS, Deveryi GA et al. Reduced resting - state functional connectivity of the basolateral amygdala to the medial
\n [html]on research and development by 50 percent. Over the next three years we will invest a further S percent of net sales annually, creating new and exciting technologies to benefit our customers.During NISSAN Value - Up we will pursue several key business opportunities :• Our Infiniti luxury brand will extend its reach into new markets such as China and Russia and continue to establish its credibility as a Tier - 1 luxury player.• We will develop our Light Commercial Vehicle biomarkers in and supporting ( E. g., 0 ). nursestic, negativebusiness into a fully competitive global operation through new market and product entries.• We will take a more efficient global sourcing approach to maximize our opportunities and minimize\n
Volume : Nissan will achieve global sales of 4.2 million units in fiscal 2008 — an increase of 812.000 units over fiscal 2004.
ROIC : Nissan will achieve a 20 percent or higher return on invested capital on average over the course of the plan, excluding cash on hand.
To meet this commitment, over the NISSAN Value - Up period we will launch 28 new products, including 10 models that are highly innovative in their concept and benefits.
Our investment in advanced technology continues. From facal 2002 to 2005 we have increased spending
our overall costs as we grow. Our engineering, production and purchasing functions will continue
their acceleration towards being fully integrated global operations.
We will continue to invest in new and emerging markets, including China, India and Russia.
NISSAN Value - Up also delivers increased value for our shareholders through a clear and well - defined dividend
strategy. By the end of the plan period, we will pay an annual dividend of no less than 940 per share, a 66
percent increase over fiscal 2004.
", + "page_start": 4, + "page_end": 4, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "(% of net revenue) \n5.8% \n**478**\n6 \n427 \n**5.6%**\n**398**\n4.8% \n354 \n5 \n**4.6%**\n300 \n4 \n\n3 \n**’04**\n\n**Corporate Rating**\n**Investment in Our Future**\n(Billion Yen) \nAa3 AA– \n5.5% \n500 \nA1 A+ \n5.3% \nA2 A \nR&I 378 \n400 A3 A– \n4.4% \n4.2% 326 \n4.1% Baa1 BBB+ \n4.0% \nS&P 3.8% \nBaa2 BBB \n262 \n300 \n239 244 \n3.4% 232 Baa3 BBB– \nMoody’s 206 \nBa1 BB+ \n200 \n**’99** **’00** **’01** **’02** **’03** **9/01 4/02 9/02 4/03 9/03 4/04 9/04 4/05 5/05**\nCanton plant investment included from fiscal year 2001 \n\n**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. \n\n**Dividend**\n\nAt the annual general meeting of shareholders on June 21, \n\n2005, the company proposed increasing its dividend to \n\n¥24 per share in 2004, up from ¥19 in 2003. In the first \n\nyear of the NISSAN Value-up dividend policy, the \n\nCompany plans to increase the per-share dividend to ¥29 \n\nin 2005. By the end of NISSAN Value-up in March 2008, \n\nNissan plans to pay an annual dividend of no less than \n\n¥40 per share. \n\n**Return on Invested Capital (ROIC)**\n\nNissan’s investments are made within the strict guidelines \n\nof its automotive operating ROIC. Based on these \n\nguidelines, Nissan reached 20.1 percent of ROIC on a \n\nconsistent basis as of fiscal 2003. \n\n**Dividend Policy**\n(Dividend per share, in yen) \n\n40 \n34 40 \n29 \n24 30 \n19 \n14 20 \n8 \n7 \n10 \n0 \n0 \n**’99** **’00** **’01** **’02** **’03** **’04** **’05*** **’06*** **’07***\n*Forecast", + "page_start": 15, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**R&D Investment**\n\n(Billion yen) (% of net revenue) \n4.8% \n4.4% \n4.6% \n500 5 \n4.2% \n3.8% 398 \n354 400 4 \n300 \n262 \n300 3 \n232 \n200 2 \n\n100 1 \n\n0 0 \n**’00** **’01** **’02** **’03** **’04**\n\nand much more collaboration. The core engineering is \n\ncommon to all—that’s why the different organizations can \n\nwork together so closely, and why we’re more efficient \n\ntoday. While each engineering center remains responsible \n\nfor meeting the specific tastes or specifications that its \n\nlocal market demands, we have global oversight to ensure \n\nconsistency, with NTC supervising overall resource \n\nmanagement and facility investment. \n\nWe are building on these strengths through greater \n\ncollaboration with our suppliers—our project partners—and \n\ndoing it much further upstream. For example, we are \n\ncreating a facility at the NATC where we can disclose our \n\nplans to suppliers during the very early planning stages. \n\nThis means we have to be much more open than before, \n\nbut in return we will gain a great deal from the ideas our \n\npartners bring. \n\nThe Alliance with Renault is another major strength for \n\nNissan R&D. We identify areas of mutual interest and \n\ndecide which party will develop specific projects. Our basic \n\noperating principle is to avoid duplicated efforts. We can \n\nwork separately, or together if there is mutual interest in \n\nthe development. For example, we have studied fuel-cell \n\nvehicles—FCVs—as well as, advanced materials, safety, \n\nand other areas together. Our shared goal is to maximize \n\n**Patent**\n\n(xxxxxxx) \n5,000 \n\n4,000 \n\n3,000 \n\n2,000 \n\n1,000 \n\n0 \n**’99** **’00**\n\nO \nU \nR \n\nW \nO \nR \nK \n**Research Paper**\n\n120 \n100 \n80 \n60 \n40 \n20 \n0 \n**’00** **’01** **’02** **’03** **’04**\n\nThe number of research papers presented at JSME (The Japan Society of \nMechanical Engineers), JSAE (The Society of Automotive Engineers of Japan), SAE \n(The Society of Automotive Engineers), FISITA (The International Federation of \nAutomotive Engineering Societies)", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Q U A L I T Y \n\n\n\n**The Quest for Improved Quality**\n\n“Quality is a crucial factor in Nissan’s success. Along \n\nwith trust, familiarity and differentiation, it is one of \n\nthe ways we express our brand. Quality builds the \n\ntrust of our customers and stakeholders, so it is also \n\na major element in promoting the brand. \n\nQuality was a major issue for us in 2004. We were \n\nunable to reach the global goals we set because a \n\ngreat deal of time was spent addressing issues that \n\narose, particularly in the U.S. The good news is that in \n\nall our newly launched vehicles, including those from \n\nthe U.S., we are seeing radically better quality. This is \n\na direct result of implementing a global quality \n\nmanagement system. While such positive outcomes \n\nare welcome, we must continue to upgrade the \n\nquality of Nissan automobiles. \n\nTo be frank, the quality programs of the past no longer suit \n\nour organization. During the NISSAN 180 period, we \n\nredefined the Nissan Product Quality Policy and \n\nreorganized its elements. The new Quality Policy sets three \n\ngoals. First, our product quality must be in the top three \n\namong automakers. Second, we will establish uniform \n\nglobal quality standards; this is not a single-fix solution, \n\nhowever, since each region may have its own requirements. \n\nAnd third, we will implement and continuously improve \n\nthe Nissan Quality Assurance Way, a global quality \n\nassurance system. \n\nThe Quality Policy is a top-down process, whereas the \n\nAssurance Way is bottom up. The Assurance Way can be \n\nsummarized as follows: \n\nFirst, we will set clear, reasonable, understandable \n\ntargets for each activity, and review milestones along \n\nthe way. \n\nSecond, because problems are usually discovered late \n\nin the process, we want to front-load the problem-discovery \n\nprocess by moving it further upstream. We must predict", + "page_start": 50, + "page_end": 50, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Due to changes in government regulations, information on risks \ninvolved in business operations has been disclosed in the \nYukashoken-Houkokusho for the year ended March 31,2005 \nas follows: \nand that the outcome may be significantly different from that anticipated. \nAs a result, any such verdict or settlement could adversely affect Nissan’s \nfinancial position and operating results. \n\nGovernment Regulations \nThe automobile industry worldwide is influenced by a broad spectrum of \nregulations governing the emission levels of exhaust fumes, fuel economy \nguidelines, noise level limitations and safety standards, and Nissan expects \nthese regulations to become increasingly stringent. In order to ensure \ncompliance, it may be necessary for Nissan to make significant ongoing \ninvestments in these areas which would have an impact on its financial \nposition and results of operations. \n\nEconomic Factors \nThe demand for products manufactured by Nissan is affected by the \neconomic conditions in each country or market in which they are offered \nfor sale. Nissan conducts its operations all over the world and, in particular, \nin the major markets of North America, Europe, and Asia, to say nothing of \nJapan. While Nissan strives to develop a comprehensive and integrated \nprojection of the global economic outlook, any greater-than-anticipated \ndownturn in one of these markets may have a significant effect on Nissan \nfinancial position and results of operations. \n\nInternational Activities and Overseas Expansion \nNissan’s manufacturing and marketing activities outside Japan are \nconducted in the United States, in Europe, and in the developing and \nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of \nrisks inherent in doing business in such overseas markets including the \nfollowing factors, each of which entails a greater-than-anticipated level of \nrisk: \n\nIntellectual Property Rights \nNissan owns a wide variety of proprietary technologies and has the \nexpertise to differentiate Nissan’s products making them unique from \nthose of its competitors. These assets have proven their value in the \ngrowth of Nissan’s business and will, no doubt, continue to be of value in \nthe future. Nissan strives to protect its intellectual property assets; \nhowever, in certain markets, Nissan may encounter difficulty in fully \nprotecting the proprietary rights to its own technologies. Cases may arise \nwhere Nissan finds itself unable to prohibit others from infringing on its \nintellectual property rights. \n\n• Unfavorable political or economic factors \n• Legal or regulatory changes \n• Potentially adverse tax consequences \n• Labor disputes including strikes \n• Difficulties in recruiting and retaining personnel \n• Social, political or economic turmoil due to terrorism, war, or other \nThe Company has established Intellectual Property Rights Management \nDepartment for the purpose of protecting intellectual property rights in \nspecific areas, strengthening activities to protect Nissan’s intellectual \nproperty rights, and abstracting new intellectual property rights. And the \ndepartment has been performing various activities to protect and create \nNissan Brand. \ndestabilizing factors. \n\nResearch and Development \nNissan’s technology must be “real world”—useful, pragmatic and easy to \nuse. Nissan anticipates the nature and scope of the market demand, and \nthen prioritizes and invests in new technologies. Nonetheless, any sudden \nand greater-than-anticipated changes in its business environment or in \ncustomer preferences may impact negatively on customer satisfaction with \nthese new technologies.", + "page_start": 72, + "page_end": 72, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was Nissan's vehicle production in Mexico in 2003?", + "target_page": 72, + "target_passage": "308,322", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Nissan Canada, Inc. Mississauga, Ontario \n\n\n \n \n \n \n [html]\n
MexicoNissan Mexicana, S. A. de C. V.Mexico D. F.Manufacture and sales of automobiles and partsP17.056
100.00
\n\nE \nT \nA \nR \nO \nP \nR \nO \nC", + "page_start": 107, + "page_end": 107, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY \n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL \n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND \n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. \n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. \n\nTHIS IS THE NISSAN SHIFT_\n\n\n\n\n\n\n\n\n\nO U R W O R L D", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Exceeding expectations**\n**—the Nissan automobile**\n\n\nAt the center of everything we do stands the Nissan automobile. Our vehicles are the most \n\ntangible expression of our brand and the values of our company. We make cars that both inspire \n\npassion and exceed the expectations of our customers. Through bold and thoughtful designs, \n\ninnovative technologies, and a richer and more rewarding driving experience, we are defining \n\nour unique place in the auto industry. \n\nOur product development philosophy differs from that which many of our competitors follow. \n\nRather than focus on what the competition is providing, we concentrate on what they do not. \n\nWe listen to drivers to discover their unmet needs and desires, and follow the most promising \n\nthreads of emerging trends. Our designs are bold, geared to electrify and inspire. We see little \n\npoint in building vehicles that please everyone but excite no one. \n\nThe appeal of a Nissan goes much deeper than the fine lines of its body and the gleam of \n\nits paint. We make some of the world’s most advanced high-performance engines and \n\ntransmissions. From our renowned VQ engine series to the latest in high technology, \n\ncontinuously variable transmissions (CVT), we blend driving pleasure with safety, fuel efficiency, \n\nand real-world environmental solutions. \n\nNissan has a long history of leadership and innovation in the automotive industry. We began \n\nour quest to create the best cars in the world in 1933, when the company was founded in \n\nYokohama. The first Datsun passenger car rolled off the assembly line two years later. In the \n\nyears since, we have fashioned a reputation for bold and innovative products. We were the first \n\ncompany to design, manufacture and export a small pickup truck from Japan to the United \n\nStates, and to build and export a sports sedan, the Datsun 510. And we were the first to \n\nproduce a true sports car that was also affordable, the Z. Today, we build equally exceptional \n\nvehicles in factories throughout the world that consistently rank in the top tier for efficiency, \n\nproductivity and quality. \n\nIn the future, we will take the Nissan brand into new segments and markets. We will \n\naccelerate the pace of automotive evolution. And our products will continue to define our brand \n\nwith clarity and consistency that brings lasting value to all our stakeholders.", + "page_start": 23, + "page_end": 23, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. \n\n**Nissan 180 commitments**\n\nFiscal 2004 marked the end of our NISSAN 180 business plan. Obviously, NISSAN 180 cannot \n\nbe closed completely until the end of September 2005, but we know that we have already \n\ndelivered two of the plan’s three critical commitments. \n\n• We committed to an 8 percent operating profit margin, and our margin has been at or above \n\n10 percent for every year of NISSAN 180. \n\n• We committed to zero debt, and today we have more than ¥200 billion in net cash under the \n\nnew and more demanding accounting standards. \n\n• Our only remaining commitment is to achieve one million additional sales. Even here we are in \n\nreasonably good shape. At the midpoint of the measurement period we are at 1,809,000 units, \n\nwhich is a slight advance compared to our commitment to reach 3,597,000 units by the end of \n\nSeptember 2005.", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Aftersales**\n\nJ U N I C H I E N D O \nSenior Vice President \n\n“Aftersales was established in 2002 because Nissan \n\nwanted to expand the scope of what was once the \n\nParts Division. Our primary objective is to extend the \n\nvalue chain. We are trying to engage new-car owners \n\nfor a longer time by offering an extensive range of \n\nattractive aftersales products. These products \n\ninclude parts, service contracts, conversion—both \n\naccessories and customization—and new service \n\nmethods such as quick inspection and quick body \n\nrepair. Global Aftersales covers the downstream \n\nbusiness in cooperation with other marketing and \n\nsales divisions. \n\nand management. To increase service productivity and \n\nefficiency, we send former factory foremen and engineers \n\nto various service workshops to analyze service staff \n\nperformance. This will help cut repair times and improve \n\ncustomer satisfaction. The Nissan Sales and Service Way is \n\nalso a tool used to increase the quality of service provided \n\nby all dealers. Its successful implementation has enhanced \n\ncustomer satisfaction worldwide. \n\nThe conversion business in Japan looks very promising. \n\nWe discovered that 50 percent of car owners want to \n\ncustomize their vehicles, and 28 percent already had. Such \n\na high penetration rate illustrates how much people want a \n\ncar that’s different from everyone else’s. The Rider series— \n\ncustomized versions of Nissan cars developed by our \n\nwholly owned subsidiary Autech—are very popular, \n\nespecially among younger Japanese. The series \n\nexemplifies the major potential of the conversion business. \n\nGlobal Aftersales is a young division, but we’ve \n\nperformed well from the start, meeting our global \n\ncommitments every year during NISSAN 180 and \n\ncontributing to the Company’s growth. We have expanded \n\nnearly 20 percent year-on-year between 2001 and 2004, \n\nand intend to continue this momentum during NISSAN \n\nThis has become an increasingly global function as we \n\ndeploy and monitor various programs throughout the world. \n\nFor example, Project SX, the new Nissan service standard, \n\nshould drastically improve dealer service operations. This \n\nprogram educates dealers on how to be more customer- \n\noriented by providing insights into productivity, marketing \n\n\n\nValue-Up. We will optimize our cost structure by sourcing \n\nparts from the leading competitive countries. We are \n\nstriving to develop an even tighter relationship with our \n\ncustomers and to provide them with new services \n\nthroughout the ownership cycle. I believe this broader \n\nrange of aftersales services will provide sustainable growth \n\nin Nissan’s revenues and profit.” \n\nMMoottoorrssppoorrttss \n\nM O T O R S P O R T S \n\nMotorsports is a dynamic form of marketing that \noffers a natural forum for presenting the Nissan \nbrand. On the track, Nissan’s technologies are \npushed to the limit—and sometimes beyond— \nunder grueling conditions. This is the most popular racing series in Japan, \nand is increasingly broadcast around the world. \nMotorsports will remain an important marketing \noutlet that enhances both Nissan’s brand \npresence and our engineering capabilities. \n\nNissan participates in a wide range of \nmotorsports, including the Super GT Series.", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Asia/Oceania**\n\n**A Solid Strategy for Growth**\n\nto export parts and components from Thailand worldwide, \n\nwhich will result in a great cost advantage. We see more \n\nopportunities in Malaysia and Indonesia as well. \n\nTwo other interesting countries for us are India and \n\nPakistan, which NISSAN Value-Up identifies as next steps \n\nin our global expansion. Currently, Pakistan’s auto market \n\ntotals just 100,000 vehicles a year, while in India annual \n\nsales are 1.2 million. Both markets are expected to grow. \n\n\n\n“General Overseas Markets \n\noversees a huge territory, \n\nincluding countries as \n\ndiverse and geographically \n\nseparated as Pakistan and \n\nTahiti. Fiscal 2004 was a \n\ngood year for us in GOM, \n\nwith retail sales going up \n\nmore than 10 percent. All our \nThis year, we will determine our strategies for India and \n\nmajor markets exhibited \nPakistan based on feasibility studies. We’ve already \nY A S U A K I H A S H I M O T O \nVice President \ngrowth. Taiwan and Australia \nestablished a wholly owned subsidiary in Mumbai that will \n\nwere the biggest contributors \nfirst focus on imports and later serve as a base camp to \n\nwith sales of 70,000 and 63,000 units, respectively. \nlearn more about the market in India. \n\nAustralia’s auto market was particularly good for us— \nPerhaps the biggest news for GOM in Asia was the \n\nwe’re now the number-four automaker there. Strong \nsummer 2005 launch of the Infiniti in Korea. This is the \n\ndemand for the Nissan Pickup and X-TRAIL was \nfirst-ever launch of the full brand independent of Nissan’s \n\nresponsible for the jump in sales. Although there \n\nsales network and outside of the U.S. Korea is a good- \n\nsized market and a good first step in Infiniti’s development \n\nas a globally recognized luxury brand. Although we have set \n\na modest annual sales target of just 5,000 vehicles within \n\nthree years, Korea will be a strategic market for \n\nestablishing the Infiniti brand before the scheduled \n\nlaunches in Russia, China, and eventually Japan. \n\nSoutheast Asia is also a major emerging market for \n\nNissan. We have reinforced our strength with a solid \n\nstrategy in the region, and are now ready to invest.” \n\nwere no new passenger car releases, the dealers did \n\nan excellent job selling the current lineup. \n\nIn the past, we left local sales up to our sales \n\naffiliates in each market. However, we’ve recently \n\naltered our strategy in an effort to unify the brand and \n\nservice level. Emphasizing the importance of \n\nconsistency to the sales companies has made it \n\nmuch easier to promote the Nissan way of doing \n\nbusiness. We have also increased our shares in local \n\ncompanies, such as in Thailand and Taiwan, to \n\nstrengthen management control. \n\n\n\n\n\nFiscal 2005 will be challenging because we have no major \n\nmodel launches planned. We’re committed to growth, \n\nhowever, and I believe that having a clear strategy for each \n\nmarket and a targeted approach to the customer will boost \n\nour market position throughout the region. \n\nThailand is an important market for Nissan’s future. \n\nAlthough we sell just over 50,000 vehicles a year there, \n\nwe plan to increase sales volume under NISSAN Value-Up. \n\nWe’re also expanding production capacity and planning to \n\nlocalize Thailand as an export base for Pickups. We intend", + "page_start": 67, + "page_end": 67, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Succeeding Despite Growing Competition**\n\nof our products. We’re also planning to export these models \n\nto Africa, South America, and the Middle East. \n\nTwo or three years ago, the passenger vehicle market \n\nin China was a seller’s market. That reversed during the last \n\nhalf of the year, influenced by macroeconomic controls and \n\nmore products coming onto the market. As a result, most \n\nautomakers entered into a price war. We stayed out of that \n\n\n\n“To understand the depth of \n\nNissan’s commitment to \n\nChina, you need look no \n\nfurther than Dongfeng Motor \n\nCo., Ltd., our joint venture \n\nwith Dongfeng Motor \n\nCorporation. DFL, as we \n\nrefer to it, is the biggest JV in \nbecause we didn’t want to damage our brand image. \n\nChina’s automotive industry, \nInstead, we found alternative means to adapt to the market. \n\nrepresenting a 50-50 \nFor example, we did not discount the selling price of the \n\nKATSUMI NAKAMURA \nPresident & CEO, \nDongfeng Motor Co., Ltd. \ninvestment by Nissan and \nTeana during its high-profile launch. In December 2004, we \n\nDongfeng totaling RMB16.7 \nalso announced to customers that we would give them a \n\nbillion (US$2 billion). Dongfeng is the major \nrebate if prices went down after they bought a Nissan. We \n\ncommercial vehicle manufacturer in China, and the \nreleased a model change for the Sunny, and kept firm on \n\nDongfeng brand is famous throughout the country. \nthe Teana’s pricing. These actions have helped keep our \n\nbrand image high, while building customer loyalty, selling \n\ncars and reducing inventory. \n\nCalendar year 2005 looks very promising to us. The \n\nTeana has been a tremendous success, winning 12 \n\nawards—including Car of the Year for 2005 in China—and \n\nhelping solidify Nissan’s reputation for quality. The car \n\ncontinues to sell well, and opens the door for five models \n\nthat will be launched in fiscal 2005: the Tiida sedan in \n\nApril; Fuga in June; Quest in August, which is imported \n\nfrom the U.S.; the Tiida in the second half along; and the \n\n350Z in calendar year 2006. The Tiida has already won \n\ntwo awards at the Shanghai Motor Show for best new \n\nmodel and roominess, and answers the strong demand in \n\nChina for fuel efficiency. \n\nIn June 2005, the China State Administration for \n\nWith 70,000 employees and over fifty subsidiaries, \n\nDFL is a strategic alliance for both companies. \n\nIn China, most joint ventures with foreign makers are \n\nsmall and focus only on producing the foreign \n\npartner’s products. In contrast, DFL integrates \n\nNissan’s technology, products and the Nissan \n\nManagement Way in the production of vehicles under \n\nboth the Nissan and Dongfeng brands. \n\nGreater competition and a softer economy made \n\n2004 a difficult year in the passenger vehicle market. \n\nYet we sold approximately 92,000 passenger vehicles \n\nin China during the last calendar year. That number \n\nincluded 61,000 DFL-produced Nissan-branded \n\nvehicles, 21,000 Zhengzhou-produced Nissan pickups \n\nand SUVs, and 10,000 imported vehicles. We also sold \n\nnearly 88,000 light commercial vehicles under the \nIndustry and Commerce officially recognized the NISSAN \n\nDongfeng brand. \ntrademark as a “famous trademark.” Only trademarks with \n\nsuperior reputations receive this distinction. Not only does \n\nthis represent an important milestone in Nissan’s efforts to Increases in raw material costs and reductions in selling \n\nbuild its brand in China, it also represents the first time a price did affect the commercial vehicle business in fiscal", + "page_start": 65, + "page_end": 65, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. \n\nTO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES \n\nTO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. \n\nAT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, \n\nCULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, \n\nEFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_\n\n\n\n\n\n\n\n\n\nO U R W O R K", + "page_start": 33, + "page_end": 33, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**11.1%**\nCommitment \n**4,200**\n**21.3%** **10.8%**\n**10.0%**\n**19.8%** **20.1%***\n\nTop level \noperating profit margin \namong global automakers \n**3,388**\nROIC \naverage of 20% \n**7.9%**\n+812 \n\n**2,597**\n+791 \n**12.7%**\n\nP \nE \nR \nF \nO \nR \nM \nA \nN \nC \nE \n\n**4.75%**\n\n**7.5%**\n\n**1.4%**\n**1.3%**\n\n**’99 ’00 ’01 ’02 ’03 ’04 ’05 ’06 ’07** **’99 ’00 ’01 ’02 ’03 ’04 ’05 ’06 ’07** **’01** **’04** **’08**\nNRP \nNISSAN \n180 NISSAN \nValue-Up \nNRP \nNISSAN \n180 NISSAN \nValue-Up \n\n*Same scope pf consolidation as P&L, excluding \nchange of cash compared to fiscal year 2003 \n\nRussia \nKorea \nJapan*\nChina \nMiddle \nEast \nTaiwan \n\n\n\n**Light Commercial Vehicles (LCV)**\n\n(Thousand units) (% of consolidated operating margin) \n750 10 \n**8.0%**\n600 8 \n\n**434**\n+40% \n450 6 \n**312**\n**234**\n**182**\n**4.0%** 300 4 \n**203**\n**187**\n**3.6%**\n**3.3%**\n150 2 \n**-0.5%** **1.4%**\n0 0 \n**’00** **’01** **’02** **’03** **’04** **’07**", + "page_start": 12, + "page_end": 12, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "Why did Sundance Energy's oil sales improve in 2014?", + "target_page": 18, + "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. \n\n*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. \n\nThe Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Through our emphasis on operating and G&A cost control*\n*initiatives, the Company’s record oil and natural gas sales*\n*translated to best-in-class Adjusted EBITDAX Margin (79*\n*percent) among peers our size and a full 10 absolute percentage*\n*points higher than the average of our entire peer group.*\n\nAs a result of its significant production increase, the Company’s 2014 oil, NGL and natural \ngas sales revenue increased by $74.4 million to $159.8 million; an 87 percent increase \ncompared to $85.3 million in 2013. \n\nREVENUE (US$000s) AND PRODUCTION (Boe/d) \n\n10,000 $50,000 \n\n8,000 $40,000 \n\n6,000 $30,000 \n\n4,000 $20,000 \n\n2,000 $10,000 \n\n Q1-13 Q2-13 Q3-13 \n\nQ1-14 \nn REVENUE —— Boe/d \n\nQ4-13 Q2-14 Q3-14 Q4-14 \n\nThis topline growth resulted in Adjusted EBIDTAX increase of $73.8 million to $126.4 \nmillion (79 percent of revenue); a 140 percent increase compared to $52.6 million \n(62 percent of revenue) in 2013. In other words, for every $1.00 of revenue growth \ncompared to 2013, the Company added $0.99 of 2014 Adjusted EBITDAX growth. \n\nThis Adjusted EBITDAX (generally a good proxy for our \noperating cash flow) increase was primarily the result of \nincreased revenue and the following cost controlled \noperating expenses: \n\nADJUSTED EBITDAX AND MARGIN \n\n$40,000 100% \n\n$35,000 \n80% \n$30,000 \n\n•*Lease operating expenses*increased only slightly (12 percent), \ndespite significant production increases (108 percent). \nAs a result of several changes in its field operations and \neconomies of scale, the Company has realized improvement \nin its lease operating costs per barrel. \n\n$25,000 \n60% \n$20,000 \n40% \n$15,000 \n\n$10,000 \n\n20% \n$5,000 \n\n•*Production taxes*also only increased slightly (11 percent), \ndespite significant revenue increase (87 percent). Through a \nseries of strategic dispositions, the Company has shifted its \nstate production mix from primarily high severance tax rate \njurisdictions (states of Colorado and North Dakota) to lower severance tax rate jurisdictions \n(states of Texas and Oklahoma). \n\n Q1-13 Q2-13 Q3-13 Q4-13 Q1-14 Q2-14 Q3-14 Q4-14 \n\nn ADJUSTED EBITDAX (US$000s) \n—— ADJUSTED EBITDAX MARGIN (%) \n\n•*General and administrative expenses*remained relatively flat compared to prior year. \nThis is primarily due to the fact that the Company began ramping up staffing in 2013 as \nit expected development growth in late 2013 and 2014. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "COSTS PER BARREL OF OIL EQUIVALENT \n$39.26 \n$40 \n$34.66 \n$33.41 $35 \n$29.70 \n$30 \n\n$25 \n\n$20 \n\n$15 \n\n$10 \n\n$5 \n\nIn addition to the significantly improved operating profitability, the Company exited two \nnon-core basins which resulted in a gain on sales of non-current assets of $50.3 million. \nThe DJ and Bakken dispositions that occurred in 2014 are further proving the Company’s \ntrack-record of large opportunistic dispositions that result in a high internal rate of \nreturn; allowing the Company to reinvest proceeds in basins with higher risk-adjusted \nreturns. Since 2007, the Company disposed of six \nprospects or basins with an aggregate transaction \nvalue of nearly $400 million. These dispositions had a \ntransaction value weighted return of 83 percent. The \n2014 DJ disposition (transaction value of $113 million) \nyielded the Company’s highest internal rate of return \nto date of 104 percent. \n\nINTERNAL RATE OF RETURN AND TRANSACTION VALUES \n(in millions) \n140% \n$113.0 \n120% \n\n100% \n$10.5 \n80% \n$46.4 \n60% \n$14.0 $39.5 \n\nAs a result of the increased revenue, cost controlled \noperating and G&A expenses and gain on sales, offset \nby the Company’s non-cash impairment of $71.2 \nmillion (due to the depressed oil commodity pricing \nat year-end), the Company reported profits before \nincome tax for the year of $14.5 million. \n\n$172.0 \n40% \n\n20% \n\n DEC 07 DEC 08 DEC 09 DEC 10 DEC 11 DEC 12 DEC 13 DEC 14 \n\n• ASHLAND • NIOBRARA • SOUTH ANTELOPE • PHOENIX • DJ • GOLIATH \n\nAs mentioned above, the Company’s Adjusted EBITDAX for the period ($126.4 million) \napproximates its operating cash flow of $128.1 million. This operating cash flow, along \nwith i) net proceeds from the disposition of the DJ and Bakken basins ($118.8 million), \nii) net proceeds from issuance of equity ($68.7 million) and iii) net debt draws ($100.0 \nmillion) were the Company’s primary sources of cash (collectively $415.6 million), fund- \ning $437.2 million of cash uses including, i) development expenditures ($362.0 million), \nii) exploration expenditures ($39.6 million) and iii) an acquisition of primarily undevel- \noped acreage in the Eagle Ford ($35.6 million). \n\nDespite the Company’s robust 2014 drilling and completion program, it continued to \npreserve liquidity with $69.2 million of cash and equivalents and $15.0 million of \nundrawn borrowing capacity at year-end. The Company also maintains a low-leverage \nmodel with outstanding principal of $130.0 million at year-end, which represents \n1.0x the Company’s 2014 Adjusted EBITDAX. The Company ranks among the lowest \nof its peers in this leverage metric, a full 272 absolute basis points below the mean of \nits peers (3.8x).", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Experience*\nMike has been a Director of Sundance since March 2006 and chairman of our board of directors since December 2008. \nMr. Hannell has over 45 years of experience in the oil and gas industry, initially in the downstream sector and subsequently in \nthe upstream sector. His extensive experience has been in a wide range of design and construction, engineering, operations, \nexploration and development, marketing and commercial, financial and corporate areas in the United States, United Kingdom, \ncontinental Europe and Australia at the senior executive level with Mobil Oil (now Exxon) and Santos Ltd. Mr. Hannell recently \nfinished his term as the chairman of Rees Operations Pty Ltd (doing business as Milford Industries Pty Ltd), an Australian \nautomotive components and transportation container manufacturer and supplier. He has also held a number of other board \nappointments including the chairman of Sydac Pty Ltd, a designer and producer of simulation training products for industry. \nMr. Hannell has also served on a number of not-for-profit boards, with appointments as president of the Adelaide-based \nChamber of Mines and Energy, president of Business SA (formerly the South Australian Chamber of Commerce and Industry), \nchairman of the Investigator Science and Technology Centre, chairman of the Adelaide Graduate School of Business, and a \nmember of the South Australian Legal Practitioners Conduct Board. Mr. Hannell holds a Bachelor of Science degree in \nEngineering (with Honors) from the University of London and is a Fellow of the Institution of Engineers Australia. \n\n*Interest in Shares*: \n1,059,000 ordinary shares in Sundance Energy Australia Limited \n\n*Special Responsibilities*: \n-Chairman of the Board of Directors \n-Chairman of the Remuneration and Nominations Committee \n-Member of the Audit and Risk Management Committee \n-Member of the Reserves Committee \n\n*Other Directorships*: \nNil \n\n**Eric P. McCrady**\n*Director, BS in Business*Administration \n\n*Experience*\nEric has been our Chief Executive Officer since April 2011 and Managing Director of our board of directors since November \n2011. He also served as our Chief Financial Officer from June 2010 until becoming Chief Executive Officer in 2011. Mr. McCrady \nhas served in numerous positions in the energy, private investment and retail industries. From 2004 to 2010, Mr. McCrady was \nemployed by The Broe Group, a private investment firm, in various financial and executive management positions across a \nvariety of industry investment platforms, including energy, transportation and real estate. From 1997 to 2003, Mr. McCrady \nwas employed by American Coin Merchandising, Inc. in various corporate finance roles. Mr. McCrady holds a degree in Business \nAdministration from the University of Colorado, Boulder. \n\n*Interest in Shares, Restricted Share Units and Options:*\n1,908,581 Ordinary Shares in Sundance Energy Australia Limited and 791,561 Restricted Share Units \n\n*Special Responsibilities*: \nManaging Director and Chief Executive Officer of the Company \n\n*Other Directorships*: \nNil \n\n- 23 -", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Natural gas sales.**Natural gas sales increased by $3.4 million (122.1%) to $6.2 million for the year ended 31 December 2014 \nfrom $2.8 million for the prior year. The increase in natural gas revenues was primarily the result of increased production \nvolumes ($2.6 million) and improved product pricing ($0.8 million). Natural gas production volumes increased 868,800 Mcf \n(93.0%) to 1,803,000 Mcf for the year ended 31 December 2014 compared to 934,200 Mcf for the prior year. The average price \nwe realised on the sale of our natural gas increased by 15.1% to $3.42 per Mcf for the year ended 31 December 2014 from \n$2.97 per Mcf for the prior year.", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Natural gas liquids sales (NGL)**. NGL sales increased by $5.4 million (169.5%) to $8.6 million for the year ended 31 December \n2014 from $3.2 million for the same period in prior year. The increase in NGL revenues was primarily the result of increased \nproduction volumes in the Eagle Ford and Anardarko Basins. NGL production volumes increased 172,131 Bbls (179.6%) to \n267,952 Bbls for the year ended 31 December 2014 compared to 95,821 Bbls for the prior year. The average price we realised \non the sale of our natural gas liquids decreased by 3.6% to $32.24 per Bbl for the year ended 31 December 2014 from $33.45 \nper Bbl for the prior year. \n\n**Selected per Boe metrics (US$)**\n\nTotal oil, natural gas and NGL revenue ................................... \n\nLease operating expense ......................................................... \n\nProduction tax expense ........................................................... \n\nDepreciation and amortisation expense ................................. \n\nGeneral and administrative expense ....................................... \n\nTotal Profit Margin .................................................................. \n\n\n \n \n \n \n [html]\n
20142013Change in $Change as %
71.2279.10( 7.88 )( 10.0 )
( 6.03 )( 11.23 )( 5.21 )( 46.4 )
( 3.10 )( 5.80 )( 2.70 )( 46.5 )
( 38.15 )( 33.57 )4.5813.6
( 6.92 )( 14.18 )( 7.26 )( 51.2 )
17.0214.322.7018.9
\n\n**Lease operating expenses.**Our lease operating expenses (LOE) increased by $1.4 million (11.6%) to $13.5 million for the year \nended 31 December 2014 from $12.1 million for the same period in prior year but decreased $5.21 per Boe to $6.03 per Boe \nfrom $11.23 per Boe. The decrease in LOE per Boe is primarily due to the implementation of several cost saving initiatives in \nour field operations such as replacing contract lease operators with Company employees and reducing total field head count \nper well. \n\n**Production taxes.**Our production taxes increased by $0.7 million (11.2%) to $7.0 million for the year ended 31 December \n2014 from $6.3 million for the prior year but as a percent of revenue decreased 290 basis points to 4.4% from 7.3%. The \ndecrease in production taxes as a percent of revenue is the result of exiting North Dakota and Colorado, both higher production \ntax rate jurisdictions, and increasing our investment in Texas and Oklahoma, which are lower production tax rate jurisdictions, \nas well as an adjustment for lower than anticipated ad valorem taxes. \n\n**Depreciation and amortisation expense, including depletion.**Our depreciation and amortisation expense increased by \n$49.4 million (136.3%) to $85.6 million for the year ended 31 December 2014 from $36.2 million for the prior year and \nincreased $4.58 per Boe to $38.15 per Boe from $33.57 per Boe. The increase reflects our increase in production (107.9%), an \nincrease in our asset base subject to amortisation as a result of our acquisition and development activity, and increased \ncompletion costs caused by high-demand for completion services and a shortage of trucks able to transport frac sand and \nresultant higher trucking rates.", + "page_start": 18, + "page_end": 18, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Opinion \nIn our opinion: \n\na. \nthe financial report of Sundance Energy Australia is in accordance with the*Corporations Act 2001*, \nincluding: \n\ni \ngiving a true and fair view of the consolidated entity's financial position as at 31 December 2014 and \nof its performance for the year ended on that date; and \n\nii complying with Australian Accounting Standards and the*Corporations Regulations 2001*; and \n\nb. \n\nthe financial report also complies with*International Financial Reporting Standards*issued by the IASB \nas disclosed in Note 1. \n\n*Report on the remuneration report*\n\nWe have audited the Remuneration Report included in pages 28 to 43 of the directors' report for the year ended 31 \nDecember 2014. The directors of the company are responsible for the preparation and presentation of the \nRemuneration Report in accordance with section 300A of the*Corporations Act 2001*. Our responsibility is to express \nan opinion on the Remuneration Report, based on our audit conducted in accordance with Australian Auditing \nStandards. \n\nOpinion \nIn our opinion, the Remuneration Report of Sundance Energy Australia Limited for the year ended 31 December \n2014, complies with section 300A of the*Corporations Act 2001*.", + "page_start": 109, + "page_end": 109, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Independent auditor's report to the members of Sundance Energy**\n**Australia Limited**\n\n*Report on the financial report*\n\nWe have audited the accompanying financial report of Sundance Energy Australia Limited, which comprises the \nconsolidated statement of financial position as at 31 December 2014 the consolidated statement of comprehensive \nincome, the consolidated statement of changes in equity and the consolidated statement of cash flows for the year \nthen ended, notes comprising a summary of significant accounting policies and other explanatory information, and \nthe directors' declaration of the consolidated entity comprising the company Sundance Energy Australia Limited \nand the entities it controlled at the year's end or from time to time during the financial year. \n\n*Directors' responsibility for the financial report*\n\nThe directors of the company Sundance Energy Australia Limited are responsible for the preparation of the \nfinancial report that gives a true and fair view in accordance with Australian Accounting Standards and the \n*Corporations Act 2001*and for such internal controls as the directors determine are necessary to enable the \npreparation of the financial report that is free from material misstatement, whether due to fraud or error. \n\n*Auditor's responsibility*\n\nOur responsibility is to express an opinion on the financial report based on our audit. We conducted our audit in \naccordance with Australian Auditing Standards. Those standards require that we comply with relevant ethical \nrequirements relating to audit engagements and plan and perform the audit to obtain reasonable assurance about \nwhether the financial report is free from material misstatement. \n\nAn audit involves performing procedures to obtain audit evidence about the amounts and disclosures in the \nfinancial report. The procedures selected depend on the auditor's judgment, including the assessment of the \nrisks of material misstatement of the financial report, whether due to fraud or error. In making those risk \nassessments, the auditor considers internal controls relevant to the entity's preparation and fair presentation of \nthe financial report in order to design audit procedures that are appropriate in the circumstances, but not for the \npurpose of expressing an opinion on the effectiveness of the entity's internal controls. An audit also includes \nevaluating the appropriateness of accounting policies used and the reasonableness of accounting estimates \nmade by the directors, as well as evaluating the overall presentation of the financial report. \n\nWe believe that the audit evidence we have obtained is sufficient and appropriate to provide a basis for our audit \nopinion. \n\n*Independence*\nIn conducting our audit we have complied with the independence requirements of the*Corporations Act 2001*. We \nhave given to the directors of the company a written Auditor’s Independence Declaration, a copy of which is \nincluded in the directors’ report.", + "page_start": 108, + "page_end": 108, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", + "target_page": 21, + "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "*Experience*\nMike has been a Director of Sundance since March 2006 and chairman of our board of directors since December 2008. \nMr. Hannell has over 45 years of experience in the oil and gas industry, initially in the downstream sector and subsequently in \nthe upstream sector. His extensive experience has been in a wide range of design and construction, engineering, operations, \nexploration and development, marketing and commercial, financial and corporate areas in the United States, United Kingdom, \ncontinental Europe and Australia at the senior executive level with Mobil Oil (now Exxon) and Santos Ltd. Mr. Hannell recently \nfinished his term as the chairman of Rees Operations Pty Ltd (doing business as Milford Industries Pty Ltd), an Australian \nautomotive components and transportation container manufacturer and supplier. He has also held a number of other board \nappointments including the chairman of Sydac Pty Ltd, a designer and producer of simulation training products for industry. \nMr. Hannell has also served on a number of not-for-profit boards, with appointments as president of the Adelaide-based \nChamber of Mines and Energy, president of Business SA (formerly the South Australian Chamber of Commerce and Industry), \nchairman of the Investigator Science and Technology Centre, chairman of the Adelaide Graduate School of Business, and a \nmember of the South Australian Legal Practitioners Conduct Board. Mr. Hannell holds a Bachelor of Science degree in \nEngineering (with Honors) from the University of London and is a Fellow of the Institution of Engineers Australia. \n\n*Interest in Shares*: \n1,059,000 ordinary shares in Sundance Energy Australia Limited \n\n*Special Responsibilities*: \n-Chairman of the Board of Directors \n-Chairman of the Remuneration and Nominations Committee \n-Member of the Audit and Risk Management Committee \n-Member of the Reserves Committee \n\n*Other Directorships*: \nNil \n\n**Eric P. McCrady**\n*Director, BS in Business*Administration \n\n*Experience*\nEric has been our Chief Executive Officer since April 2011 and Managing Director of our board of directors since November \n2011. He also served as our Chief Financial Officer from June 2010 until becoming Chief Executive Officer in 2011. Mr. McCrady \nhas served in numerous positions in the energy, private investment and retail industries. From 2004 to 2010, Mr. McCrady was \nemployed by The Broe Group, a private investment firm, in various financial and executive management positions across a \nvariety of industry investment platforms, including energy, transportation and real estate. From 1997 to 2003, Mr. McCrady \nwas employed by American Coin Merchandising, Inc. in various corporate finance roles. Mr. McCrady holds a degree in Business \nAdministration from the University of Colorado, Boulder. \n\n*Interest in Shares, Restricted Share Units and Options:*\n1,908,581 Ordinary Shares in Sundance Energy Australia Limited and 791,561 Restricted Share Units \n\n*Special Responsibilities*: \nManaging Director and Chief Executive Officer of the Company \n\n*Other Directorships*: \nNil \n\n- 23 -", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**ACQUIRING NEW ACREAGE**\nFuture exploration success depends \non quality exploration acreage. \nSantos acquired five exploration \nblocks in three hydrocarbon \nprovinces during 2004. The most \nsignificant of these were in Egypt \nand Indonesia. \n\n• the addition of three new \n\n**2004 EXPLORATION**\n**EXPENDITURE BY CATEGORY** **2004 EXPLORATION**\n**EXPENDITURE BY REGION**\n\nventure areas in the shallow \nwaters of the Gulf of Mexico \nand onshore Montana and \nTexas, which significantly \nexpands and diversifies the \nUS exploration acreage and \nprospect inventory \n\nDrilling \n$63.6 million Offshore Australia \n$32.6 million \n\nGeoscience and other \n$37.5 million Onshore Australia \n$23.4 million \n\n• the farm-out of a 60% interest \nand operatorship of the NT/P61 \npermit in the Bonaparte Basin, \noffshore northern Australia to \nConocoPhillips \n\nSeismic \n$17.2 million South East Asia \n$41.4 million \n\nNew ventures \n$7.3 million United States \n$28.2 million \n\nEgypt and surrounding countries \nare a focus area for Santos. The \nCompany has farmed in to three \nexploration blocks in Egypt with \nUS petroleum group, Devon \nEnergy, committing approximately \n$70 million to an eight-well \nexploration joint venture over \nthe next three years in the Gulf \nof Suez. This is Santos’ first move \ninto the North Africa–Middle East \nregion, which is considered the \nworld’s premier hydrocarbon \nprovince. \n\n• the farm-out of a 16.67% \ninterest in the WA-264-P \npermit offshore Western \nAustralia to Beach Petroleum \n\n• the farm-out of a 70% interest \nin the deep water exploration \nblock, Nth Bali 1 PSC, offshore \nEast Java Basin to Total \nand Mitsui \n\nAn example of this is the strong \nposition Santos has created in \nthe Kutei Basin, with interests in \nthree neighbouring production \nsharing contracts: Popodi, \nDonggala and Papalang. 2004 also marked the year that \nSantos drilled its first operated \ndeep water wells – a significant \nachievement for a company that \nhad its beginnings in a desert \nenvironment. \n\nSantos continues to seek other \nexploration opportunities in this \narea, concentrating on the Gulf \nof Suez and the onshore Desert \nBasins. \n**KUTEI BASIN**\n\nSantos has acquired six \nexploration permits in Indonesia \nover the past three years, \nincluding an interest in the \nDonggala PSC in the Kutei Basin \nduring late 2004. This block lies \nbetween Santos’ other Kutei \nacreage: the Papalang and \nPopodi PSCs. \n\n• the farm-out of a 25% \n\ninterest in the VIC P/51 \nblock containing the Callister \nprospect to Mitsui & Co \nsubsidiary Mitwell Energy \nResources. \n\nThese farm-outs continued the \ntrend of risk-sharing with quality \npartners. \n\n**ADDING MATERIAL PROSPECTS**\nSantos is now in a position that \nexploration success in 2004 and \ngood acreage management has \ncreated future options that will \nultimately translate into greater \nvalue for the business in 2005 \nand beyond. \n\nThe addition of the Donggala PSC \ngives Santos a particularly strong \npresence in the Kutei Basin and \ncovers a highly prospective trend, \nwhile adding to the Company’s \ngrowing Indonesian operations. \n\nThis has been achieved by \nfocusing on ‘basin excellence’. \nThis means becoming a technical \nleader in basins, within our focus \nareas, entering early where \npossible to keep entry costs \ndown, balancing the commercial \nand the technical risks and \nselecting the right co-venturers. \n\nOther exploration acreage \nportfolio management and \nactivities during 2004 included: \n\n• the award of exploration permit \n\nT/36P in the Sorell Basin, \noffshore Tasmania \n\nAnnual Report 2004", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "*Acquisitions*\nIn April 2014, the Company acquired approximately 4,800 net acres in the Eagle Ford for an initial purchase price of \napproximately $10.5 million and two separate earn out payments due upon commencement of drilling in each of three blocks \nof acreage (total for all three blocks of $7.7 million) and payout of the first two wells drilled on each block of the acreage \n($7.7 million). The term of the agreement is two years and provides a one year extension for $500 per acre extended. This \nacquired acreage is adjacent to our existing acreage in McMullen County, Texas. \n\nIn July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South \nTexas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its \nsole discretion, to acquire the Seller’s remaining working interest for an additional $45 million for the earlier of one year from \nclosing the acquisition or six months from first production of hydrocarbons.", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Transfer and Disposal Services.*We own or operate 96 transfer stations. We deposit waste at these \nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport \nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had \napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of \napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based \non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. \nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated \nsoils. See \"\"Ì Properties.'' \n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently \npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and \nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, \nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, \nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be \nmade that all future expansions will be permitted as designed. \n\n*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. \n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to \nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our \ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to \nlarge \"\"Fortune 500'' companies and municipalities. \n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts \nprogram in response to our customers' needs. \n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not \noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the \nacquired companies' local tradenames as used in each geographic market in which we operate. \n\n**Customers**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**14**| LETTER TO SHAREHOLDERS \n\n*Rig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a*\n*series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.*\n\nI am pleased to report that we have apparently finally convinced \nPresident Barack Obama and Congressional leadership to recognize that \nthe energy path America is on today is completely unsustainable. There \nappears to be growing recognition that it is spectacularly dangerous for \nAmerica to continue importing 9 million barrels of oil per day and exporting more than $1 billion per day in national wealth to oil exporting countries. \nAmerica’s undiminished appetite for foreign oil has created the larg- \nest wealth transfer in the history of the world. The political leadership \nin Washington, D.C., has not seemed overly concerned about this issue \nuntil recently. However, after President Obama’s recent speech calling \n\n(1) \n\n Reserve replacement is calculated by dividing net reserve additions from all sources by actual production for the corresponding period. We calculate drilling and net acquisition cost per mcfe by dividing total drilling \nand net proved property acquisition costs incurred during the year (excludes certain costs primarily related to net unproved property acquisitions, geological and geophysical costs and deferred taxes related to \ncorporate acquisitions) by total proved reserve additions excluding price-related revisions. \n A non-GAAP financial measure, as defined below. Please refer to the Investors section of our website at www.chk.com for reconciliations of non-GAAP financial measures to comparable financial measures calculated \nin accordance with generally accepted accounting principles. \n• Adjusted ebitda is net income (loss) before interest expense, income tax expense (benefit), and depreciation, depletion and amortization expense, as adjusted to remove the effects of certain items that manage- \n\n(2) \n\nment believes affect the comparability of operating results. \n\n• Operating cash flow is cash provided by operating activities before changes in assets and liabilities. \n• Adjusted earnings per fully diluted share is net income (loss) per share available to Chesapeake common stockholders, assuming dilution, as adjusted to remove the effects of certain items that management \nbelieves affect the comparability of operating results. \n(3) \n FORTUNE 100 Best Companies to Work For® listed in the magazine’s February 7, 2011 issue.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Acquisition in 2013**\nOn 8 March 2013, the Company acquired 100% of the outstanding shares of Texon Petroleum Ltd (\"Texon\", whose \nname was changed to Armadillo Petroleum Ltd), an Australian corporation with oil and gas assets in the Eagle Ford \nformation in the United States. The Company acquired Texon to gain access to its existing production and drilling \ninventory in the Eagle Ford formation. As consideration for substantially all of the net assets of Texon, the Company \nissued 122.7 million ordinary shares (approximately 30.6% of the total outstanding shares immediately subsequent \nto the acquisition), which had a fair value of $132.1 million on the acquisition date and net cash consideration of \n$26.3 million for a total purchase price of $158.4 million. The net cash consideration includes a $141.0 million pre- \nmerger purchase by the Company of certain Texon oil and gas properties, offset by $114.7 million of cash acquired \nat the time of the merger. The current income tax liability, included in accrued expenses, and deferred tax liability \nof $33.4 million and $16.9 million, respectively, are comprised of tax liabilities assumed as at the acquisition date \nand an increase in the tax liability related to the incremental acquisition date fair value of the acquired development \nand production and exploration and evaluation assets as compared to Texon's historical basis. \n\n\n \n \n \n \n [html]\n
Trade and other receivables
$5.6
Other current assets4
Development and production assets53.9
Exploration and evaluation assets150.4
Prepaid drilling and completion costs3.0
Amount attributable to assets acquired213.4
Fair value of liabilities assumed :
Trade and other payables
1Accrued expenses
37.8Restoration provision
2Deferred tax liabilities
16.8Amount attributable to liabilities assumed
55.0Net assets acquired
$ 158.4Purchase price :
Cash and cash equivalents, net of cash acquired
$ 26Issued capital
132.0
", + "page_start": 74, + "page_end": 74, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "[html]On top of exploration and new ventures growth opportunities,Gas swapping will commence in 2005 and could continue until theENERGY HUB STRATEGYSantos has a large inventory of gas fields that are yet to beend of 2011.1.committed to gas contracts.A second gas swap, from easternThese fields, known as contingent resources, represent significantQueensland to Gippsland, moved gas through three states and five joint ventures, expanding marketopportunities for Santos.horizons for partners andEach year Santos works towardsproviding backup optionscommercialising these fields byto customers.Tablefinding new gas contracts orEXPANDED CASINO CONTRACTextending existing contractsENHANCES VALUEso that they can be bookedThe commercialisation of theProven ( 1P ) or Proven plusCasino gas field in the OtwaySpecificity ( n = 1 )Basin, offshore southern Australia,Santos ’ contingent gas resourcescontinued during 2004 with anare largely located offshoreincrease in the quantity of gassouthern Australia and Westernbeing sold under the initial termAustralia, in the Bonaparte Bassheet signed in September 2003offshore northern Australia andwith TXU for 293 P3.onshore Papua New Guinea.TableSantos continued to deliver onin October 2004, the joint ventgas commercialisation duringannounced an extension to the2004, commercialising 27 millionoriginal. Gas Sales Agreement tcboe during the year. Santos alssupply up to 420 P3 of gas, andachieved positive contract pricepossibly another 105 P3, over 1reviews for gas sales that wereyears for the Victorian or SouthThe successful appraisal of the field in late 2003 and early 2004 significantly increased theUNIQUE ENERGY HUBS DELIVERThe Casino contracts are uniqueGAS SWAPSin that the reserves have beenSome of the most important gascontracted prior to the field beingproduction by mid - 2005 enabled active marketing of gas abovecommercialisation achievementsfully appraised to confirm thefor the year were the innovativequantity of gas available. Thisgas swaps agreements that werehas allowed the joint ventureonly possible because of Santosto undertake appraisal drillingIn a separate move, designed tounique spread of assets acrossand near field explorationAustralian gas hubsprograms with the knowledgeSantos and the other Souththat all of the gas likely to beWest Queensland Gas ProducersGUCGTCTGTTTTTTGCTGTGTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTSensitivity (%)significantly reducing the risk.gas swap in May to allow eachThis shortens the time fromparty to supply the other partydiscovery to production acontractual obligations indifferent states via the MoombaTuberculosisgas hub in central Australia. ThisWA CONTRACTS FAST - TRACKarrangement for 200 P3 meant30HN BR00KESwhich could be further extendedthat Origin could avoid buildingSantos and its co - venturera pipeline and", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]ANNUAL PERCENTAGE CHANGEYEAR\n
IN 2P PV10 ( NET ASSET VALUE ) PER DEBT ADJUSTED SHAREIN SUNDANCE PRICE PER SHAREIN ASX2002014
21.6 %- 48.0 %1.1 %2013
63.3 %29.9 %15.1 %2012
- 15.6 %87.8 %14.6 %2011
59.7 %- 44.6 %- 14.5 %
\n\n*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. \n\nOur second capital priority for the year was to conclude the appraisal of the Woodford \nformation in our Logan County, Oklahoma assets. We viewed this relatively modest, but \nhigher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, \nwe met with mixed success in our appraisal activities proving that in today’s onshore \nUS oil and gas industry that the best absolute returns are generated by drilling in proved \nregions. There are plenty of solid opportunities to efficiently grow the business without \nexposure to undue geologic risk. \n\nLike many prior bubbles driven by new technologies, the second half of the year saw the \npricing environment come crashing down around us. The market became fundamentally \nunbalanced, driving prices down almost 50% and rendering material portions of global \noil and gas development uneconomic. \n\nOur peers went from talking about their growth prospects to fretting about cash costs \nand liquidity, a stark contrast from the go-go growth times which existed in the first half \nof the year. This shift in industry strategy has now come in line with our general business \nphilosophy — in the resource space, low-cost, low debt businesses will survive and thrive \nacross cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% \ncost structure and balance sheet.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", + "target_page": 31, + "target_passage": "No increases to Managing Director’s or KMP’s base salary", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. \n\n*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. \n\nThe Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. \n\nWe expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. \n\nOn behalf of the Board and Company, I would like to thank our shareholders for your \nstrong support of the Company throughout the year. We are committed to delivering \nlong-term value for our shareholders and I look forward to reporting over the rest of the \ncoming year on the continued value creation and growth of Sundance. \n\nYours sincerely,", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
2014 RemunerationActionRationale
Non - executive Director CompensationIncreased total director base compensation during 2014 by approximately AS55.000 per Director.Based on market review of director compensation at peer group companies and to reflect the companies. Company ’ s operations and therefore the related time commitment and performance expectations of the directors.
Key Changes for 2015Action
Fixed RemunerationNo increases to Managing Director ' s or KMP ' s base salary.
Cash Short - Term IncentiveShort - Term Incentive payments earned for 2014 will be paid out in Restricted Stock Units during 2015 instead of cash to reflect the current low commodity price environment and preserve liquidity.
Equity Long - Term IncentiveLong - Term Incentive RSUs to KMPs earned for 2014 will be paid out in 2015 with 50 % time based vesting and 50 % vesting tied to Total Shareholder Return compared to the peer group over a three year period.
Non - executive Director CompensationNo increases to NED fees
\n\n**What We Do:** **What We Don’t Do:**\n\n•**Pay for Performance**– STI and LTI awarded is based on \nhistorical Company performance. \n\n•**Enter into Egregious Employment Contracts –**The \nCompany does not enter into contracts containing multi- \nyear guarantees for salary increases, non-performance \nbased bonuses or equity compensation. \n\n•**Utilize a Quantitative Process for Performance Cash**\n**Bonuses**– The Remuneration and Nominations \nCommittee establishes Company performance measures \nand goals at the beginning of the performance year that \nare assigned individual weightings. In considering bonus \nawards for the year, the Committee scores the Company’s \nperformance on each measure in arriving at an overall \nweighted score that determines the amount of any \nbonuses. \n\n•**Provide Excessive Severance and/or Change in Control**\n**Provisions –**Provisions do not require cash payments \nexceeding three times base salary plus target/average/last \npaid bonus; No liberal change in control definition in \nindividual contracts or equity plans that could result in \npayments to executives without an actual change in \ncontrol or job loss occurring. \n\n•**Require Stock Ownership by Executive Officers**– \nBoard-adopted guidelines establish robust minimum stock \nownership levels for our executive officers to ensure \nappropriate alignment with shareholders. \n\n•**Provide Tax Gross-Ups**– The Company does not include \ntax gross-up payments for any STI or LTI Plans.", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Opinion \nIn our opinion: \n\na. \nthe financial report of Sundance Energy Australia is in accordance with the*Corporations Act 2001*, \nincluding: \n\ni \ngiving a true and fair view of the consolidated entity's financial position as at 31 December 2014 and \nof its performance for the year ended on that date; and \n\nii complying with Australian Accounting Standards and the*Corporations Regulations 2001*; and \n\nb. \n\nthe financial report also complies with*International Financial Reporting Standards*issued by the IASB \nas disclosed in Note 1. \n\n*Report on the remuneration report*\n\nWe have audited the Remuneration Report included in pages 28 to 43 of the directors' report for the year ended 31 \nDecember 2014. The directors of the company are responsible for the preparation and presentation of the \nRemuneration Report in accordance with section 300A of the*Corporations Act 2001*. Our responsibility is to express \nan opinion on the Remuneration Report, based on our audit conducted in accordance with Australian Auditing \nStandards. \n\nOpinion \nIn our opinion, the Remuneration Report of Sundance Energy Australia Limited for the year ended 31 December \n2014, complies with section 300A of the*Corporations Act 2001*.", + "page_start": 109, + "page_end": 109, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Through our emphasis on operating and G&A cost control*\n*initiatives, the Company’s record oil and natural gas sales*\n*translated to best-in-class Adjusted EBITDAX Margin (79*\n*percent) among peers our size and a full 10 absolute percentage*\n*points higher than the average of our entire peer group.*\n\nAs a result of its significant production increase, the Company’s 2014 oil, NGL and natural \ngas sales revenue increased by $74.4 million to $159.8 million; an 87 percent increase \ncompared to $85.3 million in 2013. \n\nREVENUE (US$000s) AND PRODUCTION (Boe/d) \n\n10,000 $50,000 \n\n8,000 $40,000 \n\n6,000 $30,000 \n\n4,000 $20,000 \n\n2,000 $10,000 \n\n Q1-13 Q2-13 Q3-13 \n\nQ1-14 \nn REVENUE —— Boe/d \n\nQ4-13 Q2-14 Q3-14 Q4-14 \n\nThis topline growth resulted in Adjusted EBIDTAX increase of $73.8 million to $126.4 \nmillion (79 percent of revenue); a 140 percent increase compared to $52.6 million \n(62 percent of revenue) in 2013. In other words, for every $1.00 of revenue growth \ncompared to 2013, the Company added $0.99 of 2014 Adjusted EBITDAX growth. \n\nThis Adjusted EBITDAX (generally a good proxy for our \noperating cash flow) increase was primarily the result of \nincreased revenue and the following cost controlled \noperating expenses: \n\nADJUSTED EBITDAX AND MARGIN \n\n$40,000 100% \n\n$35,000 \n80% \n$30,000 \n\n•*Lease operating expenses*increased only slightly (12 percent), \ndespite significant production increases (108 percent). \nAs a result of several changes in its field operations and \neconomies of scale, the Company has realized improvement \nin its lease operating costs per barrel. \n\n$25,000 \n60% \n$20,000 \n40% \n$15,000 \n\n$10,000 \n\n20% \n$5,000 \n\n•*Production taxes*also only increased slightly (11 percent), \ndespite significant revenue increase (87 percent). Through a \nseries of strategic dispositions, the Company has shifted its \nstate production mix from primarily high severance tax rate \njurisdictions (states of Colorado and North Dakota) to lower severance tax rate jurisdictions \n(states of Texas and Oklahoma). \n\n Q1-13 Q2-13 Q3-13 Q4-13 Q1-14 Q2-14 Q3-14 Q4-14 \n\nn ADJUSTED EBITDAX (US$000s) \n—— ADJUSTED EBITDAX MARGIN (%) \n\n•*General and administrative expenses*remained relatively flat compared to prior year. \nThis is primarily due to the fact that the Company began ramping up staffing in 2013 as \nit expected development growth in late 2013 and 2014. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "***Financial Position***\n\nIn May 2014, the borrowing capacity under our credit facilities increased from an aggregate of $63 million to $135 million. The \nincrease in the borrowing capacity was driven by the significant uplift of the Company’s proved oil and gas reserves as at 31 \nDecember 2013. In conjunction with the increase in the Company’s borrowing capacity, the Company expanded the syndicate \nof banks under the Senior Credit Facility. Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the bank \ngroup which is led by Wells Fargo. \n\nIn July 2014, the borrowing capacity increased an additional net $10 million, to $145 million, after taking into consideration \nthe removal of proved oil and gas reserves associated with the DJ and Williston Basin dispositions and the development of \nproved oil and gas reserves in the Eagle Ford Formation. \n\nAt 31 December 2014, the Company had $130 million outstanding under our credit facilities and $15 million available under \nour borrowing capacity. Ending cash at 31 December 2014 was $69.2 million. \n\n***Cashflow***\n\nCash provided by operating activities for the year ended 31 December 2014 increased 104.5% to $128.1 million compared to \nthe prior year. This increase was primarily due to receipts from sales increasing $85.7 million, or 101.2%, to $170.4 million, \nwhile keeping payments to suppliers and employees relatively stable with an increase of $8.2 million, or 37.7%, to $30.0 million. \nSee Review of Operations for more information. \n\nCash used in investing activities for the year ended 31 December 2014 increased $158.9 million, or 96.7%, to $323.2 million. \nThis increase is due to successful implementation of the Company’s strategy to develop and grow the reserves from our high \nworking interest, repeatable resource plays, primarily in the Eagle Ford. Due to funding available to the Company through \nasset sales, capital raises and credit facilities, the Company was able to accelerate its 2015 drilling program into 2014. However, \ndue to the reduction in crude oil prices in the fourth quarter of 2014 and continuing into early 2015, the Company will scale \nback its drilling program to concentrate on limited drilling obligations to hold Eagle Ford acreage during the 2015 year. \n\nCash provided by financing activities for the year ended 31 December 2014 increased $123.1 million, or 277.0%, to $167.6 \nmillion. This increase is a result of the increased availability and draws under the Company’s credit facilities and proceeds \nreceived in a private placement of shares. In February 2014, the Company completed a private placement in which we sold \n84.2 million ordinary shares at A$0.95 per share, resulting in net proceeds of approximately $68.4 million. The first tranche of \n63.7 million shares was issued in March 2014 and the second tranche of 20.5 million shares was issued in April 2014. \n\n**Matters Subsequent to the End of the Financial Year**\n\nSubsequent to 31 December 2014, an additional $13.9 million was drawn-down the credit facilities, bringing total outstanding \ndebt to $143.9 million, with undrawn funds of $1.1 million. \n\nIn January 2015, the company acquired three leases totalling approximately 14,180 net acres in the Eagle Ford for \napproximately $13.4 million. \n\n**Future Developments, Prospects and Business Strategies**\n\nThe Group’s business strategies and prospects for growth in future financial years are presently concentrated on growing the \nvalue of the Group’s current resource plays through direct leasing from mineral owners, small acquisitions of producing \nproperties, drilling inventory within the Group’s current balance sheet capabilities, and development of the Group’s current \nacreage. Further information on likely development in the operations of the Group and expected results of operations has not \nbeen included because the Directors believe it would result in unreasonable prejudice to the Group.", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "In 2003, we will continue to pursue opportunities to grow \n\nand enhance shareholder value. We plan to actively seek \n\nstrategic acquisitions; look for additional branch locations \n\nin higher-growth areas to expand our existing banks; and \n\nincrease our mortgage and brokerage operations. We cur- \n\nrently are in the process of forming a trust company that \n\nwill consolidate our present trust operations, provide \n\ngreater expertise to our clients and allow us to expand trust \n\nservices to additional markets. \n\nThis year’s annual report features a few of the many peo- \n\nple that we work for every day – our shareholders and \n\ncustomers. As we grow the Company, we promise that our \n\ndedication to you will not waver, and that we will continue \n\nto focus on the importance of value and values. \n\nThank you for your investment in and support for First \n\nFinancial Bankshares. \n\n\n\ngood addition to the Sweetwater bank, and we are pleased \n\nto have a location in the Trent community. \n\nWe are honored that Johnny Trotter, President and Chief \n\nExecutive Officer of Livestock Investors, Ltd., has accepted \n\nnomination for election as a new director of the Company \n\nat our annual shareholder meeting in April 2003. He is \n\npresently a director of the Hereford State Bank and a \n\nprominent business, community and cattle industry leader. \n\nCraig Smith, President and Chief Executive Officer of \n\nHereford State Bank, retired at the end of 2002, after 31 \n\nyears of service to the bank. Craig also served as a direc- \n\ntor on our Company board. Mike Mauldin, a well-known \n\nTexas Panhandle banker with over 23 years of banking \n\nexperience, has been elected President and Chief Executive \n\nOfficer of the Hereford State Bank to succeed Craig. \n\nAfter 12 years of service, Curtis Harvey, Executive Vice \n\nPresident and Chief Financial Officer, will be leaving the \n\nCompany on March 31, 2003, to manage his new business \n\ninterest in Fort Worth. J. Bruce Hildebrand has been \n\nelected to succeed Curtis. Bruce, a CPA, was a financial \n\nservices audit partner at KPMG LLP, where he worked for \n\n24 years. He is well-qualified for the Executive Vice \n\nPresident/Chief Financial Officer position due to his expe- \n\nrience with publicly held companies and financial \n\ninstitutions. The Board has also elected Gary L. Webb as \n\nExecutive Vice President/Operations. Gary has over 15 \n\nyears of experience in the banking and consulting indus- \n\ntries, and will be managing our technology, operations, \n\ntraining and product development. Over the next several \n\nyears, we plan to make additional investments in technol- \n\nogy in order to expand our services and gain operating \n\nefficiencies for the Company. \n\nWe thank Craig and Curtis for their outstanding service and \n\ndedication to the Company, and we welcome the newest \n\nmembers of our management team. We are very honored \n\nto have these experienced professionals join the \n\nCompany. We also are pleased that Kenneth T. Murphy \n\nwill continue as Chairman of the Board and in that role will \n\nfocus on acquisitions. With this experienced management \n\nteam, which includes our 10 bank presidents, we are \n\npoised for growth and continued strong results. We \n\ngreatly appreciate both their efforts and those of our \n\ndirectors and employees.", + "page_start": 6, + "page_end": 6, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Energy Generation and Storage Segment \n\nEnergy Generation and Storage Sales \n\nWe record as deferred revenue any non-refundable amounts that are collected from customers related to prepayments, \n\nwhich is recognized as revenue ratably over the respective customer contract term. As of September 30, 2024 and \nDecember 31, 2023, deferred revenue related to such customer payments amounted to $1.73 billion and $1.60 billion, \nrespectively, mainly due to contractual payment terms. Revenue recognized from the deferred revenue balances as of \nDecember 31, 2023 and 2022 was $1.09 billion and $511 million for the nine months ended September 30, 2024 and 2023, \nrespectively. As of September 30, 2024, total transaction price allocated to performance obligations that were unsatisfied or \npartially unsatisfied for contracts with an original expected length of more than one year was $6.61 billion. Of this amount, we \nexpect to recognize $4.23 billion in the next 12 months and the rest over the remaining performance obligation period. \n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our energy \nproducts. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $32 million and $31 \nmillion, respectively, in Accounts receivable, net, and $641 million and $578 million, respectively, in Other non-current assets \nfor the long-term portion. \n\nIncome Taxes \n\nWe are subject to income taxes in the U.S. and in many foreign jurisdictions. Significant judgment is required in \ndetermining our provision for income taxes, our deferred tax assets and liabilities and any valuation allowance recorded against \nour net deferred tax assets that are not more likely than not to be realized. We monitor the realizability of our deferred tax assets \ntaking into account all relevant factors at each reporting period. In completing our assessment of realizability of our deferred \ntax assets, we consider our history of income (loss) measured at pre-tax income (loss) adjusted for permanent book-tax \ndifferences on a jurisdictional basis, volatility in actual earnings, excess tax benefits related to stock-based compensation in \nrecent prior years and impacts of the timing of reversal of existing temporary differences. We also rely on our assessment of the \nCompany’s projected future results of business operations, including uncertainty in future operating results relative to historical \nresults, volatility in the market price of our common stock and its performance over time, variable macroeconomic conditions \nimpacting our ability to forecast future taxable income, and changes in business that may affect the existence and magnitude of \nfuture taxable income. Our valuation allowance assessment is based on our best estimate of future results considering all \navailable information. \n\nOur provision for or benefit from income taxes for interim periods is determined using an estimate of our annual \neffective tax rate, adjusted for discrete items, if any, that are taken into account in the relevant period. Each quarter, we update \nour estimate of the annual effective tax rate, and if our estimated tax rate changes, we make a cumulative adjustment. \n\nNet Income per Share of Common Stock Attributable to Common Stockholders \n\nThe following table presents the reconciliation of net income attributable to common stockholders to net income used in \n\ncomputing basic and diluted net income per share of common stock (in millions): \n\nThree Months Ended September 30, Nine Months Ended September 30, \n\nNet income attributable to common stockholders \n\nLess: Buy-outs of noncontrolling interest \n\nNet income used in computing basic and diluted net \nincome per share of common stock", + "page_start": 15, + "page_end": 15, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Energy Generation and Storage Demand, Production and Deployment \n\nThe long-term success of this business is dependent upon incremental volume growth. We continue to increase the \n\nproduction and capabilities of our energy storage products to meet high levels of demand, including the introduction of \nPowerwall 3 in 2024, the construction of a new Megafactory in Shanghai and the ongoing ramp at our Megafactory in Lathrop, \nCalifornia. For Megapack, energy storage deployments can vary meaningfully quarter to quarter depending on the timing of \nspecific project milestones and logistics. As these product lines grow, we will have to maintain adequate battery cell supply for \nour energy storage products. At the same time, changes in government and economic incentives or tariffs may also impact our \nsales, cost structure and the competitive landscape. \n\nCash Flow and Capital Expenditure Trends \n\nOur capital expenditures are typically difficult to project beyond the short-term given the number and breadth of our \n\ncore projects at any given time, and may further be impacted by uncertainties in future global market conditions. We are \nsimultaneously developing and ramping new products, building or ramping manufacturing facilities on three continents, \npiloting the development and manufacture of new battery cell technologies, expanding our Supercharger network and investing \nin autonomy and other artificial intelligence enabled training and products, and the pace of our capital spend may vary \ndepending on overall priority among projects, the pace at which we meet milestones, production adjustments to and among our \nvarious products, increased capital efficiencies and the addition of new projects. Owing and subject to the foregoing as well as \nthe pipeline of announced projects under development, all other continuing infrastructure growth and varying levels of \ninflation, we currently expect our capital expenditures to exceed $11.00 billion in 2024 and be between $8.00 to $10.00 billion \nin each of the following two fiscal years. \n\nOur business has generally been consistently generating cash flow from operations in excess of our level of capital \n\nspend, and with better working capital management resulting in shorter days sales outstanding than days payable outstanding, \nour sales growth is also generally facilitating positive cash generation. We have and will continue to utilize such cash flows, \namong other things, to invest in autonomy, do more vertical integration, expand our product roadmap and provide financing \noptions to our customers. At the same time, we are likely to see heightened levels of capital expenditures during certain periods \ndepending on the specific pace of our capital-intensive projects and other potential variables such as rising material prices and \nincreases in supply chain and labor expenses resulting from changes in global trade conditions and labor availability. Overall, \nwe expect our ability to be self-funding to continue as long as macroeconomic factors support current trends in our sales. \n\nCritical Accounting Policies and Estimates \n\nFor a description of our critical accounting policies and estimates, refer to Part II, Item 7, Critical Accounting Policies \n\nand Estimates in our Annual Report on Form 10-K for the year ended December 31, 2023. There have been no material \nchanges to our critical accounting policies and estimates since our Annual Report on Form 10-K for the year ended \nDecember 31, 2023. \n\nRecent Accounting Pronouncements \n\nSee Note 1, Overview & Summary of Significant Accounting Policies, to the consolidated financial statements included", + "page_start": 34, + "page_end": 34, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "The increase in aggregate dollars in all periods presented is primarily a result of the expansion of our \noperations through internal growth and acquisitions. \n\nThe increase in cost of operations as a percentage of revenue from 2002 to 2003 and the decrease in cost \nof operations as a percentage of revenue from 2003 to 2004 is primarily attributable to higher self-insurance \nexpense in 2003. Self-insurance expense was $165.3 million, $189.5 million and $138.1 million for the years \nended December 31, 2004, 2003 and 2002, respectively. The increase in self-insurance expense in 2003 related \nto existing claims and was attributable to the expansion of our operations and various changes in estimates as a \nresult of continued negative trends through the 2003 policy year. \n\nExcluding self-insurance expense, cost of operations as a percentage of revenue increased during the year \nended December 31, 2004 versus the comparable 2003 period. This increase is primarily attributable to \nincreased fuel prices, labor costs and subcontracting costs associated with the long-haul transport of waste by \nthird-party vendors. Excluding self-insurance expense, cost of operations as a percentage of revenue decreased \nin 2003 versus the comparable 2002 period due to the elimination of closure and post-closure expense as a \ncomponent of cost of operations in accordance with SFAS 143 in 2003 and the termination of our operating \nlease facility in July 2002. This decrease was partially oÅset by increased fuel prices, an increase in waste taxes \nlevied on landÑll volumes in certain states, an increase in revenue generated by lines of business that produce \nlower operating margins and an increase in the long-haul transport of waste by third-party vendors. \n\nTo date in 2005, we have experienced a signiÑcant increase in fuel prices. We believe that cost of \noperations as a percentage of revenue may continue to remain high depending upon the cost of fuel, health \ninsurance, risk insurance and other key components of our cost structure and general economic conditions. \n\n*Depreciation, Amortization and Depletion of Property and Equipment.*Depreciation, amortization and \ndepletion expenses for property and equipment were $252.4 million, $233.8 million and $193.5 million, or, as a \npercentage of revenue, 9.3%, 9.3% and 8.2%, for the years ended December 31, 2004, 2003 and 2002, \nrespectively. The increase in aggregate dollars from 2003 to 2004 is primarily due to the expansion of our \noperations through internal growth and acquisitions. The increase in aggregate dollars and as a percentage of \nrevenue from 2002 to 2003 is primarily due to an increase in landÑll amortization associated with the adoption \nof SFAS 143. The remaining increase from 2002 to 2003 is due to increased depreciation expense resulting \nfrom capital expenditures, acquisitions and the purchase of equipment originally placed into service pursuant \nto an operating lease. \n\nIntangible assets consist primarily of cost in excess of fair value of \nnet assets acquired, but also includes values assigned to long-term contracts, covenants not to compete and \ncustomer relationships. Expenses for amortization of intangible assets were $7.0 million, $5.3 million and \n$6.1 million, or, as a percentage of revenue, .3%, .2% and .2%, for the years ended December 31, 2004, 2003 \nand 2002, respectively. The increase in such expenses in aggregate dollars and as a percentage of revenue from \n2003 to 2004 is primarily due to amortization expense on amounts that were recorded in other intangible assets \nduring the three months ended September 30, 2004 resulting from an extensive internal review of all recent \nacquisitions. The increase in amortization of intangible assets in aggregate dollars is also due to the \namortization of intangible assets associated with businesses acquired during 2004. \n\n*Amortization of Intangible Assets.*", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "What are the physical requirements for installing the Storwize V7000?", + "target_page": 70, + "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "When you plan deployment of Storwize V7000, identify networking technologies that you will \nuse. \n\n**Note:**With Spectrum Virtualize V8.1.1.1 and later, RDMA (iSER) is supported by 25 Gb \nEthernet iSCSI adapter cards with V7000 Gen2+ only. For more information, see 3.7.4, \n“iSCSI Extensions for RDMA (iSER)” on page 62. \n\n**3.4 Physical planning**\n\nYou must consider several key factors when you are planning the physical site of a Storwize \nV7000 installation. The physical site must have the following characteristics: \n\n(cid:2) Meets power, cooling, and location requirements of the Storwize V7000 nodes. \n\n(cid:2) Has two separate power sources. \n\n(cid:2) Sufficient rack space exists for the installation of controller and disk expansion enclosures. \n\n(cid:2) Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not \nexceed maximum power rating of the rack. For more information about the power and \nenvironmental requirements, see this website. \n\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy \nof the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides \ninformation about environmental and power requirements. \n\n**3.4.1 Cabling**\n\nCreate a cable connection table that follows your environment’s documentation procedure to \ntrack all of the following connections that are required for the setup: \n\n(cid:2) Power \n(cid:2) Ethernet \n(cid:2) SAS \n(cid:2) iSCSI or Fibre Channel over Ethernet (FCoE) connections \n(cid:2) Switch ports (FC, Ethernet, and FCoE) \n\nDistribute your disk expansion enclosures evenly between control enclosures, nodes within \ncontrol enclosures, and SAS channels within nodes. For more information, search for “SAS \ncabling guidelines” at this IBM Knowledge Center page. \n\nWhen planning SAN cabling make sure that your physical topology allows you to observe \nzoning rules and recommendations. \n\nIf the data center provides more than one power source, make sure that you use that capacity \nwhen planning power cabling for your system.", + "page_start": 69, + "page_end": 69, + "source_file": "sg247938.pdf" + }, + { + "text": "**2.8 Useful IBM Storwize V7000 websites**\n\nSee the following IBM Storwize V7000 web pages for more information: \n\n(cid:2) IBM Support page: \n\nhttps://www.ibm.com/support/home/product/5402112/IBM_Storwize_V7000_(2076) \n\n(cid:2) IBM Storwize V7000 Unified and IBM Storwize V7000 Systems: \n\nhttps://www.ibm.com/support/home/product/5421300/IBM_Storwize_V7000_Unified \n\n(cid:2) IBM Storwize V7000 page support \n\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1003741 \n\n(cid:2) Direct attachment of IBM Storwize V7000 \n\nhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1005776 \n\n(cid:2) IBM Knowledge Center: \n\nhttps://www.ibm.com/support/knowledgecenter/en/ST3FR7_8.2.1/com.ibm.storwize.v7 \n000.821.doc/v7000_ichome.html", + "page_start": 63, + "page_end": 63, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.1 General planning rules**\n\n**Important:**At the time of this writing, the statements that are provided in this book are \naccurate but can change. Always verify any statements that are made in this book with the \nIBM Storwize V7000 supported hardware list, device driver, firmware, and recommended \nsoftware levels information that are available at the following websites: \n\n(cid:2) Support Information for Storwize V7000 \n(cid:2) IBM System Storage Interoperation Center (SSIC) \n\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning \nmust include several important steps. These steps ensure that the Storwize V7000 provides \nthe best possible performance, reliability, and ease of management for your application \nneeds. The correct configuration also helps minimize downtime by avoiding changes to the \nStorwize V7000 and the storage area network (SAN) environment to meet future growth \nneeds. \n\nThis book is*not*intended to provide in-depth information about the described topics. For an \nenhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and \nStorwize V7000 Best Practices and Performance Guidelines, SG24-7521. \n\n**3.1.1 Basic planning flow**\n\nThe general rule of planning is to define your goals, and then, plan a solution that can be \nshown to meet these goals. Always remember to verify that each element of your \nconfiguration is supported. \n\nConsider the following points when planning for the Storwize V7000: \n\n(cid:2) Collect and document the number of hosts (application servers) to attach to the Storwize \nV7000. Identify the traffic profile activity (read or write, sequential, or random), and the \nperformance requirements (bandwidth and input/output [I/O] operations per second \n[IOPS]) for each host. \n\n(cid:2) Decide whether you are going to use Storwize V7000 to virtualize external storage. If you \ndo, collect and document the following items: \n\n– Information on the back-end storage that exists in the environment and is intended to \n\nbe virtualized by the Storwize V7000. \n\n– Whether you must configure image mode volumes. If you want to use image mode \nvolumes, decide whether and how you plan to migrate them into managed mode \nvolumes. \n\n– Information about the planned new back-end storage to be virtualized by the Storwize \nV7000. \n\n– The required virtual storage capacity for fully provisioned and space-efficient (SE) \nvolumes. \n\n– The required storage capacity for: \n\n(cid:129) Local mirror copy (volume mirroring) \n(cid:129) Point-in-time copy (IBM FlashCopy) \n(cid:129) Remote copy (Metro Mirror and Global Mirror) \n(cid:129) Compressed volumes \n(cid:129) Encrypted volumes", + "page_start": 65, + "page_end": 65, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.4.4 Updating IBM Storwize V7000 drive code**\n\nAfter completing the Storwize V7000 software update as described in 13.4, “Software update” \non page 687, the firmware of the Storwize V7000 drives also must be updated. The upgrade \ntest utility identified that downlevel drives are in the system, as shown in Figure 13-25. \nHowever, this fact does not stop the system software from being performed. \n\nFigure 13-25 Upgrade test utility drive firmware warning \n\nTo update the IBM Storwize V7000 drive code, complete the following steps: \n\n1. Download the latest Drive firmware package for IBM Storwize V7000 from Fix Central. \n2. On the Storwize V7000 GUI, navigate to**Pools**→**Internal Storage**and select**All**\n**Internal.**", + "page_start": 717, + "page_end": 717, + "source_file": "sg247938.pdf" + }, + { + "text": "**Uploading the SSH public key to the IBM Storwize V7000**\nAfter you create your SSH key pair, upload your SSH public key onto the IBM Storwize \nV7000. Complete the following steps: \n\n1. Open the user section in the GUI, as shown in Figure B-5.", + "page_start": 781, + "page_end": 781, + "source_file": "sg247938.pdf" + }, + { + "text": "**5.11.2 Working with enclosures**\n\nThe following section describes how to add or remove expansion enclosure to or from your \nIBM Storwize V7000 system. \n\n**Adding an enclosure**\nAfter the expansion enclosure is properly attached and powered on, complete the following \nsteps to activate it in the system: \n\n1. \n\nIn the System pane that is available from the Monitoring menu, select**SAS Chain View**. \nOnly correctly attached and powered on enclosures appear in the window, as shown in \nFigure 5-88. The new enclosure is showing as unmanaged, which means it is not currently \npart of the system.", + "page_start": 207, + "page_end": 207, + "source_file": "sg247938.pdf" + }, + { + "text": "– Prerequisites: \n\n(cid:129) Storwize V7000 and the external storage system are connected to the same SAN \nfabric. \n\nIf there are VMware ESX host s involved in the data migration, the VMware ESX \nhosts are set to allow volume copies to be recognized. \n\nFor more information about the Storage Migration prerequisites, see 9.1.2, “Prerequisites” \non page 387. \n\nIf all restrictions are satisfied and prerequisites are met, select all of the options and click \n**Next**, as shown in Figure 9-4.", + "page_start": 411, + "page_end": 411, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.6 Troubleshooting and fix procedures**\n\nThe management GUI of IBM Storwize V7000 is a browser-based GUI for configuring and \nmanaging all aspects of your system. It provides extensive facilities to help troubleshoot and \ncorrect problems. This section explain how to effectively use its features to avoid service \ndisruption of your IBM Storwize V7000. \n\nFigure 13-33 shows the menu to start the Monitoring menu for System information, viewing \nEvents, or seeing real-time Performance statistics.", + "page_start": 723, + "page_end": 723, + "source_file": "sg247938.pdf" + }, + { + "text": "**Initial configuration**\n\nThis chapter describes the initial configuration of the IBM Storwize V7000 system. It provides \nstep-by-step instructions about how to create the cluster, define its basic settings, and add \nnodes and optional expansion enclosures. \n\nOther features, such as user authentication, secure communications, and local port masking, \nare also covered. These features are optional and do not need to be configured during the \ninitial configuration. \n\nThis chapter includes the following topics: \n\n(cid:2) 4.1, “Prerequisites” on page 88 \n(cid:2) 4.2, “System initialization” on page 89 \n(cid:2) 4.3, “System setup” on page 92 \n(cid:2) 4.4, “Configuring user authentication” on page 108 \n(cid:2) 4.5, “Configuring secure communications” on page 117 \n(cid:2) 4.6, “Configuring local Fibre Channel port masking” on page 121 \n(cid:2) 4.7, “Other administrative procedures” on page 124", + "page_start": 108, + "page_end": 108, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.4 Software update**\n\nThis section describes the operations to update your Storwize V7000 software to V8.1. \n\nThe format for the software update package name ends in four positive integers that are \nseparated by dots. For example, a software update package might have the following name: \n\nIBM_2145_INSTALL_8.2.1.0 \n\n**13.4.1 Precautions before the update**\n\nThis section describes the precautions that you should take before you attempt an update. \n\n\n \n \n \n \n [html]\n
Important : Before you attempt any IBM Storwize V7000 code update, read and
understand the Storwize VT000 concurrent compatibility and code cross - reference matrix.
For more information, see this website and click Latest Storwize V7000 code.
\n\nDuring the update, each node in your Storwize V7000 clustered system is automatically shut \ndown and restarted by the update process. Because each node in an I/O Group provides an \nalternative path to volumes, use the Subsystem Device Driver (SDD) to make sure that all I/O \npaths between all hosts and storage area networks (SANs) work. \n\nIf you do not perform this check, certain hosts might lose connectivity to their volumes and \nexperience I/O errors when the Storwize V7000 node that provides that access is shut down \nduring the update process. You can check the I/O paths by using**datapath query**SDD \ncommands. \n\n**13.4.2 IBM Storwize V7000 update test utility**\n\nThe software update test utility is a Storwize V7000 software utility that checks for known \nissues that can cause problems during a Storwize V7000 software update. For more \ninformation about the utility, see this website. \n\nDownload the software update utility from this page where you can also download the \nfirmware. This procedure ensures that you receive the current version of this utility. You can \nuse the**svcupgradetest**utility to check for known issues that might cause problems during a \nsoftware update. \n\nThe software update test utility can be downloaded in advance of the update process. \nAlternately, it can be downloaded and run directly during the software update, as guided by \nthe update wizard. \n\nYou can run the utility multiple times on the same IBM Storwize V7000 system to perform a \nreadiness check-in preparation for a software update. Run this utility for a final time \nimmediately before you apply the software update to ensure that there were no new releases \nof the utility since it was originally downloaded.", + "page_start": 708, + "page_end": 708, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", + "target_page": 218, + "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "[html]net1_end= * 192.168.11.212 *# Last IP from PoolFWI conf1guration ( 0CP - Master Nodes )β ------------------------------------vm1_number- 91 ## Number of VMsvm1_memory--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Menory GBvm1_cpu--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Virtual CPUvml_vcpu_rat10--------# vCPU RATI0 1 : 2 1 vCPU = 0.5 eCPU ( cores )vm1_name• \" mstnode \"# Hostname pref1xvm1_f1 rst_1p• \" 192.168.11.202 \"ǂ F1st 1P from a consecutive pool of IPsvml_1mage_name• \" x1v_p9_1mage_rhe176 \"# The 1mage namevml_remote_restart• \" true \"# Enable Auto Remote Restartvml_storage_name• \" x1v_StoragePoo1 \"# Storage Temp1atevm1_dockerd1sk1--- 256 *# Docker d1sk s1ze 1n GB for ephemera1 storageFWZ conf1guration ( 0CP - Infra Nodes )femore -------------------------------vm2_number--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Number of VMsvm2_memory- \" 16 \"# Menory GBvm2_cpu--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Virtual CPUvm2_vcpu_rat10-------# vCPU RAT1.1 : 4 1 vCPU • 0.25 eCPU ( cores )vm2_nameα * 1nf node *# Hostname pref1xvm2_f1 rst_1p= * 192.168.11.205 *ǂ F1st 1P from a consecutive pool of IPsvm2_1mage_name• \" x1v_p9_1mage_rhe176 \"# The 1mage namevm2_remote_restart• \" true \"# Enable Auto Renote RestartvmZ_storage_name= * x1v_StoragePoo1 *# Storage Temp1atevm2_dockerd1sk1--- 64 *ǂ Docker d1sk s1ze 1n GB for ephemera1 storageFW3 conf1gurat1on ( 0CP - korkers ( App ) Nodes )β ------------------------------------vm3_number--------# Number of VMsvm3_memory- \" 64 \"# Menory GBvm3_cpu--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Virtual CPUvm3_vcpu_rat10--------# vCPU RATI0 1 : 2 1 vCPU = 0.5 eCPU ( cores )vm3_name• \" wrknode \"# Hostname pref1xvm3_f1 rst_1p• \" 192.168.11.208 \"ǂ F1st 1P from a consecutive pool of IPsvm3_1mage_name• \" x1v_p9_1mage_rhe176 \"# The 1mage namevm3_remote_restart- \" false \"# Disable Auto Remote Restartvm3_storage_name• \" x1v_StoragePoo1 \"# Storage", + "page_start": 133, + "page_end": 133, + "source_file": "sg248459.pdf" + }, + { + "text": "3,THIN_PROVISION_VOL_1,0,io_grp0,online,0,Pool0,100.00GB,striped,,,,,6005076400F58004980000 \n0000000005,0,1,empty,1,no,0,0,Pool0,no,yes,3,THIN_PROVISION_VOL_1, \n6,MIRRORED_SYNC_RATE_16,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000 \n0000000008,0,1,empty,0,no,0,0,Pool0,no,yes,6,MIRRORED_SYNC_RATE_16, \n7,THIN_PROVISION_MIRRORED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004 \n9800000000000009,0,1,empty,1,no,0,0,Pool0,no,yes,7,THIN_PROVISION_MIRRORED_VOL, \n8,Tiger,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F580049800000000000010,0,1,e \nmpty,0,no,0,0,Pool0,no,yes,8,Tiger, \n9,UNCOMPRESSED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n00011,0,1,empty,0,no,1,0,Pool0,no,yes,9,UNCOMPRESSED_VOL, \n12,vdisk0_restore,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000000000 \n000E,0,1,empty,0,no,0,0,Pool0,no,yes,12,vdisk0_restore, \n13,vdisk0_restore1,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n0000F,0,1,empty,0,no,0,0,Pool0,no,yes,13,vdisk0_restore1, \n\n\n \n \n \n \n [html]\n
Example 7 - 36
The Isvdisk command : Storage pool ID and name
IBM_Storwize : ITS0 : superuser > 1svd1sk 0
1.0
name A_MIRR0RED_VOL_1
I0_group_id 0
I0_group_name 10_grp0
status on ' ine
md1sk_grp_id 0
md1sk_grp_name_Poo10
10.00GB
type striped
formatted yes
formatting no
md1 sk_1d
md1sk_name
FC_1d
FC_name
RC_1d
RC_name
vd1sk_UID 6005076400F58004980000000000000
preferred_node_1.2
fast_wri te_state empty
cache readwrite
ud1.4660
fc_map_count_0
sync_rate 50
copy_count 1
se_copy_count_0
F11e system
m1rror_wri te_pr1or1ty 1atency
RC_change no
compressed_copy_count_0
access_I0_group_count 1
1ast_access_time
parent_md1sk_grp_id 0
parent_md1sk_grp_name Poo10
owner_type_none
", + "page_start": 333, + "page_end": 333, + "source_file": "sg247938.pdf" + }, + { + "text": "**Naming rules:**When you choose a name for a pool, the following rules apply: \n\n(cid:2) Names must begin with a letter. \n\n(cid:2) The first character cannot be numeric. \n\n(cid:2) The name can be a maximum of 63 characters. \n\n(cid:2) Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), \nunderscore (_), period (.), hyphen (-), and space. \n\n(cid:2) Names must not begin or end with a space. \n\n(cid:2) Object names must be unique within the object type. For example, you can have a \n\nvolume that is named ABC and a storage pool that is calledvolumes that are \ncalledvolumes called ABC. \n\n(cid:2) The default object name is valid (object prefix with an integer). \n\n(cid:2) Objects can be renamed to their current names. \n\nThe new pool is created and is included in the list of storage pools with zero bytes, as shown \nin Figure 6-8. \n\nFigure 6-8 Newly created empty pool \n\nTo perform this task with the CLI, the**mkmdiskgrp**command is used. The only required \nparameter is extent size. It is specified with the**-ext**parameter, which must have one of the \nfollowing values: 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, or 8192 (MB). To create Data \nReduction Pool, specify**-datareduction yes**. In Example 6-2, the command creates DRP \nnamed “Pool2” with no MDisks in it. \n\nExample 6-2 mkmdiskgrp command \n\n\n \n \n \n \n [html]\n
IBM_StorwizeITS0V7K
superuser > mkmd iskgrp- name
Poo12- datareduction
\n\n**6.1.2 Managed disks in a storage pool**\n\nA storage pool is created as an empty container, with no storage assigned to it. Storage is \nthen added in the form of**MDisks**. An MDisk can be either an array from internal storage (as \nan array of drives) or an LU from an external storage system. The same storage pool can \ninclude both internal and external MDisks. \n\nArrays are assigned to storage pools at creation time. You cannot have an array that does not \nbelong to any storage pool. They cannot be moved between storage pools. It is only possible \nto destroy an array by removing it from a pool and to re-create it with a new pool. \n\nExternal MDisks can exist outside the pool. You can assign them to storage pools and remove \nthem from storage pools. The MDisk object remains on a system, but its state (mode of \noperations) might change.", + "page_start": 217, + "page_end": 217, + "source_file": "sg247938.pdf" + }, + { + "text": "[html]yVu00600000000590223he00355 yama1LsjK934_flY1wa0e4GPEc521iv = 453A2BDeE * bA53LVdpF3 55YV0rLX1r ( 701 )F1FZqQ = Bogdan Savu ; 18MR0045771 ; 18MR0ZZ014E826 ; Jq *dns1− * 192.168.PDNSserver 1dns_doma1n** domain. exampPDNSDomain Name# Network conf igurationJournal - Denovementnet1_name- \" net_ocp_c ' uster1 \"# NetwoΔ - k Namenet1_v1an_1d− * 1 *# VLANnet1_subnet− * 192.168.11.0 / 21 *# Netwonet1_gateway** 192.168.11.1 *# Gatewnet1_start- * 192.168.11.223 ## FirstIP from Poolnet1_end- * 192.168.11.223 ## LastIP from Poo1FIM1 conf1gurat1on ( 0CP - Master Nodes )Jensense ------------------------------vml_number------# NumberGeneticsvml_memory--- 32 *# Memor,vm1_cpu-------# VirtuCPUvml_vcpu_rat10-----# vCPUATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm1_nameα * bsocp *# HostnAge greathervm1_f1 rst_1p** 192.168.11.223 *# FistIP from a consecutive pool of IPsvml_tmage_name• \" x1v_p9_1mage_rhe176 \"# The 1mage namevml_remote_restart• \" true \"# Enab1Restartvml_storage_name• \" x1v_StoragePoo1 \"# StoraTemp1atevm1_dockerd1sk1α * 0 **# Docke- d1sk s1ze 1n GB for ephemera1 storage# WR conf1guration ( OCP - Infra Nodes )Jensense ------------------------------vm2_numberα - 90 *# NumberGeneticsvrr2_memory--- 16 *# Memor,vmZ_cpu-----# VirtuCPUvm2_vcpu_rat10-------# vCPURATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm2_name• \" 1nf ' node \"# HostnAge greathervm2_f1 rst_1p** 192.168.11.205 *# FistIP from a consecutive pool of IPsvm2_1mage_name• \" x1v_p9_image_# The 1nage namevm2_remote_restart• \" true \"# Enab1Restartvm2_storage_name• \" x1v_StoragePoo1 \"# StoraTemp1atevm2_dockerd1sk1--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------# Docke- d1sk s1ze 1n GB for ephemera1 storage# WB conf1gurat1on ( OCP - korkers ( App ) Nodes )Jensense ------------------------------vm3_numberα - 90 *# NumberGeneticsvrn3_memory--- 32 *# Memor,vm3_cpu-----# VirtuCPUvm3_vcpu_rat10-------# vCPURATI0 1 : 4 1 vCPU = 0.25 eCPU ( cores )vm3_name• \" appnode \"# HostnAge greathervm3_f1 rst_1p\n ", + "page_start": 130, + "page_end": 130, + "source_file": "sg248459.pdf" + }, + { + "text": "You can use the MDisk by Pools view to show the object encryption state by clicking**Pools**→ \n**MDisk by Pools**. Figure 12-76 shows an example in which self-encrypting MDisk is in an \nunencrypted pool. \n\n\n \n \n \n \n [html]\n
Create / PoolII Actions *DefaultGenes ×nite
NameStateCapacityEnorgation
Unansigned POSAS ( 1 )
Pool✓ OrilionaIntase S. 45 T48 ( 0 %)
Yesrradiability✓ 0nineS. 46 TIRYes
P = 0✓ 0nlingSytem / 10.91.16 ( 0 %)N0
mdiotic✓ 0nter5.46 T4BN0
\n\nFigure 12-76 MDisk encryption state \n\nWhen working with MDisks encryption, take extra care when configuring MDisks and pools. \n\nIf the MDisk was earlier used for storage of unencrypted data, the extents can contain stale \nunencrypted data. This issue occurs because file deletion only marks disk space as free. The \ndata is*not*removed from the storage. Therefore, if the MDisk is not self-encrypting and was a \npart of an unencrypted pool, and later was moved to an encrypted pool, it contains stale data \nfrom its previous life. \n\nAnother mistake that can occur is to misconfigure an external MDisk as self-encrypting, while \nin reality it is not self-encrypting. In that case, the data written to this MDisk is not encrypted \nby Storwize V7000 because Storwize V7000 is convinced that the MDisk encrypts the data. \nAt the same time, the MDisk does not encrypt the data because it is not self-encrypting, so \nyou end up with unencrypted data on an extent in an encrypted pool. \n\nHowever, all data that is written to any MDisk that is a part of correctly configured encrypted \npool is going to be encrypted. \n\n**Self-encrypting MDisks**\nWhen adding external storage to a pool, be exceptionally diligent when declaring the MDisk \nas self-encrypting. Correctly declaring an MDisk as self-encrypting avoids waste of \nresources, such as CPU time. However, when used improperly, it might lead to unencrypted \ndata at-rest.", + "page_start": 682, + "page_end": 682, + "source_file": "sg247938.pdf" + }, + { + "text": "r100720000us ingworkarea, r1300730000*00740000* Detnee message1ength00750005*00760000s1r -r1, r1Number of bytes007700051r15, msgtxtaget starting address00780005nu11oopds0h00790006c110 ( r15 ), × ' 00 'Is 1t zero?00800005JenomoreYes - quit008100051ar1.1 (, r1 )Bump count00820005", + "page_start": 278, + "page_end": 278, + "source_file": "sg246915.pdf" + }, + { + "text": ": 10 : 03.419 ***********neonatal nether_tature : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 18 : 19 : 18 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 19 : 1Ensure openshift - ans1bTe instalTer package deps aropensh1ft_excluder : Insta11 docker excluder - yunopensitif1_tepas :: hefresh cache --------------------------------------------------------------------------------------------------------------------------------------------------------------------------canta / ner_rantine : Start the Docker service.................................................................................................................................................................cantalner_runtite : Create credentials for aregur1 ~ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6 ‐ 6opensh1ft_repos :: Ensure 11bse11nux - python 1.1nsta1ledcantalner_runt. tire : F1xap SELInux pemI ss1ans for dacker.....................................................................................................................................................α_1Yrexil1 | :: [ nstal1 | firexil1d patkeges : -----------------------------------------------------------------------------------------------------------------------------------------------------------------Gather ’ ttg Facts “----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------container_runtine : Get current 1nstal1ed Docker vers10nGather † tg Tacts →~~~~~–‐–‐–‐–‐–‐–‐–‐–>–>––––––––––––––––––––––––––––––––––––Start and enable rtp0 / ctmttryd - envent - envent - envent - envent - envent - envent - envent - relatedas_firexil1 : Ensure tptables services are not enabled ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐Check for NetworkNatuger Service ‐ concentration ‐ concentration ‐ concentration ‐ concentrationscontalner_runtine : Setup the docker - storage for overlay--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐openshift_simit12e_Inientary :: Include_tasks, ~~~~~‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "[html]•Register* 00230000*Convention :R1 po1nts to the Parameter 11st* 00240000*: 12 base register00250000•* 00260000*Patch Label :PSPACE* 00270000** 00280000*Input :Parameter 11st po1nted to by Reg1ster 1* 00290000*Parameter 11st contains addresses of :* 00300000*- message 1ength* 00310000*- message text* 00320000** 00330000*Output :None* 00340000** 00350000*Return codes :* 00360000** 00370000•NORMAL :R15 – return code from WT0* 00380000** 00390000*Ex1 ts :Return to caller v1a BR 14* 00400000** 00410000*Externa1References :* 00420000** 00430000*ChangeAct 1 v1 ty :See below* 00440000** 00450000*Ver ReModDateDescription of Change* 00460000** 00470000*00004 / 05 / 00Release 7.2* 00480000** 00490000******A + A + A +END OF MODULE SPECIFICATIONS********************************************************************************************************************************************************************************************************00500000ARSLOGcsect00510000ARSL0Grrmode any00520000ARSL0Gamode3100530000using*, r1500540000bpastcopy00550000dcC ' ARSLOG ' s date '00560000dcC ' 5622 - 662 ( C ) COPYR1GHT 1BM CORP. 2013 '00570000dcC * ALL RIGHTS RESERVED00580000dcC ' LICENSED MATERIALS - PROPERTY OF IBM '00590000pastcopyds0h00600000s tm14.12.12 ( r13 )006100011 rr12, r15006200001 rr2, r100630000us ingp11 st, r200640000dropr1500650000usingARSL0G, r1200660000storaQBTA1N, 1ength = work1.1oc = ANY, cond = YES006700001 trr15, r1500680000JinZbag1t0069000str13.4 (, r1 )00700000str1.8 (, r13 )007100001 rr13, r100720000us ingworkarea, r1300730000*00740000* Detnee", + "page_start": 278, + "page_end": 278, + "source_file": "sg246915.pdf" + }, + { + "text": "**$**\n\n**724**\n(734) \n(746) **$ 255**\n441 \n364 **$ 386**\n401 \n511 **$ (14)**\n(26) \n- \n\n**$**\n\n**331**\n(5,416) \n(5,490) \n\n**$**\n\n**9,761**\n(2,893) \n9,694 \n\n**$**\n\n**$22,389**\n**$ 22 ,389**\n7,468 \n6,734 \n\n$ \n\n- \n- \n- \n\n$ \n\n**-**\n- \n- **-**\n- \n- **-**\n- \n- \n\n**$**\n\n**-**\n- \n- \n\n**$**", + "page_start": 38, + "page_end": 38, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**tar xf ibm-cloud-private-ppc64le-3.2.1.tar.gz -O | sudo docker load**\n22f2e14aaf41: Loading layer [=======================================>] 279.8 MB/279.8 MB \n4153cc3de084: Loading layer [=======================================>] 20.48 kB/20.48 kB \nceaa1e685ae1: Loading layer [=======================================>] 21.49 MB/21.49 MB \ne5c43e70143d: Loading layer [=======================================>] 170.9 MB/170.9 MB \n35f172df1a41: Loading layer [=======================================>] 23.95 MB/23.95 MB \nbde32f0ec81a: Loading layer [=======================================>] 34.3 kB/34.3 kB \naf4acfce5260: Loading layer [=======================================>] 100.7 MB/100.7 MB \n500de4764474: Loading layer [=======================================>] 28.38 MB/28.38 MB \n... \nOutput truncated \n... \n3f2ac47d1346: Loading layer [=======================================>] 611.3 kB/611.3 kB \ne9fd350aaef5: Loading layer [=======================================>] 37.7 MB/37.7 MB \n8b58cfdade26: Loading layer [=======================================>] 5.12 kB/5.12 kB \n2aa89bbaaba4: Loading layer [=======================================>] 31.39 MB/31.39 MB \ndc0532bb043a: Loading layer [=======================================>] 19.74 MB/19.74 MB \n93379faa8e65: Loading layer [=======================================>] 3.072 kB/3.072 kB \nca43800e3ee2: Loading layer [=======================================>] 3.072 kB/3.072 kB \nLoaded image: ibmcom/nginx-ingress-controller-ppc64le:0.23.1 \n\n8. Because of a limitation with OpenShift, to deploy IBM Multicloud Manager on the \n\nOpenShift Master-Infrastructure node, you must label the node as an OpenShift compute \nnode by using the following command: \n\n**oc label node mstnode01.domain.example.com node-role.kubernetes.io/compute=true**\n\n9. Create an installation directory on the boot node: \n\n**mkdir /opt/ibm-multicloud-manager-3.2.1; cd /opt/ibm-multicloud-manager-3.2.1**\n\n10.Extract the cluster directory: \n\n**docker run --rm -v $(pwd):/data:z -e LICENSE=accept --security-opt**\n**label:disable ibmcom/icp-inception-ppc64le:3.2.1-ee cp -r cluster /data**\n\n11.Copy the OpenShift admin.kubeconfig file to the cluster directory. The OpenShift \nadmin.kubeconfig file can be found in the**/etc/origin/master/admin.kubeconfig**\ndirectory: \n\n**cp /etc/origin/master/admin.kubeconfig**\n**/opt/ibm-multicloud-manager-3.2.1/cluster/kubeconfig**\n\n12.Use the power.openshift.config.yaml file to replace the config.yaml for Linux on Power \n(ppc64le) before you deploy the services: \n\n**cd /opt/ibm-multicloud-manager-3.2.1/cluster/**\n**echo y |cp power.openshift.config.yaml config.yaml**\n\n**156** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1", + "page_start": 171, + "page_end": 171, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", + "target_page": 1, + "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Simon, H. A. [ 1565 ], The Shape of Automation for Men and Management, New York : Harper & Row
Simonite. They Did nation 2233.1, Yewo - Coughe Pate to Solve Arb5cal Intelligeneses? ( Mttps :// www. technologyenesescomf203 ∆ M / GST2.2, Estallow - go - glycales - blands - solve - softilitude - strifingence ). MTTechnology Rehexies /
Strokin, Croskin, CLE Manior 2003, Chola ( CET ) a, Creator ( Bya Subjeaver on A ) Helductnalors and A Democracycles ; “ Ifitps ; Newebreaccomisless ; com / sleepimis / craigamin / CGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGA - 4 - positivea
Smoller, Stephen W, Zhang, Hong, Varg, UBAJ, “ Content based video indexing and retrieval ”. ECEE Multifedie. I ( 2 ): 62 – 72.66 / 13.1209533111553 ( https :// dois. org / 20.120992F353.31.16555 ). S2COD 30053 ( https :// dpi. 34 ) psycholan
Stistromoral : New, CHSSLAs inductive inferience Mechine ( Hbp :// world odd comr - stylinding ) PDFS, Dastrosult Summer Research Conference on Additioal intelliperos. Actived ( Intracy ) well, active gard ( QDL ) DSASSLT, NR / Ntrity / he
Standard Linesty ( 2023 ). \" Anglical treligancy, tigest, fingor, \"[ 20 ]. Trugery [ 52.54 ] cand Growternance \" ( https :// asknows. danford. edu / ve - content / uplinado / 2023 / 3414... A / virubu - Regort ( 222 ).\" pulmol \" ( 159 )...) and \"[ 452
Tac, Jaritua ; Tan, Teniu ( Z005 ), Affective Computing and Intelligent Interaction. Affective Computing A Review Lecture Notes in Computer Science, Vid, STRI, Springer gt, BBL - 995, dex Lecture Notes in Computer Science, Vid, STRI, Spr
Taylot, Jooth, Herin, Airw, Airw, CD3221 *, “ Cultulhaherer of A Govelhy Heriton quits Goodge and warrs syver dangers of miniformation ” ( Hzo ; Nwescheguardiac contylecthrology / CED20ma / GED20mar / GShorther - birther - profilter of an
Thromposin, Cherelix ( 23.2 anaury 2014 ), “ What, Usina Will the Finibotic Takes ”[ Mesh ] however, from com / business / arc01ive / 2012 / 4 / 12 / 4 / 106 / yidts - mill - the rotar - take / 203239 ]. The Allantic Activest ( 70ths ), Health archner, H
Thro. ESRen ( 12935 ). Pitabotics : The Marriage of Computers and Machiness ( https :// archive, org / let algiotider_TFRDISGSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
Two was Rnk ( t ): Toestimmber 202 ): “ Transformers Revalaboration / et al. What Will Regidace Therm ” ( Yebpul ’ teletes context - statest / distensic / 2000 / disease / mind - antibiotics - restilated - antilated replace - there ). Forchivede
", + "page_start": 63, + "page_end": 63, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "You can handle long-running tasks asynchronously. For example you can implement a queue \n\nusing Amazon SQS to manage order submission on. You can then use Step Functions to manage a \n\nworkflow that updates user information, and inventory counts after every order is processed. Along \nthe way, you will need to log actions, monitor app activity, and trace data flows to debug. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 25, + "page_end": 25, + "source_file": "serverless-core.pdf" + }, + { + "text": "Sentra CA (USA) \n\n\n \n \n \n \n [html]\n
ver the next two decades we will significantly improve
asoline and diesel engines, which is where we can make
immediate impact. We are currently developing the next
Regulation of gasoline HEVs. The generation after that will
diesel HEVs, which have even lower CO2 emissions than
α - powered HEVs. The next step will be FCVs and pure
Bectric vehicles. Nissan is actively working to further the
Husion of the fuel - cell stack we ' ve developed in - house.
At the same time, we are taking a practical, proactive
Proproach to the environment. We want to do good rather
an just look good. The second pillar is to consider how
Early infroduce these new technologies to the
orld market. Advanced but expensive technology can ’ t be
Alled on smaller, more economical cars, which are the
Consumption of us drive.
In the meantime, we have already had some notable
Cosses in the environmental area. The Nissan Sentra
A, for example, was certified as the cleanest gasoline -
wwered car in the world, and our Bluebird Sylphy was
cognized as the first - ever SU - LEV, or super - ultra - low
nission vehicle. We are proud of these successes, but we
e focusing on even more significant emissions reductions
fuel economy, continuing to develop advanced
chnologies that will bring us to our Vision Zero goal.\"
", + "page_start": 48, + "page_end": 48, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
and are souble to ear employees who are striving to grow within the compare.From databases the company vospredit, phlantatingic carn criabilitied three years age to encourage and empowerTherapistered by sheet because for Doiecreased by sheet bondations the company ( p = 1 )Whitner through bird and mortal projects or initiatives that reprove a role youth and describitioncouldree pling : With lunded of opariations beseling from primaryprovide gene to eligible equitations in vitab one general sequence statest heart first.to households of resorder database : To DM, out complexes constituted more than 50 self - months or lob ( or peoples )d : alminizenity : outs resecured with specimensed managing the Yocc3 frondation, seroling in 100 present of our employe considering pring dreed
\n\nEmployee giving achieved \nmomentous results last \nyear. While contributions \nto the Voice Foundation \nreached record amounts, \nMGM MIRAGE employees \nalso provided manpower to \nHabitat for Humanity to \nbuild homes for single \nworking mothers.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
or approximately $ 7.6 mil - kruptcy of a customer filedconsolidations and its rapid continuous improvement program to continue to build brands ; product solutions, and selling models.
vendor by the bankrupteyBecause of the following factors, as well as other variables
II outstanding receivables.affecting the Company ’ s operating results, past financial performance may not be a reliable indicator of future performance, and historical
The controlled for children ( for the controlled for the controlled for the controlled for the controlled for the controlled for the controlled to the controlled for the controlled to the controlled for the controlled for the controlleditrends should not be used to anticipate results or trends in future periods :
Nect to this contingency, in• competition within the office furniture and fireplace industries,
Some count of the claim, whichincluding competition from imported products and competitive
Age of likely exposure andpricing ;
Significance of this• increases in the cost of raw materials, including steel, which is the
The could differ from theCompany ’ s largest raw material category ;
1sultation with legal coun -• increases in the cost of health care benefits provided by the
Age from these matters, areCompar
Sect on our financial conditions• reduced demand for the Company ' s storage products caused by
Attact material effect on ourchanges in office technology, including the change from paper record
Cash flows when resolved instorage to electronic record storage ;
• the effects of economic conditions on demand for office furniture,
customer insolvencies and related bad debts, and claims against the
Company that it received preferential payments ;
Table• changes in demand and order patterns from the Company ’ s customers,
fice furniture industry will1.
1. Global Insight, BIFMA ’ sTable
for the industry shipmentTable
quarter flat and improvingTable
by the housing market,Table
There weight levels, but isTable
Regulations1.
At introductions in additionMeansferring
Sensors and sensitivity (%)Subjects, subjects, subjects, subtaneous, subunits, subunit, status, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, subunit, an
Completed the acquisition1.
The goods and seating. TheTable
oli ’ s strong position in theNe leveraging its lean enter -
Schools and improvedPow its business through
nds, enhancing its strongParameters and continued on its rapid continued
build best total cost. Theits cost savings from plant
", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Our Technologies segment has had a strong year, and has set \naggressive goals for both sales and profit growth for 2003. The \ntime is right for these businesses to lead the way to our return \nto profitability — particularly our liquid-crystal display, envi- \nronmental and semiconductor optics businesses. These are \nstrong businesses which continue to set the standard for their \nmarkets and have plenty of growth potential. If the industries \nin which we participate expand as we expect, we have every \nconfidence these businesses will be able to meet their goals. \nWe are also well on our way toward getting our optical fiber \nand cable operations back to profitability as we reduce our \nfixed cost structure. In October, we announced plans to \nclose several of our fiber plants and to streamline our cable Although it has been a very painful process, we have dramat- \nically slowed the rate at which we are consuming cash and \nshort term investments. Much of this, regrettably, was through \na variety of plant closures and the elimination of about 7,100 \njobs, in addition to the 12,000 jobs we eliminated last year. \nAs a result, a major drain on cash has been due to severance", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "on the Company’s ATM network. In addition, the Company continues to invest in the on-going development of products that were re c e n t l y \ni n t roduced to the market. The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherw i s e \nmarketed increased to $6.7 million for the year ended December 31, 2000 from $3.2 million for the year ended December 31, 1999. Of this total \nf i g u re, $1.0 million and $322,000 were capitalized, as at December 31, 2000 and 1999, re s p e c t i v e l y, in conjunction with the Company’s \naccounting policy requiring the capitalization of development costs on a product by product basis once technological feasibility is established. \nTechnological feasibility of computer software products is established when the Company has completed all planning, designing, coding, and \ntesting activities that are necessary to establish that the product can be produced to meet its design specifications including functions, feature s , \nand technical perf o rmance re q u i rements. \n\n**Operating Loss**The Software Solutions Segment incurred an operating loss of $21.5 million for the year ended December 31, 2000 and $7.1 \nmillion for the year ended December 31, 1999 as a result of the factors discussed above \n\n\n \n \n \n \n [html]( in thousonels )Years ending December 31,20001999\n
Salaries and benefits$3.81383.335
Selling, general and administrative3.8 + 13.270
Depreciation and amortization2081 + 5
Total direct operating expensesS7.862S6.750
\n\n**Non-Operating Results for the Years Ended December 31, 2000 and 1999**\n\n**Interest Income**I n t e rest income decreased to $1.1 million for the year ended December 31, 2000 from $2.0 million for the year ended December \n31, 1999 and from $2.5 million for the year ended December 31, 1998. The decrease is the result of the decrease in investment securities and cash \nas a result of negative cash flow from operations and capital expenditure s . \n\n**Interest Expense**I n t e rest expense decreased to $10.8 million for the year ended December 31, 2000 from $10.9 million for the year ended \nDecember 31, 1999 and increased from $7.8 million for the year ended December 31, 1998. The decrease from 1999 to 2000 is due to exchange \nrate diff e rences as the majority of the debt is denominated in Deutsche Mark. The increase from 1998 to 1999 is the result of accretion of the \nC o m p a n y ’s Notes Payable for a full year in 1999 in comparison to 6 months’ accretion in 1998.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", + "target_page": 1, + "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) \n\nProposal for the modern version: Pennachin & Goertzel (2007) \nWarnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy \n(2007), Beal & Winston (2009) \n5. Russell & Norvig (2021, §1.2). \n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111–136), NRC \n\n(1999, pp. 200–201) \nThe proposal: McCarthy et al. (1955) \n\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243–252), Crevier (1993, pp. 52– \n\n107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19–21) \n\n8. Funding initiatives in the early 1980s: Fifth Generation Project (Japan), Alvey (UK), \n\nMicroelectronics and Computer Technology Corporation (US), Strategic Computing Initiative \n(US): McCorduck (2004, pp. 426–441), Crevier (1993, pp. 161–162, 197–203, 211, 240), \nRussell & Norvig (2021, p. 23), NRC (1999, pp. 210–211), Newquist (1994, pp. 235–248) \n9. First AI Winter, Lighthill report, Mansfield Amendment: Crevier (1993, pp. 115–117), Russell \n\n& Norvig (2021, pp. 21–22), NRC (1999, pp. 212–213), Howe (1994), Newquist (1994, \npp. 189–201) \n\n10. Second AI Winter: Russell & Norvig (2021, p. 24), McCorduck (2004, pp. 430–435), Crevier \n\n(1993, pp. 209–210), NRC (1999, pp. 214–216), Newquist (1994, pp. 301–318) \n11. Deep learning revolution, AlexNet: Goldman (2022), Russell & Norvig (2021, p. 26), \n\nMcKinsey (2018) \n\n12. Toews (2023). \n13. Problem-solving, puzzle solving, game playing, and deduction: Russell & Norvig (2021, \n\nchpt. 3–5), Russell & Norvig (2021, chpt. 6) (constraint satisfaction), Poole, Mackworth & \nGoebel (1998, chpt. 2, 3, 7, 9), Luger & Stubblefield (2004, chpt. 3, 4, 6, 8), Nilsson (1998, \nchpt. 7–12) \n\n14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006).", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "models are prone to generating falsehoods called \"hallucinations\", although this can be reduced with \nRLHF and quality data. They are used in chatbots, which allow people to ask a question or request a task \nin simple text.[122][123] \n\nCurrent models and services include Gemini (formerly Bard), ChatGPT, Grok, Claude, Copilot, and \nLLaMA.[124] Multimodal GPT models can process different types of data (modalities) such as images, \nvideos, sound, and text.[125] \n\n**Hardware and software**\n\nIn the late 2010s, graphics processing units (GPUs) that were increasingly designed with AI-specific \nenhancements and used with specialized TensorFlow software had replaced previously used central \nprocessing unit (CPUs) as the dominant means for large-scale (commercial and academic) machine \nlearning models' training.[126] Specialized programming languages such as Prolog were used in early AI \nresearch,[127] but general-purpose programming languages like Python have become predominant.[128] \n\nThe transistor density in integrated circuits has been observed to roughly double every 18 months—a \ntrend known as Moore's law, named after the Intel co-founder Gordon Moore, who first identified it. \nImprovements in GPUs have been even faster.[129] \n\n**Applications**\n\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: \nsearch engines (such as Google Search), targeting online advertisements, recommendation systems \n(offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, \nFacebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and \nself-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial \nrecognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used \nby Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation \nofficer (CAO). \n\n**Health and medicine**\n\nThe application of AI in medicine and medical research has the potential to increase patient care and \nquality of life.[130] Through the lens of the Hippocratic Oath, medical professionals are ethically \ncompelled to use AI, if applications can more accurately diagnose and treat patients.[131][132] \n\nFor medical research, AI is an important tool for processing and integrating big data. This is particularly \nimportant for organoid and tissue engineering development which use microscopy imaging as a key \ntechnique in fabrication.[133] It has been suggested that AI can overcome discrepancies in funding \nallocated to different fields of research.[133] New AI tools can deepen the understanding of biomedically \nrelevant pathways. For example, AlphaFold 2 (2021) demonstrated the ability to approximate, in hours \nrather than months, the 3D structure of a protein.[134] In 2023, it was reported that AI-guided drug \ndiscovery helped find a class of antibiotics capable of killing two different types of drug-resistant \nbacteria.[135] In 2024, researchers used machine learning to accelerate the search for Parkinson's disease", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia3.pdf" + }, + { + "text": "138. Figueiredo, Mayara Costa; Ankrah, Elizabeth; Powell, Jacquelyn E.; Epstein, Daniel A.; \n\nChen, Yunan (12 January 2024). \"Powered by AI: Examining How AI Descriptions Influence \nPerceptions of Fertility Tracking Applications\" (https://dl.acm.org/doi/10.1145/3631414). \n*Proc. ACM Interact. Mob. Wearable Ubiquitous Technol*.**7**(4): 154:1–154:24. \ndoi:10.1145/3631414 (https://doi.org/10.1145%2F3631414).", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
g - machines - the - search - for - antificial - intelligence ), Destillations. Vol. 2, no. 2, pp. 14 – 21. Activied from the original ( https :// www. sciencehystory. org / distillations / magazinethhinking - machines - the - search - first - in
Robitzoki, Dan ( 5 : Eegraember 2012b ), “ Five experts share what scares them the most about Ai ” ( fibro.: Raurums consistical - iteliapence - experts feasiang ). Actived ( fittps ; Fields and hives or givelocal collaboration, contractiol
Rose, Stever ( 12 auly 2023 ). “ Al Utopia or dystopiat ”. The Guardian Weekly, pp. 42 – 43.
Russell, Stuart ( 2013 ), Human Compasible : Artificial Intellipence and the Problem of Control. United Studen : Vilong 1999 - 1 - 5 - 5 - 5295 - 5961 - 3 DUL1 L105354 - 532 [ Mps :// search. month. a. l. ongoits / 13894322 ]
Salmana, Mctaxe ( LD4 Aquest 233.1 “ Stepphere Heaving, EDr1Adult, and BEBCades Matral Attibual Interlappince ” ( Hapu / Asticular Trigus / Astractural GST / 2012 / 2002 / 2002 / 2002 / 2009 / 2009 / 2010 / 2008 / 2009 / 1008 / 800 / gets / 1000 / gen
Sample : lan ( 13 howembr 2117 ): Computer says networky making Asia ( accountable and transparent is crucial *) these class therapian conclusions / RTT / Tron / Efficiompate - up - no why raking - as loss be accountable and managem in countabi
Rothman. Devinis ( 7 Drotobes 7070 ): “ Englisho13 ( MEF, Funjlanations and the Mathernation Behind I ” [ Mipos. Shewix codemotion comfronagazinesia - millitries - englanable - eji ). Codemotion Anchieved ( Mitracs / levels and / orgivedo
Scaesellai, Brian ( ZXG ), “ Theory of mind for a humanoid robot ”. Autonomous Robots 12 ( 1 ) 1.13 – 24 – 24 doi : 12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.13.12.18.18.18.18.16.13.10.13.10.29.29.49.9, 9.9, 9.9, 9.9, 9.9, 9.1
Schmittudes, J, DDSST These Learning in Hearand Networks : Jo Cherviewa : Neurol Networks. KL in EN - 2.7, eY, BASA 7F6S9 ( Mgs : 0.49.0. 93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.06 - 0.06 -
Schmidhuber, Jirgen ( DDZ2 ). “ Arrostated History of Modern AI and Despo Learning ” ( Ithtacs // oeco lesion Is abia, chi - sienzen )). Archived ( Ithps : Ulweb archives organish / 2000712724449000 ( Ethnologies ) e. general ( Ethnologial or
Sexarker, John ( 13500 ), \" Mind, Brains and Programme \" ( Meta -),\"( Mata -) cogarettes, urganT,\" DDD20.1, ES12.52, S23.48, pfl ) ( PFP2F, ↑ Masional and Brain Sismonyl, 37.47.47.34.7, 34.17.48.15.127.19.151.127.1921.282.55100017,
Seeke, John 15090, Mind Janquage and society ( https :// attps :// archieve. grobeskel / chrondlanguaaenor / cl3Deter ); Netw Y009 ; Basks. GBV : F79 - 3 - 4955 = 452 ; 2, OCLC 22287 ( fttps ); Test ); Therefritation : clinics : CS35 ( fetally ); Ac
", + "page_start": 62, + "page_end": 62, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Strike, Hasmes : Service, Newert, November 222.7 “ Oejea Lyanging ”[ Mitty ]/ Awweressecthgate. e. netigudications? 20093795 ]. Kt - AGinsfoliche Welligenz. 28 ( 4 ) 257 - 363. dtsts 10133715333333333333541253582 ( 19pts / 0bs organ ) 30
Severelios. Alwarder. Michani ( 20.1 ). Comparisoning the enjoyert survey and citation impact juvernal relievising methods. Example from the feelied of Artholisal trelliagence. ( These asserver, is complexer ( 20.2, Asserted, Stude
Sliver, Danad, Huany, Aud, Muddision, Chronic 2, et al. ( 20.24 anary 213 ). Theyatening the game of Gys eith dengy neural networks and me tearsful ( 29ths / however ration confaticle / sechodatary DRS ). There induced ( 29 ). There industry a
Vasawani, Ashish, Noam Shazeer, Nkix Parmar et al. 74ttention is all you need.* Advances in neural information processing systems 30 ( 2017 ). Seminal paper on transformers.
Vinceri, 2ames, “ Horny Robot Baby Voice : James Vincert on Al chalbotic ”, London Peview of Boley, vis. 46, no. 3 - DDDober 2DDLIp, p. 22 – 22.74 chabotic programs are made possible by new technologies but rely on the timeletion human tendend
White Paper : On Antifical Helligenom – – E. Europeae approach to secolemon and trust [ https :// et a. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. p. d. this / shifted / etc. commission white oper - utilitial intellil
", + "page_start": 69, + "page_end": 69, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Newell, Allen; Simon, H. A. (1976). \"Computer Science as Empirical Inquiry: Symbols and \n\nSearch\" (https://doi.org/10.1145%2F360018.360022).*Communications of the ACM*.**19**(3): \n113–126. doi:10.1145/360018.360022 (https://doi.org/10.1145%2F360018.360022). \n\nNicas, Jack (7 February 2018). \"How YouTube Drives People to the Internet's Darkest Corners\" \n(https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1 \n518020478).*The Wall Street Journal*. ISSN 0099-9660 (https://search.worldcat.org/issn/009 \n9-9660). Archived (https://web.archive.org/web/20241005171230/https://www.wsj.com/articl \nes/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) from the \noriginal on 5 October 2024. Retrieved 16 June 2018. \n\nNilsson, Nils (1983). \"Artificial Intelligence Prepares for 2001\" (https://ai.stanford.edu/~nilsson/O \n\nnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF).*AI Magazine*.**1**(1). \nArchived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin \nePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August \n2020. Retrieved 22 August 2020. Presidential Address to the Association for the \nAdvancement of Artificial Intelligence. \n\nNRC (United States National Research Council) (1999). \"Developments in Artificial \n\nIntelligence\".*Funding a Revolution: Government Support for Computing Research*. National \nAcademy Press. \n\nOmohundro, Steve (2008).*The Nature of Self-Improving Artificial Intelligence*. presented and \n\ndistributed at the 2007 Singularity Summit, San Francisco, CA. \n\nOudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from \n\ninsect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD \nOudeyer10.pdf) (PDF).*IEEE Transactions on Autonomous Mental Development*.**2**(1): 2– \n16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057). \nS2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web. \narchive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) \n(PDF) from the original on 3 October 2018. Retrieved 4 June 2013. \n\nPennachin, C.; Goertzel, B. (2007). \"Contemporary Approaches to Artificial General \n\nIntelligence\".*Artificial General Intelligence*. Cognitive Technologies. Berlin, Heidelberg: \nSpringer. pp. 1–30. doi:10.1007/978-3-540-68677-4_1 (https://doi.org/10.1007%2F978-3-54 \n0-68677-4_1). ISBN 978-3-5402-3733-4. \n\nPinker, Steven (2007) [1994],*The Language Instinct*, Perennial Modern Classics, Harper, \n\nISBN 978-0-0613-3646-1 \n\nPoria, Soujanya; Cambria, Erik; Bajpai, Rajiv; Hussain, Amir (September 2017). \"A review of \n\naffective computing: From unimodal analysis to multimodal fusion\" (http://researchrepository. \nnapier.ac.uk/Output/1792429).*Information Fusion*.**37**: 98–125. \ndoi:10.1016/j.inffus.2017.02.003 (https://doi.org/10.1016%2Fj.inffus.2017.02.003). \nhdl:1893/25490 (https://hdl.handle.net/1893%2F25490). S2CID 205433041 (https://api.sem \nanticscholar.org/CorpusID:205433041). Archived (https://web.archive.org/web/20230323165 \n407/https://www.napier.ac.uk/research-and-innovation/research-search/outputs/a-review-of- \naffective-computing-from-unimodal-analysis-to-multimodal-fusion) from the original on 23 \nMarch 2023. Retrieved 27 April 2021. \n\nRawlinson, Kevin (29 January 2015). \"Microsoft's Bill Gates insists AI is a threat\" (https://www.b \nbc.co.uk/news/31047780).*BBC News*. Archived (https://web.archive.org/web/20150129183 \n607/http://www.bbc.co.uk/news/31047780) from the original on 29 January 2015. Retrieved \n30 January 2015. \n\nReisner, Alex (19 August 2023), \"Revealed: The Authors Whose Pirated Books are Powering", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Simon, H. A. [ 1565 ], The Shape of Automation for Men and Management, New York : Harper & Row
Simonite. They Did nation 2233.1, Yewo - Coughe Pate to Solve Arb5cal Intelligeneses? ( Mttps :// www. technologyenesescomf203 ∆ M / GST2.2, Estallow - go - glycales - blands - solve - softilitude - strifingence ). MTTechnology Rehexies /
Strokin, Croskin, CLE Manior 2003, Chola ( CET ) a, Creator ( Bya Subjeaver on A ) Helductnalors and A Democracycles ; “ Ifitps ; Newebreaccomisless ; com / sleepimis / craigamin / CGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGA - 4 - positivea
Smoller, Stephen W, Zhang, Hong, Varg, UBAJ, “ Content based video indexing and retrieval ”. ECEE Multifedie. I ( 2 ): 62 – 72.66 / 13.1209533111553 ( https :// dois. org / 20.120992F353.31.16555 ). S2COD 30053 ( https :// dpi. 34 ) psycholan
Stistromoral : New, CHSSLAs inductive inferience Mechine ( Hbp :// world odd comr - stylinding ) PDFS, Dastrosult Summer Research Conference on Additioal intelliperos. Actived ( Intracy ) well, active gard ( QDL ) DSASSLT, NR / Ntrity / he
Standard Linesty ( 2023 ). \" Anglical treligancy, tigest, fingor, \"[ 20 ]. Trugery [ 52.54 ] cand Growternance \" ( https :// asknows. danford. edu / ve - content / uplinado / 2023 / 3414... A / virubu - Regort ( 222 ).\" pulmol \" ( 159 )...) and \"[ 452
Tac, Jaritua ; Tan, Teniu ( Z005 ), Affective Computing and Intelligent Interaction. Affective Computing A Review Lecture Notes in Computer Science, Vid, STRI, Springer gt, BBL - 995, dex Lecture Notes in Computer Science, Vid, STRI, Spr
Taylot, Jooth, Herin, Airw, Airw, CD3221 *, �� Cultulhaherer of A Govelhy Heriton quits Goodge and warrs syver dangers of miniformation ” ( Hzo ; Nwescheguardiac contylecthrology / CED20ma / GED20mar / GShorther - birther - profilter of an
Thromposin, Cherelix ( 23.2 anaury 2014 ), “ What, Usina Will the Finibotic Takes ”[ Mesh ] however, from com / business / arc01ive / 2012 / 4 / 12 / 4 / 106 / yidts - mill - the rotar - take / 203239 ]. The Allantic Activest ( 70ths ), Health archner, H
Thro. ESRen ( 12935 ). Pitabotics : The Marriage of Computers and Machiness ( https :// archive, org / let algiotider_TFRDISGSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
Two was Rnk ( t ): Toestimmber 202 ): “ Transformers Revalaboration / et al. What Will Regidace Therm ” ( Yebpul ’ teletes context - statest / distensic / 2000 / disease / mind - antibiotics - restilated - antilated replace - there ). Forchivede
", + "page_start": 63, + "page_end": 63, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Vinge, Vernor (1993). \"The Coming Technological Singularity: How to Survive in the Post- \n\nHuman Era\" (https://web.archive.org/web/20070101133646/http://www-rohan.sdsu.edu/facul \nty/vinge/misc/singularity.html).*Vision 21: Interdisciplinary Science and Engineering in the*\n*Era of Cyberspace*: 11. Bibcode:1993vise.nasa...11V (https://ui.adsabs.harvard.edu/abs/199 \n3vise.nasa...11V). Archived from the original (http://www-rohan.sdsu.edu/faculty/vinge/misc/ \nsingularity.html) on 1 January 2007. Retrieved 14 November 2011. \n\nWaddell, Kaveh (2018). \"Chatbots Have Entered the Uncanny Valley\" (https://www.theatlantic.c \nom/technology/archive/2017/04/uncanny-valley-digital-assistants/523806).*The Atlantic*. \nArchived (https://web.archive.org/web/20180424202350/https://www.theatlantic.com/technol \nogy/archive/2017/04/uncanny-valley-digital-assistants/523806) from the original on 24 April \n2018. Retrieved 24 April 2018. \n\nWallach, Wendell (2010).*Moral Machines*. Oxford University Press. \nWason, P. C.; Shapiro, D. (1966). \"Reasoning\" (https://archive.org/details/newhorizonsinpsy000 \n\n0foss). In Foss, B. M. (ed.).*New horizons in psychology*. Harmondsworth: Penguin. \nArchived (https://web.archive.org/web/20200726131518/https://archive.org/details/newhoriz \nonsinpsy0000foss) from the original on 26 July 2020. Retrieved 18 November 2019. \nWeng, J.; McClelland; Pentland, A.; Sporns, O.; Stockman, I.; Sur, M.; Thelen, E. (2001). \n\n\"Autonomous mental development by robots and animals\" (http://www.cse.msu.edu/dl/Scien \ncePaper.pdf) (PDF).*Science*.**291**(5504): 599–600. doi:10.1126/science.291.5504.599 (http \ns://doi.org/10.1126%2Fscience.291.5504.599). PMID 11229402 (https://pubmed.ncbi.nlm.ni \nh.gov/11229402). S2CID 54131797 (https://api.semanticscholar.org/CorpusID:54131797). \nArchived (https://web.archive.org/web/20130904235242/http://www.cse.msu.edu/dl/Science \nPaper.pdf) (PDF) from the original on 4 September 2013. Retrieved 4 June 2013 – via \nmsu.edu. \n\n\"What is 'fuzzy logic'? Are there computers that are inherently fuzzy and do not apply the usual \n\nbinary logic?\" (https://www.scientificamerican.com/article/what-is-fuzzy-logic-are-t).*Scientific*\n*American*. 21 October 1999. Archived (https://web.archive.org/web/20180506035133/https:// \nwww.scientificamerican.com/article/what-is-fuzzy-logic-are-t) from the original on 6 May \n2018. Retrieved 5 May 2018. \n\nWilliams, Rhiannon (28 June 2023), \"Humans may be more likely to believe disinformation \n\ngenerated by AI\" (https://www.technologyreview.com/2023/06/28/1075683/humans-may-be- \nmore-likely-to-believe-disinformation-generated-by-ai/),*MIT Technology Review*, archived (h \nttps://web.archive.org/web/20240916014613/https://www.technologyreview.com/2023/06/28/ \n1075683/humans-may-be-more-likely-to-believe-disinformation-generated-by-ai/) from the \noriginal on 16 September 2024, retrieved 5 October 2024 \n\nWirtz, Bernd W.; Weyerer, Jan C.; Geyer, Carolin (24 July 2018). \"Artificial Intelligence and the \n\nPublic Sector – Applications and Challenges\" (https://zenodo.org/record/3569435). \n*International Journal of Public Administration*.**42**(7): 596–615. \ndoi:10.1080/01900692.2018.1498103 (https://doi.org/10.1080%2F01900692.2018.149810 \n3). ISSN 0190-0692 (https://search.worldcat.org/issn/0190-0692). S2CID 158829602 (http \ns://api.semanticscholar.org/CorpusID:158829602). Archived (https://web.archive.org/web/20 \n200818131415/https://zenodo.org/record/3569435) from the original on 18 August 2020. \nRetrieved 22 August 2020. \n\nWong, Matteo (19 May 2023), \"ChatGPT Is Already Obsolete\" (https://www.theatlantic.com/tech \n\nnology/archive/2023/05/ai-advancements-multimodal-models/674113/),*The Atlantic*, \narchived (https://web.archive.org/web/20240918022529/https://www.theatlantic.com/technol \nogy/archive/2023/05/ai-advancements-multimodal-models/674113/) from the original on 18 \nSeptember 2024, retrieved 5 October 2024", + "page_start": 65, + "page_end": 65, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", + "target_page": 1, + "target_passage": "Financial services", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**The top AI-powered tech trends in 2025**\n\n\n\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. \n\nFinancial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "FAccT ’21, March 3–10, 2021, Virtual Event, Canada \n\nAdvances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, \n2020. AAAI Press, 8968–8975. https://aaai.org/ojs/index.php/AAAI/article/ \nview/6428 \n\n[150] Zhilin Yang, Zihang Dai, Yiming Yang, Jaime Carbonell, Russ R Salakhutdinov, \nand Quoc V Le. 2019. Xlnet: Generalized autoregressive pretraining for language \nunderstanding. In Advances in neural information processing systems. 5753–5763. \n[151] Ze Yang, Can Xu, Wei Wu, and Zhoujun Li. 2019. Read, Attend and Comment: \nA Deep Architecture for Automatic News Comment Generation. In Proceed- \nings of the 2019 Conference on Empirical Methods in Natural Language Process- \ning and the 9th International Joint Conference on Natural Language Processing \n(EMNLP-IJCNLP). Association for Computational Linguistics, Hong Kong, China, \n5077–5089. https://doi.org/10.18653/v1/D19-1512 \n\n[152] Meg Young, Lassana Magassa, and Batya Friedman. 2019. Toward Inclusive \nTech Policy Design: A Method for Underrepresented Voices to Strengthen Tech \nPolicy Documents. Ethics and Information Technology (2019), 1–15. \n[153] Ofir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe Wasserblat. 2019. Q8BERT: \n\nQuantized 8Bit BERT. arXiv:1910.06188 [cs.CL] \n\n[154] Nico Zazworka, Rodrigo O. Spínola, Antonio Vetro’, Forrest Shull, and Carolyn \nSeaman. 2013. A Case Study on Effectively Identifying Technical Debt. In \nProceedings of the 17th International Conference on Evaluation and Assessment \nin Software Engineering (Porto de Galinhas, Brazil) (EASE ’13). Association for \nComputing Machinery, New York, NY, USA, 42–47. https://doi.org/10.1145/ \n2460999.2461005 \n\n[155] Rowan Zellers, Yonatan Bisk, Roy Schwartz, and Yejin Choi. 2018. SWAG: \nA Large-Scale Adversarial Dataset for Grounded Commonsense Inference. In \nProceedings of the 2018 Conference on Empirical Methods in Natural Language \nProcessing. Association for Computational Linguistics, Brussels, Belgium, 93–104. \nhttps://doi.org/10.18653/v1/D18-1009 \n\n[156] Haoran Zhang, Amy X Lu, Mohamed Abdalla, Matthew McDermott, and \nMarzyeh Ghassemi. 2020. Hurtful words: quantifying biases in clinical contex- \ntual word embeddings. In Proceedings of the ACM Conference on Health, Inference, \nand Learning. 110–120. \n\n[157] Jieyu Zhao, Tianlu Wang, Mark Yatskar, Ryan Cotterell, Vicente Ordonez, and \nKai-Wei Chang. 2019. Gender Bias in Contextualized Word Embeddings. In \nProceedings of the 2019 Conference of the North American Chapter of the Associ- \nation for Computational Linguistics: Human Language Technologies, Volume 1 \n(Long and Short Papers). Association for Computational Linguistics, Minneapolis, \nMinnesota, 629–634. https://doi.org/10.18653/v1/N19-1064 \n\n[158] Li Zhou, Jianfeng Gao, Di Li, and Heung-Yeung Shum. 2020. The Design and \nImplementation of XiaoIce, an Empathetic Social Chatbot. Computational Lin- \nguistics 46, 1 (March 2020), 53–93. https://doi.org/10.1162/coli_a_00368 \n\nACKNOWLEDGMENTS \nThis paper represents the work of seven authors, but some were \nrequired by their employer to remove their names. The remaining \nlisted authors are extremely grateful to our colleagues for the effort \nand wisdom they contributed to this paper. \n\nIn addition, in drafting and revising this paper, we benefited \nfrom thoughtful comments and discussion from many people: Alex \nHanna, Amandalynne Paullada, Ben Hutchinson, Ben Packer, Bren- \ndan O’Connor, Dan Jurafsky, Ehud Reiter, Emma Strubell, Emily \nDenton, Gina-Anne Levow, Iason Gabriel, Jack Clark, Kristen How- \nell, Lucy Vasserman, Maarten Sap, Mark Díaz, Miles Brundage, Nick \nDoiron, Rob Munro, Roel Dobbe, Samy Bengio, Suchin Gururangan, \nVinodkumar Prabhakaran, William Agnew, William Isaac, and Yejin \nChoi and our anonymous reviewers.", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Up to this point, most of AI's funding had gone to projects that used high-level symbols to represent \nmental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt \nthat this approach would be able to imitate all the processes of human cognition, especially perception, \nrobotics, learning and pattern recognition,[335] and began to look into \"sub-symbolic\" approaches.[336] \nRodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that \nmove and survive.[x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete \nand uncertain information by making reasonable guesses rather than precise logic.[86][341] But the most \nimportant development was the revival of \"connectionism\", including neural network research, by \nGeoffrey Hinton and others.[342] In 1990, Yann LeCun successfully showed that convolutional neural \nnetworks can recognize handwritten digits, the first of many successful applications of neural \nnetworks.[343] \n\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal \nmathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" \nfocus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, \neconomics and mathematics).[344] By 2000, solutions developed by AI researchers were being widely \nused, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as \nthe AI effect).[345] However, several academic researchers became concerned that AI was no longer \npursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they \nfounded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded \ninstitutions by the 2010s.[4] \n\nDeep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field.[11] \nFor many specific tasks, other methods were abandoned.[y] Deep learning's success was based on both \nhardware improvements (faster computers,[347] graphics processing units, cloud computing[348]) and \naccess to large amounts of data[349] (including curated datasets,[348] such as ImageNet). Deep learning's \nsuccess led to an enormous increase in interest and funding in AI.[z] The amount of machine learning \nresearch (measured by total publications) increased by 50% in the years 2015–2019.[306] \n\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine \nlearning conferences, publications vastly increased, funding became available, and many researchers re- \nfocussed their careers on these issues. The alignment problem became a serious field of academic \nstudy.[283] \n\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous \ninterest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program \ntaught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was \nreleased in 2020 by OpenAI and is capable of generating high-quality human-like text.[350] ChatGPT, \nlaunched on November 30, 2022, became the fastest-growing consumer software application in history, \ngaining over 100 million users in two months.[351] It marked what is widely regarded as AI's breakout \nyear, bringing it into the public consciousness.[352] These programs, and others, inspired an aggressive AI \nboom, where large companies began investing billions of dollars in AI research. According to AI Impacts, \nabout $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Finance costs.**Finance costs, net of amounts capitalised to exploration and development, increased by $0.9 million to \n$0.7 million for the year ended 31 December 2014 as compared to net interest income of $0.2 million in the prior year. The \nincrease primarily relates to an increase in amortisation of deferred financing fees and additional interest incurred on undrawn \nfunds. \n\n**Gain (loss) on derivative financial instruments**. The net gain (loss) on derivative financial instruments changed by $11.6 million \nto an $11.0 million gain for the year ended 31 December 2014 as compared to the prior year. The gain on commodity hedging \nconsisted of $9.7 million of unrealised gains on commodity derivative contracts and $1.3 of realised gains on commodity \nderivative contracts. \n\n\n \n \n \n \n [html]\n
Contract TypeCounterpartyBasisQuantity / moStrike PriceTerm
CollarWells FargoWTI2.000 BBL$ 75.00 /$ 98.651 Jan 15 – 31 Dec 15
CollarShell Trading USLLS3.000 BBL$ 85.00 /$ 101.051 Jan 15 – 31 Dec 15
CollarWells FargoWTI2.000 BBL$ 80.00 /$ 97.001 Jan 15 – 31 Dec 15
CollarWells FargoWTI1.000 BBL$ 80.00 /$ 94.941 Jan 15 – 31 Dec 15
SwapWells FargoLLS2.000 BBL$ 91.651 Jan 15 – 31 Dec 15
SwapShell Trading USLLS5.000 BBL$ 98.051 Jan 15 – 30 Jun 15
SwapShell Trading USLLS3.000 BBL$ 94.101 Jul 15 – 31 Dec 15
SwapWells FargoWTI2.000 BBL$ 95.081 Jan 15 – 31 Dec 15
SwapWells FargoLLS2.000 BBL$ 97.741 Jan 15 – 31 Dec 15
SwapShell Trading USLLS5.000 BBL$ 100.701 Jan 15 – 30 Jun 15
SwapShell Trading USLLS5.000 BBL$ 94.101 Jan 16 – 31 Dec 16
SwapShell Trading USHH20.000 MCF$ 4.141 Jan 15 – 31 Dec 15
\n\n**Income taxes.**The components of our provision for income taxes are as follows: \n\n**Year ended 31 December**\n\n**2014** **2013** **(In US$‘000s)**\n\nCurrent tax (expense)/benefit ..................................................................... (17) 21,398 \n\nDeferred tax benefit/(expense) ................................................................... 858 (26,965) \n\nTotal income tax benefit/(expense) ............................................................. 841 (5,567) \n\nCombined Federal and state effective tax rate (5.8)% 25.9% \n\nOur combined Federal and state effective tax rates differ from the Group’s statutory tax rate of 30% primarily due to US federal \nand state tax rates, non-deductible expenses and the recognition of previously unrecognised tax losses. See Note 7 in the Notes \nto the Consolidated Financial Statements of this report for further information regarding our income taxes.", + "page_start": 19, + "page_end": 19, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "[html]FIVE - YEAR SUMMARY OF CONSOLIDATED FINANCIAL RESULTSYears Ended December 31IFRSCanadian GAAP( In millions of dollars, except per share amounts, percentages and ratios )201320122011202009Income and Cash Flow :RevenueWireless$ 7.270$7.280$7.138$ 6.97$6.685Cable, 4753.3583.3093.1903.074RBS374351405452446Media, 7041.6201.6111.4611.407Corporate items and intercompany eliminations( 117 )( 123117 *177( 75 )112.706$12.486$2.346$ 11.99$1.537Adjusted operating profit 1Wireless$ 3.157$3.063$3.036$ 3.17$3.067Cable1.7181.6051.5491.4191.300R8S10689864035Median16119018013119Corporate items and intercompany eliminations( 149 )( 113_ ( 112 )__ ( 95 %U114 )__ $ _ 4.993Statement4.834$4.7394.668$ _4.407Net income from continuing operations$ 1.669$1.725$1.590$ 1.53$1.499Net income$ 1.669$1.693$1.5631.502$1.478Adjusted net income from continuing operations 1$ 1.769S1.781$1.736$ 1.70S1.569Pre - tax free cash flow 1$ _044$2.029$1.973S2.181$1.919Property, plant and equipment expenditures$ _240$2.142$2.127S1.821$1.841Earnings per share from continuing operations8asic$", + "page_start": 90, + "page_end": 90, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Yudkowsky, E (2008), \"Artificial Intelligence as a Positive and Negative Factor in Global Risk\" (h \nttp://intelligence.org/files/AIPosNegFactor.pdf) (PDF),*Global Catastrophic Risks*, Oxford \nUniversity Press, 2008, Bibcode:2008gcr..book..303Y (https://ui.adsabs.harvard.edu/abs/20 \n08gcr..book..303Y), archived (https://web.archive.org/web/20131019182403/http://intelligenc \ne.org/files/AIPosNegFactor.pdf) (PDF) from the original on 19 October 2013, retrieved \n24 September 2021 \n\n\n \n \n \n \n [html]\n
Autor, David H., “ Why Are There Still So Many Jobs? The History and Future of Workplace Automation ” ( 2015 ) 29 ( 3 ) Journal of Economic Perspectives 2.
Berlinak, Doxed DDDDDT. The Advert of the Algorithm ( https )/ active, orgalisabulatentorbabganth GRODerf ), Harcoutf Boxkx. SBN1FTH - 2 ( SSO - 22F2, B, CCC, C - REMSE6E ) [ https :// creatch. extrl3 calcifying / client / distribution / dil
Boyle, James, The Line : Al and the Future of Personhood [ https :// direct. mit. edu / books / book / bits 97The - LineAl - and - the - Future - of - Personhood ), MIT Press, 2024
Culkying Agrength, “ Houdy for Richobach ” How to Think about the Fusure of a \" Foreignight Affairs, visit BB, no 4 Cultural Aspacatic D23350, p. 255 : GB : Glycotinan of Computing, whites ( in what might be called “ Dyscrin Luxa ”) that “ Any yy a
Evans, Woody ( 2012 ). “ Posithuman Rights. Dimensions of Transhuman Worlds ” ( https :// dois. org / 10.52 ). SODRSSPRey TK_035.12.02.02.02.02.0372.18hmikaltant 10.00 ( 3 ). dis1315209 / ey.” YK, 2015.612.06872 ( https.// doi. org / 030
Fives, Methani ( 22 heatern 2013 ), 12 ), 12 ), participants inhibitor ( method ) treatment ( or 2016 ), participants ( included ), and and approaches ( includes ), and anythout and anythesis ( includes ), and anythout and anythout and anythop
Gartter, Jost, Jost 2012 ; \" Welpedia ' s Moment of Truit : Can the orilex encyclopedia help teach A. I. chabitato to get their factor, right — without destroying boil in the process *\" New York Trives. Algoamine [ 46.9, 9.9, 9.9, 9.9, 90 ]. Hist
", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The two most widely used textbooks in 2023 (see the Open Syllabus (https://explorer.opensyllabus.org/re \nsult/field?id=Computer+Science)): \n\nRussell, Stuart J.; Norvig, Peter (2021).*Artificial Intelligence: A Modern Approach*(4th ed.). \nHoboken: Pearson. ISBN 978-0-1346-1099-3. LCCN 20190474 (https://lccn.loc.gov/201904 \n74). \nRich, Elaine; Knight, Kevin; Nair, Shivashankar B (2010).*Artificial Intelligence*(3rd ed.). \nNew Delhi: Tata McGraw Hill India. ISBN 978-0-0700-8770-5. \n\nThe four most widely used AI textbooks in 2008: \n\nLuger, George; Stubblefield, William (2004).*Artificial Intelligence: Structures and Strategies for*\n*Complex Problem Solving*(https://archive.org/details/artificialintell0000luge) (5th ed.). \nBenjamin/Cummings. ISBN 978-0-8053-4780-7. Archived (https://web.archive.org/web/2020 \n0726220613/https://archive.org/details/artificialintell0000luge) from the original on 26 July \n2020. Retrieved 17 December 2019. \n\nNilsson, Nils (1998).*Artificial Intelligence: A New Synthesis*(https://archive.org/details/artificialin \ntell0000nils). Morgan Kaufmann. ISBN 978-1-5586-0467-4. Archived (https://web.archive.or \ng/web/20200726131654/https://archive.org/details/artificialintell0000nils) from the original on \n26 July 2020. Retrieved 18 November 2019. \n\nRussell, Stuart J.; Norvig, Peter (2003),*Artificial Intelligence: A Modern Approach*(http://aima.c \ns.berkeley.edu/) (2nd ed.), Upper Saddle River, New Jersey: Prentice Hall, ISBN 0-13- \n790395-2. \n\nPoole, David; Mackworth, Alan; Goebel, Randy (1998).*Computational Intelligence: A Logical*\n\n*Approach*(https://archive.org/details/computationalint00pool). New York: Oxford University \nPress. ISBN 978-0-1951-0270-3. Archived (https://web.archive.org/web/20200726131436/ht \ntps://archive.org/details/computationalint00pool) from the original on 26 July 2020. Retrieved \n22 August 2020. Later edition: Poole, David; Mackworth, Alan (2017).*Artificial Intelligence:*\n*Foundations of Computational Agents*(http://artint.info/index.html) (2nd ed.). Cambridge \nUniversity Press. ISBN 978-1-1071-9539-4. Archived (https://web.archive.org/web/2017120 \n7013855/http://artint.info/index.html) from the original on 7 December 2017. Retrieved \n6 December 2017. \n\nOther textbooks: \n\nErtel, Wolfgang (2017).*Introduction to Artificial Intelligence*(2nd ed.). Springer. ISBN 978-3- \n3195-8486-7. \nCiaramella, Alberto; Ciaramella, Marco (2024).*Introduction to Artificial Intelligence: from*\n*data analysis to generative AI*(1st ed.). Intellisemantic Editions. ISBN 978-8-8947-8760-3. \n\n**History of AI**\n\nCrevier, Daniel (1993).*AI: The Tumultuous Search for Artificial Intelligence*. New York, NY: \n\nBasicBooks. ISBN 0-465-02997-3. \n\nMcCorduck, Pamela (2004),*Machines Who Think*(2nd ed.), Natick, Massachusetts: A. K. \n\nPeters, ISBN 1-5688-1205-1 \n\nNewquist, H. P. (1994).*The Brain Makers: Genius, Ego, And Greed In The Quest For Machines*\n\n*That Think*. New York: Macmillan/SAMS. ISBN 978-0-6723-0412-5. \n\nHarmon, Paul; Sawyer, Brian (1990).*Creating Expert Systems for Business and Industry*. New \n\nYork: John Wiley & Sons. ISBN 0471614963.", + "page_start": 51, + "page_end": 51, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Capital loses in Canada that can be applied against future capital gains$ 43
$44Tax losses in foreign jurisdictions that expire between 2023
and 20331734
Deductible temporary differences in foreign jurisdictions3245
$ 92$ 123
\n\nthe reversal, and the reversal", + "page_start": 109, + "page_end": 109, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Item 7A. Quantitative and Qualitative Disclosures About Market Risk.**\nDollars in millions \n\n**INTEREST RATE RISK**\nWe are exposed to interest rate risk primarily from changes in short-term interest rates. As of January 31, 2015, we had cash and cash \nequivalents of $827, which generate interest income at variable rates, and gross credit card receivables of $2,284, which generate finance \ncharge income at a combination of fixed and variable rates. Interest rate fluctuations can affect our interest income, credit card revenues and \ninterest expense. See Note 3: Accounts Receivable in Item 8: Financial Statements and Supplementary Data for additional information. \n\nWe use sensitivity analyses to measure and assess our interest rate risk exposure. For purposes of presenting the potential earnings effect \nof a reasonably possible hypothetical change in interest rates from our reporting date, we utilized two sensitivity scenarios: (i) linear growth of \napproximately 225 basis points over the year and (ii) linear decline of approximately 15 basis points over the year, due to the fact that current \ninterest rates are near historically low levels. Other key parameters and assumptions in our sensitivity analyses include the average cash and \ncash equivalents balance, average credit card receivables balance and no new floating rate debt. The first hypothetical scenario would result \nin an approximate $15 increase in future earnings, while the second hypothetical scenario would not have a material effect on future \nearnings. \n\nFor our long-term fixed-rate debt of $3,131, our exposure to interest rate risk is limited to changes in the fair value of our debt. As our debt is \nprimarily fixed-rate, changes in interest rates do not impact our cash flows. However, changes in interest rates increase or decrease the fair \nvalue of our debt, depending on whether market rates are lower or higher than our fixed-rates. As of January 31, 2015, the fair value of our \nfixed-rate debt was $3,693. See Note 8: Debt and Credit Facilities and Note 9: Fair Value Measurements in Item 8: Financial Statements and \nSupplementary Data for additional information. \n\n**FOREIGN CURRENCY EXCHANGE RISK**\nThe majority of our revenues, expenses and capital expenditures are transacted in U.S. Dollars. Our U.S. operation periodically enters into \nmerchandise purchase orders denominated in British Pounds or Euros. From time to time, we may use forward contracts to hedge against \nfluctuations in foreign currency prices. As of January 31, 2015, our outstanding forward contracts did not have a material impact on our \nconsolidated financial statements. \n\nAs of January 31, 2015, we have opened one full-line store in Canada and have announced plans to open five additional full-line stores in \nCanada over the next few years. The functional currency of our Canadian operations is the Canadian Dollar. We translate assets and \nliabilities into U.S. Dollars using the exchange rate in effect at the balance sheet date, while we translate revenues and expenses using a \nweighted-average exchange rate for the period. We record these translation adjustments as a component of accumulated other \ncomprehensive loss on the Consolidated Balance Sheets in Item 8: Financial Statements and Supplementary Data. Our Canadian operations \nenter into merchandise purchase orders denominated in U.S. Dollars for approximately half of its inventory. As sales in Canada are \ndenominated in the Canadian Dollar, gross profit for our Canadian operations can be impacted by foreign currency fluctuations.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", + "target_page": 26, + "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Educational Impact**\nWe are also proud to help prepare tomorrow’s leaders today. In 2010 \nChesapeake supported universities, schools, academic chairs, scholarships \nand other educational programs with contributions totaling $5.4 million. \n\nChesapeake also makes contributions that help improve lives and \neconomies in cities where we operate: $25 million in 2010 alone. For ex- \nample, this past year we donated $200,000 to establish the Chesapeake \nEnvironmental and Recycling Center at Goodwill Industries of Central \nOklahoma. The center will provide an additional 80 jobs to disabled Okla- \nhomans, as well as help Goodwill recycle 10 million pounds a year, which \n\nInvesting in programs that promote technology and innovation is a \nkey to our country’s success. That’s why we gave $1.0 million to establish \nthe Chesapeake Energy dormitory for students at the Oklahoma School for \nScience and Mathematics (OSSM), a public, tuition-free, residential high \nschool located in Oklahoma City for juniors and seniors with exceptional \nabilities. The extremely competitive school is helping train the next gen- \neration of scientists and mathematicians. \n\n**Chesapeake’s $25 million**\n**of charitable giving in 2010**\n\n**15%**\n\n**7%**\n**54%**\n\nWe also established the Chesapeake Energy Presidential Scholars Pro- \ngram at the Oklahoma City University Meinders School of Business, making \na $5.0 million commitment to be distributed over the next five years. The \nChesapeake Scholars Program will provide up to $25,000 per year in tuition \n**24%**", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Doing the right thing \n\nAt Killam we are investing in our communities, as \nwell as our real estate. We believe that giving back \nto the community is an important part of being a \nresponsible corporate citizen. \n\n**Support**\n**the IWK and**\n**Win Free**\n**Rent for a**\n**Year!**\n\n**Supporting Killam Families with**\n**Scholarship program**\nKillam’s Scholarship Program awards three $3,000 \nscholarships to children or grandchildren of Killam \nemployees on an annual basis. After a competitive \napplication process in 2013, Bradley Price, Hayley \nGillis and Georgia Telman were selected for \ndemonstrating an outstanding combination of \nacademic excellence and community involvement. \n\nmeet ezekiel and his big sister. \nHe is currently receiving medical \ncare at the iWK. \n\nin support of children like ezekiel, \nwe are having a \n**Caring for Kids Lott ery**\nto raise funds for the iWK. \n\nEach $20 ti cket off ers you \na chance to \n**win free rent for a year!**\nPurchase ti ckets before November \n30. the draw date is monday, \nDecember 2, 2013. \n\nall current residents of \nKillam Properti es in Nova Scoti a \nare eligible to parti cipate. \n\n**Visit**\n**killamforkids.eventbrite.com**\n**or ask your Resident Manager.**\n\nAll proceeds will benefi t the \nIWK Health Centre Foundati on \nand pati ents like Ezekiel. \n\n\nphoto: wildfl owerphoto.ca \n\n**Caring for Kids**\nDuring 2013 Killam organized the Caring for Kids Lottery, a \nfundraiser in support of the IWK Health Centre in Halifax. The IWK \nHealth Centre provides quality medical care to women, children, \nyouth and families in the Maritime provinces. Killam tenants \nsupported the cause through the purchase of lottery tickets for the \nchance to win free rent for a year. All funds raised went directly to \nthe IWK Foundation. \n\n\n \n \n \n \n [html]\n
Red Cross
Killam has partnered with the Red Cross in many
of its core markets. The Red Cross is on hand to
help when emergencies and disasters impact
communities. Over the last six years, Killam has
provided the Red Cross with financial assistance to
fund their operations. In return, the Red Cross has
provided emergency training to Killam staff, helping
us react effectively to emergencies when required.
Supporting Higher Education in
Atlantic Canada
On an annual basis, Killam ’ s board of directors
join together to support a common charity or
organization. During 2013 the board members
together donated $ 100.000 to establish an
endowment at Mount Allison University in
Sackville, New Brunswick, providing an annual
entrance scholarship to the university. Previous
$ 100.000 board donations supported the Boys
and Girls Clubs of Prince Edward Island, the YMCA
of Greater Halifax / Dartmouth and Saint Mary ’ s
University in Halifax.
", + "page_start": 19, + "page_end": 19, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**14**| LETTER TO SHAREHOLDERS \n\n*Rig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a*\n*series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.*\n\nI am pleased to report that we have apparently finally convinced \nPresident Barack Obama and Congressional leadership to recognize that \nthe energy path America is on today is completely unsustainable. There \nappears to be growing recognition that it is spectacularly dangerous for \nAmerica to continue importing 9 million barrels of oil per day and exporting more than $1 billion per day in national wealth to oil exporting countries. \nAmerica’s undiminished appetite for foreign oil has created the larg- \nest wealth transfer in the history of the world. The political leadership \nin Washington, D.C., has not seemed overly concerned about this issue \nuntil recently. However, after President Obama’s recent speech calling \n\n(1) \n\n Reserve replacement is calculated by dividing net reserve additions from all sources by actual production for the corresponding period. We calculate drilling and net acquisition cost per mcfe by dividing total drilling \nand net proved property acquisition costs incurred during the year (excludes certain costs primarily related to net unproved property acquisitions, geological and geophysical costs and deferred taxes related to \ncorporate acquisitions) by total proved reserve additions excluding price-related revisions. \n A non-GAAP financial measure, as defined below. Please refer to the Investors section of our website at www.chk.com for reconciliations of non-GAAP financial measures to comparable financial measures calculated \nin accordance with generally accepted accounting principles. \n• Adjusted ebitda is net income (loss) before interest expense, income tax expense (benefit), and depreciation, depletion and amortization expense, as adjusted to remove the effects of certain items that manage- \n\n(2) \n\nment believes affect the comparability of operating results. \n\n• Operating cash flow is cash provided by operating activities before changes in assets and liabilities. \n• Adjusted earnings per fully diluted share is net income (loss) per share available to Chesapeake common stockholders, assuming dilution, as adjusted to remove the effects of certain items that management \nbelieves affect the comparability of operating results. \n(3) \n FORTUNE 100 Best Companies to Work For® listed in the magazine’s February 7, 2011 issue.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "in cash and drilling carries. This was CNOOC’s second investment with \nChesapeake and its second investment in the U.S. onshore E&P industry. \nWe are currently drilling with five rigs in this play and expect to acceler- \nate our drilling to 15 rigs by year-end 2013. We believe our leasehold \nposition could support the drilling of up to 7,600 additional net wells. \n\nthe company. We have acquired approximately 600,000 net leasehold \nacres prospective for these plays and have drilled 75 net wells to date. \nWe are currently using eight rigs and believe our leasehold could sup- \nport the drilling of up to an additional 3,700 net wells. \n\nThe Mississippian fractured carbonate is primarily an oil play and is \nlocated on the Anadarko Basin shelf of northern Oklahoma and southern \nKansas. We have acquired approximately 900,000 net leasehold acres \nprospective for this play and have drilled 40 net wells to date. We are \ncurrently using four rigs and believe our leasehold could support the \ndrilling of up to an additional 6,000 net wells. This is an area where we \nanticipate bringing in a joint venture partner later in 2011 or in early 2012. \n\nCleveland, Tonkawa and Mississippian Plays — These three liquids-rich \nplays of the Anadarko Basin should become significant contributors to \nour growth in the years ahead. The Cleveland and Tonkawa plays are \ntight sandstones located in western Oklahoma and the eastern Texas \nPanhandle, and they provide returns that are some of the very best in \n\nBone Spring, Avalon, Wolfcamp and Wolfberry Plays — These four \nliquids-rich plays of the Permian Basin should also become significant \ncontributors to our growth in the years ahead. To date, we have acquired \napproximately 560,000 net leasehold acres that we believe are prospec- \ntive for these plays and have drilled 155 net wells. We are currently using \neight rigs and believe our leasehold could support the drilling of up to \nan additional 4,400 net wells. \n\n**Fracking Operations Transparency**\n\nUtica Shale — Chesapeake has high hopes for this emerging shale play \nin eastern Ohio, especially because it would become the fourth large \nunconventional play (along with the Haynesville and Bossier shales \nand the Mississippian carbonate) that Chesapeake has discovered. In \naddition, we believe the play will have three distinct components (oil,", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "***Apartment Property Expenses***\n\nSame store apartment property expenses increased 5.5% for the year ended December 31, 2013, due primarily to increased utility and fuel \nexpenses as a result of high natural gas prices in Atlantic Canada, and higher electricity costs. \n\n**Utility and Fuel Expense ‑ Same Store**\nFor the years ended December 31, \n\n\n \n \n \n \n [html]\n
20132012% Change
Natural gas$ 4.565$ 2.72967.3 %
Oil1.5232.095( 27.3 )%
Electricity5.1974.67111.3 %
Water3.5823.4743.1 %
Other3033( 9.1 )%
Total utility and fuel expenses$ 14.897$ 13.00214.6 %
\n\nKillam’s apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%). \n\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam’s exposure to the majority of the 4,500 units heated with \nelectricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations \nin natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its \nproperties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural \ngas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of \nnatural gas and oil in recent years. \n\nAs noted in the table above, Killam’s utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable \nto higher natural gas, electricity costs and water costs. \n\nKillam’s natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning \nnatural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter \nand year‑to‑date reflects this reduction in oil exposure. \n\nAs the following chart highlights, the per gigajoule (Gj) commodity cost for natural gas in New Brunswick and Nova Scotia was much higher \nthan NYMEX in 2013 and less correlated to NYMEX than in previous years. (NYMEX is the New York Mercantile Exchange, a commodity futures \nexchange. Henry Hub, a gas distribution hub in Louisiana is the pricing point for natural gas futures contracts traded on NYMEX). The cost of \nnatural gas in Atlantic Canada and New England experienced a spike from December 2012 until late spring 2013 and a second spike in December \n2013, compared to other areas of Canada. Those spikes were both due to increased demand from utilities in Northeast New England and a \nshortage of gas pipeline capacity in Northeastern New England and Atlantic Canada. A temporary decline in gas supply off the coast of Nova \nScotia further contributed to the high pricing in the first part of the year. \n\n**Historic Natural Gas Pricing ($ per Gj)**\n**Henry Hub Vs. Heritage Gas**\n\n$18 \nHenry Hub new Brunswick Gas \n$16 \n $15.49 \n$14 \n\n$12 \n\n $9.97 \n$10 \n\n$8 \n\n$6 \n $4.40 \n$4 \n\n$2 \n\n$0 \n\na pr 2 0 1 3 D ec 2 0 1 2 D ec 2 0 1 3 o ct 2 0 1 3 F e b 2 0 1 3 a u g 2 0 1 2 a u g 2 0 1 3 \nJu n 2 0 1 3", + "page_start": 37, + "page_end": 37, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**CC Licenses & Training**$763,196 \n**Programs**$2,248,091 \n**Events**$395,600 \n**Operations**$1,654,225 \n\n\n \n \n \n \n [html]\n
Foundations $ 4.402.563
Major Donors $ 103.215
Small Dollar Donors $ 144.217
Program Income S169.980
Consulting S173.939
In - Kind $ 30.358
Other S38.792
\n\n**Total:**$5,061,112", + "page_start": 9, + "page_end": 9, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**6**| LETTER TO SHAREHOLDERS \n\nvs. an asset gatherer — namely, lower debt and higher returns on capi- \ntal. The market has received this plan with favor to date as our stock \nprice is already up 30% in the first quarter of 2011. In addition, having \nrecently closed the sale of our Fayetteville Shale assets to BHP Billiton \nand recently initiated tender offers for repayment of at least $2.0 billion \nof our long-term debt, we are already close to accomplishing the 25% \nlong-term debt reduction portion of our 25/25 Plan. Now we will focus \non delivering the other part of the equation, 25% growth in production \nby year-end 2012. \n\nfactories can run in harvest mode for decades to come, which hopefully \ncan lead to a $100 stock price by year-end 2015. Again, this would be a \nvery considerable achievement, but your management team enjoys big \nchallenges and we look forward to discussing it further with you in the \nquarters ahead. \n\n**Great Assets = A Great Future**\nThe very significant upward trajectory of value creation that Chesapeake \nis on today is primarily driven by the quality of our assets, which feature \ndominant positions in 16 of the 20 most important major unconvention- \nal natural gas and liquids plays in the U.S. — the Barnett, Haynesville, \nBossier, Marcellus, Eagle Ford, Pearsall, Niobrara and Utica shales \nand the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, \nAvalon, Wolfcamp and Wolfberry tight sands and fractured carbonates. \nHaving only missed the Bakken Shale play in the Williston Basin, having \npassed on the Cana Shale play in Oklahoma and having sold out of \nthe Woodford and Fayetteville shale plays in Oklahoma and Arkansas \n(for overall value creation of $5.4 billion), Chesapeake’s unrivaled posi- \ntion in the 16 other major U.S. unconventional plays is remarkable and \nunprecedented and should form the foundation of further substantial \nvalue creation for Chesapeake’s shareholders for decades to come. \n\nBeyond the next two years, there will be many other benefits of the \nthree-way transition we began in 2010. In fact, we are increasingly con- \nfident that we can double our cash flow and net income by year-end \n2015. By accomplishing these goals and also having our historic trading \nmultiples expand a bit, we are hopeful that we can achieve a $100 stock \nprice by year-end 2015, perhaps creating the need for a “100/15” plan in \nthe process! Clearly it would be an ambitious goal, and to achieve it we \nwill need the world’s economy to continue growing, China and other \nemerging economies to continue their rapidly growing thirst for oil and \nnatural gas, our new plays to meet expectations, oil prices to remain \nstrong and natural gas prices not to weaken from where they are today. \nHowever, Chesapeake’s growth from here on will be very mechanical \nwith our “factories” (meaning both our individual wells and our large \nplays) needing only four inputs for success: land, science, people and \ncapital. We now have gathered enough of these four inputs so that our \n\nThe gathering of these assets has been hard work for our employ- \nees and management team, and during 2010 it stretched our balance \nsheet and tested the patience of some of our shareholders. What is \nclear now, however, is that we have created a tremen- \ndous storehouse of value and an abundance of oppor- \ntunities for bountiful harvests for years to come for our \nshareholders.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**12**| LETTER TO SHAREHOLDERS \n\nwet natural gas and dry natural gas), similar to the components of the \nEagle Ford Shale. We have made a large commitment to this play and \nhave acquired approximately 1.2 million net leasehold acres and expect \nto increase this total to as much as 1.5 million net leasehold acres in the \ncoming months. We are currently using three rigs to evaluate the play \nand believe our leasehold could support the drilling of up to 12,000 net \nwells. This is an area where we anticipate bringing in a joint venture \npartner late in 2011 or early in 2012. \n\n\n \n \n \n \n [html]\n
0.0000TableTableTableP ‐ CTable1.100Tabled1.TableTablePatientsTable
\n\n**Our People**\nGreat assets cannot exist without great people, so we take great pride \nin hiring, training, motivating, rewarding and retaining what we regard \n\nIn addition, we were honored in December 2010 at the 12th Annual \nPlatts Global Energy Awards as finalists for CEO of the Year, Community \n\nFrom our beginning 22 years ago with 10 \n\nemployees in Oklahoma City to employing \n\nmore than 10,000 people across 15 states \n\ntoday, Chesapeake has always focused on \n\nbuilding first-class human resources within \n\na distinctive corporate culture. \n\n\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an \n\n**Recent Events and a Better Way Forward**\nYou may be aware that I have been outspoken in attempting to persuade \nour country’s political leadership to recognize that the discovery of vast \nresources of unconventional natural gas and oil in the U.S. is a complete \ngame changer for our country from an economic, national security and \nenvironmental perspective. After two years of my best efforts and the \nefforts of many others in the industry, most notably T. Boone Pickens,", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Note 4. Plant in Service**\n\nPlant in service consists of the following at December 31: \n\nEstimated \nUseful Lives \n\nLand \nBuildings and structures \nCable and wire \nEquipment and software 15 – 40 years \n15 – 50 years \n3 – 16.6 years \n\n 2002 \n*(in thousands)*\n792 \n28,949 \n49,495 \n104,833 \n$184,069 \n\n2001 **2003**\n\n$ $ \n\n775 \n20,375 \n45,188 \n88,007 \n$ \n$ 154,345 \n\n**$**\n\n**802**\n**30,956**\n**51,041**\n**114,632**\n**$197,431**\n\n$ \n\n**Note 5. Long-Term Debt and Revolving Lines of Credit**\n\nTotal debt consists of the following at December 31: \n\nWeighted \nAverage \nInterest Rate 2002 2001 \n\n*(in thousands)*\n$ 10,645 \n$ \n159 \n41,039 \n200 \n$ 52,043 \n4,482 \n47,561 \n\nRural Telephone Bank (RTB) \nRural Utilities Service (RUS) \nCoBank (term loan) \nRUS Development Loan \nFixed \nFixed \nFixed \n6.02% \n5.00% \n7.57% \nInterest free \n\n$ 11,428 \n224 \n44,584 \n200 \n$ 56,436 \n4,387 \n$ 52,049 \n\n**$**\n**$**\n\n**5,599**\n**149**\n**37,398**\n**200**\n**$ 43,346**\n**4,230**\n**$ 39,116**\n\nCurrent maturities \nTotal long-term debt $ $ \n\nCoBank 1-year revolver \nSunTrust Bank revolver Variable \nVariable 2.79% - 5.03% \n2.05% - 2.53% **-**\n**-**\n\n$ \n$ 3,200 \n303 $ 6,200 \n- \n$ $ \n$ **$**\n**$** **-**\n**-**\n\nThe RTB loans are payable $67 thousand monthly including interest. RUS loans are payable $4 thousand quarterly, \nincluding interest. The RUS and RTB loan facilities have maturities through 2019. The CoBank term facility requires \nmonthly payments of $550 thousand, including interest. The final maturity of the CoBank facility is 2013. \n\nThe CoBank revolver was a $20.0 million facility, which the Company cancelled in May 2003 due to the receipt of the \ncash proceeds from the sale of the Virginia 10 RSA partnership interest. \n\nThe $2.5 million SunTrust Banks revolver was cancelled in May 2003. It was replaced in August 2003 with a \nSunTrust Bank Revolver facility of $0.5 million, which the Company uses to fund short-term liquidity variations due to \nthe timing of customer receipts and vendor payments for services. This facility matures May 31, 2004, and is priced at \nthe 30-day LIBOR rate plus 1.25%. The Company has not borrowed on this facility. \n\nSubstantially all of the Company’s assets serve as collateral for the long-term debt. The Company's outstanding long- \nterm CoBank debt is $37.4 million, all of which is at fixed rates ranging from approximately 6% to 8%. The stated rate \nexcludes patronage credits that are received from CoBank. These patronage credits are a distribution of CoBank’s \nprofits, as it is a cooperative and is required to distribute its profits to its members. During the first quarter of 2003, the \nCompany received patronage credits of approximately 60 basis points on its outstanding CoBank debt balance. The \nCompany accrued a similar amount in the current year, in anticipation of the early 2004 distribution of the credits by \nCoBank. Repayment of the CoBank long-term debt facilities requires monthly payments on the debt through \nSeptember 2013. The Company is required to meet financial covenants measured at the end of each quarter, based on a \ntrailing 12-month basis and are calculated on continuing operations. At December 31, 2003, the covenant calculations \nwere as follows. The ratio of total debt to operating cash flow, which must be 3.5 or lower, was 1.2. The equity to \ntotal assets ratio, which must be 35% or higher, was 57.3%. The ratio of operating cash flow to scheduled debt service, \nwhich must exceed 2.0, was 4.29. The Company was in compliance with all other covenants related to its debt \nagreements at December 31, 2003.", + "page_start": 27, + "page_end": 27, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "*Putting food on the table — Employees volunteer at the Regional Food Bank*\n*of Oklahoma as part of Operation Blue.*\n\nsponsorship of the annual Day of Caring at the Ganus Center of Harding \nUniversity in White County, Arkansas. During the event, approximately \n1,200 uninsured or underinsured residents received a day of free medical, \ndental and eye screenings. \n\nTo help cultivate an appreciation for the great outdoors, in 2010 \nChesapeake provided $25,000 to REAL School Gardens, a Fort Worth- \nbased organization that establishes gardens at approximately 70 lower \nincome elementary schools in North Texas. At I.M. Terrell Elementary \nSchool, students, parents, teachers and volunteers from Chesapeake and \nother groups worked together to prepare vegetable gardens and flower \nbeds. In addition to teamwork skills and gardening, students learned \nabout nutrition and took home food from the garden’s bounty. \n\n**Community Impact**\nChesapeake employees have been enriching their hometowns as volun- \nteers for many years. We formalized those efforts in 2009 by establishing \nan official employee volunteer program, the H.E.L.P. (Helping Energize \nLocal Progress) Initiative, wherein employees are invited to volunteer \neach month for a variety of organizations from food pantries to animal \nshelters. Through that program, employees donated more than 26,000 \nhours to their communities in 2009. \n\nWe supported servicemen and servicewomen by partnering with the \nShreveport Chapter of Operation Support Our Troops, Inc. Our contribution \nhelped offset the postage to send more than 100 care packages to troops \noverseas. The shipment was the largest in the organization’s history and \nincluded Christmas cards, games and nonperishable food items. \n\nIn the summer of 2010, Chesapeake took the H.E.L.P. Initiative to a \nhigher level through the launch of Operation Blue. From Memorial Day \nthrough Labor Day, each employee was given four hours of company time \nto complete the volunteer project of their choice. Our employees eagerly \naccepted the challenge, and in three months more than 4,900 employ- \nees donated 30,900 hours of service to 519 organizations in more than \n96 communities across the country. Operation Blue is now an annual By investing in the communities where we operate and the people \nwhose lives we touch, we ensure a stronger today and a more hope- \nful tomorrow.", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", + "target_page": 6, + "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n\n\nSpecific Examples of CSR Activities \n\n**Together with Our Employees**\n\n**We are developing human resources that can take on global roles,**\n**and we are creating globalized working environments**\n\nprocess of “in-house internationalization.” \nprocess of “in-house internationalization.” \n\n**Preparing human resources**\n**to take on global roles**\n\n**Creating support tools**\n**for developing the role of**\n**female employees**\n\nUnder our “global course” program, newly \nUnder our “global course” program, newly \n\nhired sogoshoku \nhired (management-track) staff \nsogoshoku (management-track) staff \n\nare sent overseas after basic training. We \nare sent overseas after basic training. We \n\nFaced with changing markets and rising \nFaced with changing markets and rising have also expanded human resource \nhave also expanded human resource \n**“My Story”**\ncosts, many Japanese companies are \ncosts, many Japanese companies are training programs in English and Chinese \ntraining programs in English and Chinese \n\nmoving their operations overseas. Many \nmoving their operations overseas. Many and at overseas units. \nand at overseas units. \n\nlarge companies already have gone global \nlarge companies already have gone global Improvement of language skills in particular \nImprovement of language skills in particular \n\nin terms of production and marketing bases, \nin terms of production and marketing bases, is s ome t hing t ha t r equir e s ongoing \nis s ome t hing t hat requir es ongoing \n\nbalance between work and care needs. \nbalance between work and care needs. \n\n**Better support for carers:**\n**Workplace measures to**\n**deal with the rising old-age**\n**dependency ratio**\n\nThe improvements have three aspects: \nThe improvements have three aspects: \n\n(1) Care-leave time has been extended to \n(1) Care-leave time has been extended to \n\none year; (2) the time frame during which \none year; (2) the time frame during which \n\nstaggered and shortened working hours \nstaggered and shortened working hours \n\nfor care-giving are allowed has been \nfor care-giving are allowed has been \n\nIn November 2010, the bank expanded its \nIn November 2010, the bank expanded its extended to three years; and (3) greater \nextended to three years; and (3) greater \n\nemployee carer support program. \nemployee carer support program. flexibility has been introduced in reduction \nflexibility has been introduced in reduction \n\nEven now, much remains to be done to \nEven now, much remains to be done to of working hours for care purposes. \nof working hours for care purposes. \n\ndevelop public suppor t mechanisms, \ndevelop public suppor t mechanisms, \n\nat overseas units and for regular employees \nat overseas units and for regular employees \n\nin Japan. All of these courses are in English \nin Japan. All of these courses are in English \n\nand feature discussions and presentations \nand feature discussions and presentations \n\non resolution of issues faced by global \non resolution of issues faced by global \n\ncompanies. Through such lively exchanges, \ncompanies. Through such lively exchanges, \n\nthe aim is to develop the ability to deepen \nthe aim is to develop the ability to deepen \n\ncross-cultural communication and cultivate \ncross-cultural communication and cultivate \n\na global outlook and mentality. \na global outlook and mentality. \n\nAt the bank, we will continue measures to \nAt the bank, we will continue measures to \n\npromote globalization going forward, and \npromote globalization going forward, and \n\ncreate systems that can provide higher \ncreate systems that can provide higher \n\nquality support to our customers. \nquality support to our customers. \n\nWe have also established the SMBC Care \nWe have also established the SMBC Care \n\nConsultation Desk as a convenient general \nConsultation Desk as a convenient general \n\nservice for employees and their family \nservice for employees and their family", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. \n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service \n\n**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. \n\n\n\n**Reference guidelines**\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3) \n\n*Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international \norganization (GRI) in 1997 to encourage its adoption worldwide. \n\n**CSR disclosure**\n**through**\n**specific examples**\n\n**CSR report 2011 (digest version)**\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, \nCovers CSR baselines and CSR activities at SMFG and its Group companies, \ncentered on specific examples \ncentered on specific examples \n\n**CSR report 2011**\n**(digest version with examples of activities and**\n**statistical performance, online PDF file)**", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) \n\n\n\nBased on this approach, SMFG goes \nBased on this approach, SMFG goes \n\n**We aim to further**\n**strengthen communication**\n**with our shareholders**\n**and investors**\n\nbeyond legal requirements in enriching its \nbeyond legal requirements in enriching its \n\ndisclosure of information on management \ndisclosure of information on management \n\npolicy and operational strategy. These \npolicy and operational strategy. These \n\ninitiatives have won the support of many \ninitiatives have won the support of many \n\nmarket participants. We were selected as \nmarket participants. We were selected as \n\nSMFG is committed to ensuring financial \nSMFG is committed to ensuring financial a winner of the Awards for Excellence in \na winner of the Awards for Excellence in \n\nsoundness through appropriate policy-making \nsoundness through appropriate policy-making Corporate Disclosure for fiscal 2011 by The \nCorporate Disclosure for fiscal 2011 by The \n\nand business operations. At the same time, \nand business operations. At the same time, Securities Analysts Association of Japan. \nSecurities Analysts Association of Japan. \n\nwe disclose corporate information in a \nwe disclose corporate information in a \n\ntimely and precise way to shareholders and \ntimely and precise way to shareholders and \n\ncompanies’ corporate social responsibility \ncompanies’ corporate social responsibility \n\n**Together with our investors:**\n**Creating a platform for**\n**social contribution through**\n**the financial markets**\n\nactivities, and uses the information it gathers \nactivities, and uses the information it gathers \n\nto create a basic file on companies managing \nto create a basic file on companies managing \n\nsocially responsible investment funds*3*3. \nsocially responsible investment fund \n\n**SMFG has listed**\n**its shares on SRI indexes**\n\nthrough its activities in financial markets. \nthrough its activities in financial markets. \n\nFor example, SMBC Friend Securities markets \nFor example, SMBC Friend Securities markets SRI indexes are for socially responsible \nSRI indexes are for socially responsible \n\n while \n“Environmental Sustainability Bond”*1*1 while \n“Environmental Sustainability Bond” investments in which major investment \ninvestments in which major investment \n\nSMBC Nikko Securities markets “WB Green \nSMBC Nikko Securities markets “WB Green decisions are based on environmental and \ndecisions are based on environmental and \n\n. These are bonds \nBonds (Green Bonds)”*2*2. These are bonds \nBonds (Green Bonds)” social factors as well as the target company’s s \nsocial factors as well as the target company \n\n\n\n\n\nmarkets. We believe full disclosure not only \nmarkets. We believe full disclosure not only \n\nhelps foster a more correct understanding \nhelps foster a more correct understanding \n\nand evaluation of the Group, but also \nand evaluation of the Group, but also \n\ncontributes to the development of sounder \ncontributes to the development of sounder", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) \n\n\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n**contribute to the sustainable development of society as a whole.**\n\n\n\n\n\n\n\n\n\nA further measure is installation of handheld \nA further measure is installation of handheld \n\n**Making banking**\n**a more pleasant experience**\n**for all customers**\n\nhearing support devices at all branches \nhearing support devices at all branches \n\n(except housing loan promotion offices), to \n(except housing loan promotion offices), to \n\nallay the concerns of hearing-impaired \nallay the concerns of hearing-impaired \n\ncustomers who find it difficult to converse \ncustomers who find it difficult to converse \n\nWith the old-age dependency ratio soaring, \nWith the old-age dependency ratio soaring, and follow spoken instructions. By using the \nand follow spoken instructions. By using the \n\nthe SMFG Group aims to provide friendly, \nthe SMFG Group aims to provide friendly, devices as communication tools, bank \ndevices as communication tools, bank \n\neasy-to-use banking services for all its \neasy-to-use banking services for all its employees can respect customer privacy \nemployees can respect customer privacy \n\nand do not have to talk loudly. \nand do not have to talk loudly. \n\ncustomers. \ncustomers. \nSome Group companies are likewise making \nSome Group companies are likewise making Further measures include posting of “green \nFurther measures include posting of “green \n\ntheir facilities barrier-free at bank branches \ntheir facilities barrier-free at bank branches \n\n\n\nThe SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on \n\near” logos at branches to reassure customers \near” logos at branches to reassure customers \n\nBut in recent years, consumers have come to \nBut in recent years, consumers have come to that the bank has facilities for conversing \nthat the bank has facilities for conversing \n\n**The financial sector’s role in**\n**improving the nation’s diet and**\n**in strengthening the agricultural**\n**and fisheries sectors**\n\nplace more priority on factors other than \nplace more priority on factors other than writing. All branches are being equipped \nin in writing. All branches are being equipped \n\nvolume and price, such as food safety and \nvolume and price, such as food safety and with white boards and special message \nwith white boards and special message", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "As one of Japa \ns leading financial services groups, \nAs one of Japan’s leading financial services groups, \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nthe SMFG Group is taking the lead in aggressively addressing the four priority issues \nwe have identified as significantly impacting the nation. \nwe have identified as significantly impacting the nation. \n**Priority Issues for Us**\n\n\n\n**Ensuring peace of mind for the future**\n\n**Shrinking and aging population**\n\n\n\n**Measures for Japan’s regeneration**\n\n**Reconstruction**\n**after the earthquake**\n**and tsunami**\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \n\nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \n\nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound \nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound The March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \nThe March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \n\nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. \nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. generation capacity and severed manufacturing supply chains across the nation. This was in addition \ngeneration capacity and severed manufacturing supply chains across the nation. This was in addition \n\nto the severe damage sustained by agriculture and fisheries in the Northeast. \nto the severe damage sustained by agriculture and fisheries in the Northeast. *Estimates by the Statistics Bureau, Ministry of Internal Affairs and Communications (October 1, 2011) \n\nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \n\n**Further measures needed**\na leading financial services group, we are committing our full range of resources to dealing with the \na leading financial services group, we are committing our full range of resources to dealing with the \n\nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \n\nincluding enterprises, local governments and non-profit organizations. \nincluding enterprises, local governments and non-profit organizations. \n\n\n**Further measures needed**\n\n\n\nSupport businesses involved in health, medical and \nSupport businesses involved in health, medical and ● \n\nnursing care \nnursing care \n\nExpand range of financial products and services for the \nExpand range of financial products and services for the ● \n\nelderly (planning for asset management for old age) \nelderly (planning for asset management for old age) \n\nFoster a better work-life balance \nFoster a better work-life balance ● \n\n\n\nWide-ranging financial support for the reconstruction of infrastructure \nWide-ranging financial support for the reconstruction of infrastructure ● \n\nOngoing disaster recovery activities by employee volunteers \nOngoing disaster recovery activities by employee volunteers ● \n\nComprehensive support for industrial recovery in partnership with local governments and \nComprehensive support for industrial recovery in partnership with local governments and ● \n\nfinancial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "housing for the elderly, expected to be a \nhousing for the elderly, expected to be a \n\nfuture growth area. \nfuture growth area. \n\nW hile c o n t inuing t o t a ilo r bu sine s s \nW hile c o n t inuin g t o t a ilo r b u s in e s s \n\nactivities to the needs of the community at \nactivities to the needs of the community at \n\nlarge and ensuring a friendly banking \nlarge and ensuring a friendly banking \n\nenvironment for our customers, the SMFG \nenvironment for our customers, the SMFG \n\nGroup also plans to support the creation of \nGroup also plans to support the creation of \n\n\n\n\n\n**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC \n\nThe Minato Bank has created a position \nThe Minato Bank has created a position \n\ntitled “Service Care Manager” at each of \ntitled “Service Care Manager” at each of \n\nits branches, filled by at least one branch \nits branches, filled by at least one branch \n\nmanagerial staffer, as part of measures to \nmanagerial staffer, as part of measures to \n\nmake branch visits more pleasant for \nmake branch visits more pleasant for \n\ncustomers, following earlier nuts-and-bolts \ncustomers, following earlier nuts-and-bolts \n\nimprovements. \nimprovements. \n\nService Care Managers are dedicated to \nService Care Managers are dedicated to \n\nimproving support and services for the \nimproving support and services for the \n\ncustomer at each branch. Their training \ncustomer at each branch. Their training \n\nincludes simulations of the problems faced \nincludes simulations of the problems faced \n\nby persons with disabilities, awareness \nby persons with disabilities, awareness \n\nraising and support methods for the elderly \nraising and support methods for the elderly \n\nand persons with disabilities. \nand persons with disabilities.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "companies would do better and \ncompanies would do better and business in the Tohoku region, including \nbusiness in the Tohoku region, including \n\nthe whole country would benefit. \nthe whole country would benefit. business matching with parties outside \nbusiness matching with parties outside \n\ns words, \nReturning to Mr. Ando’s words, \nReturning to Mr. Ando the region. In addition, we have a range of \nthe region. In addition, we have a range of \n\na n d h i s c o m m e n t s a b o u t \na n d h i s c o m m e n t s a b o u t support activities in partnership with the Miyagi \nsupport activities in partnership with the Miyagi \n\nclinging to the status quo, more \nclinging to the status quo, more prefectural government and The 77 Bank, \nprefectural government and The 77 Bank, \n\npeople now think, “Oh, well, my \npeople now think, “Oh, well, my Ltd., which is based in Miyagi. \nLtd., which is based in Miyagi. \n\n**Miyata**: In the same way, other SMFG \n: In the same way, other SMFG life is fairly comfortable and \nlife is fairly comfortable and \n\n\n\nCommitment from the Top \n\nTakeshi Kunibe \n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\nPresident and CEO \nSumitomo Mitsui Banking Corporation \n\n**What can we do now to spur**\n**the reconstruction and revitalization**\n**of Japan, and help**\n**resolve global issues?**\nuntil the country became an economic \nuntil the country became an economic \n\nthat’s enough for me.” This sense \nthat’s enough for me.” This sense Group companies have been sending out \nGroup companies have been sending out \n\nof stagnation, or resignation, \nof stagnation, or resignation, volunteers, and providing donations not only \nvolunteers, and providing donations not only \n\nthat people feel in their lives has spread \nthat people feel in their lives has spread as a company, but also through individual \nas a company, but also through individual \n\njuggernaut. However, in the early 1970s, \njuggernaut. However, in the early 1970s, throughout Japan. But when the disaster \nthroughout Japan. But when the disaster employees. SMBC was at the heart of all these \nemployees. SMBC was at the heart of all these \n\npeople became complacent about their \npeople became complacent about their struck, people again came together and \nstruck, people again came together and activities, and this was a good opportunity \nactivities, and this was a good opportunity \n\naffluence, and stopped working hard and \naffluence, and stopped working hard and worked together in the recovery effort. I \nworked together in the recovery effort. I \n\n*Uplifting the nation’s spirits*\n*Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \n\nand increasing numbers of the aged. \nand increasing numbers of the aged. \n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society \nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society \n\nfor us to appreciate anew how our business \nfor us to appreciate anew how our business", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "financial institutions in the disaster-affected areas \nfinancial institutions in the disaster-affected areas \n\n\n\n\n\n\n\n\n\n\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment \n\n\n\n**Creating systems for sustainability**\n\n**Environmental measures**\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \nThe SMFG Group has positioned environmental businesses as an area where it can most effectively \n\nleverage its role as a leading financial services group. This is a priority field for the future. \nleverage its role as a leading financial services group. This is a priority field for the future. \n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but \n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to \n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired \n\ntechnological breakthroughs, with a particular focus on the Asian region. \ntechnological breakthroughs, with a particular focus on the Asian region. \n\n\n\n**Further measures needed**\n\n\n\n\n\n**Symbiosis and diversity**\n\n**Global challenges**\n\nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \nIn anticipation of further global expansion, the SMFG Group is aggressively internationalizing its \n\noperations both in Japan and overseas. Initiatives include aggressive development of advisory \noperations both in Japan and overseas. Initiatives include aggressive development of advisory \n\nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \nservices for infrastructure upgrades in emerging economies, a cross-departmental endeavor, \n\nas well as contributions to the international community and the environmental business, chiefly \nas well as contributions to the international community and the environmental business, chiefly \n\nthrough branches and representative offices overseas. \nthrough branches and representative offices overseas. \n\nWe will continue to discuss and review various approaches to issues facing the international \nWe will continue to discuss and review various approaches to issues facing the international \n\ncommunity so as to build up trust internationally as a global player. \ncommunity so as to build up trust internationally as a global player. \n\n**Further measures needed**\n\nShare expertise in corporate social responsibility \nShare expertise in corporate social responsibility ● \n\nwith the international community \nwith the international community \n\nImprove financial services in preparation for the \nImprove financial services in preparation for the ● \n\nglobalization of operations in Japan (multilingual \nglobalization of operations in Japan (multilingual \n\nsupport) \nsupport) \n\nPromote diversity \nPromote diversity ● \n\nIn the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "the Japan Research Institute and SMBC \nthe Japan Research Institute and SMBC \n\nCardholders and employees of Sumitomo \nCardholders and employees of Sumitomo \n\nMitsui Card joined a literary social contribution \nMitsui Card joined a literary social contribution \n\ninitiative by participating in the Books To \ninitiative by participating in the Books To \n\nThe People 2010 project operated by BOOKOFF \nThe People 2010 project operated by BOOKOFF \n\n environ- \nCORP. This project aims to provide environ \nCORP. This project aims to provide \n\nments in which children can read books in \nments in which children can read books in \n\npurpose-built facilities, through donations to \npurpose-built facilities, through donations to \n\nRoom to Read, a non-governmental organi- \nRoom to Read, a non-governmental organi \n\nzation that supports education in developing \nzation that supports education in developing \n\ncountries. These NGO donations are pegged \ncountries. These NGO donations are pegged \n\nto total numbers of used books and other \nto total numbers of used books and other \n\nitems purchased by cardholders. Through \nitems purchased by cardholders. Through \n\nthe Sumitomo Mitsui Card-operated online \nthe Sumitomo Mitsui Card-operated online \n\nshopping mall POINT UP Mall, cardholders \nshopping mall POINT UP Mall, cardholders \n\nJapan, with the participation of 280 employ- \nJapan, with the participation of 280 employ \n\nees and their families. In addition, regional \nees and their families. In addition, regional \n\ncontribution activities were carried out by \ncontribution activities were carried out by \n\nSMBC and SMBC Nikko Securities donate a \nSMBC and SMBC Nikko Securities donate a \n\nportion of the profits from marketing of the \nportion of the profits from marketing of the \n\n“The \nSMBC Nikko World Bank Bond Fund ( “The \nSMBC Nikko World Bank Bond Fund \n\n) to the Japanese \nWorld Bank Green Fund” ) to the Japanese \nWorld Bank Green Fund \n\nRed Cross Society and the Japan Committee \nRed Cross Society and the Japan Committee \n\nfor UNICEF. \nfor UNICEF. \n\ns first \nThis investment trust is the world’s first \nThis investment trust is the world \n\nfund developed in cooperation with the \nfund developed in cooperation with the \n\nWorld Bank that invests in World Bank green \nWorld Bank that invests in World Bank green \n\nbonds, according to research by Nikko \nbonds, according to research by Nikko \n\nAsset Management Co., Ltd. Funds from \nAsset Management Co., Ltd. Funds from \n\nthe World Bank green bonds support only \nthe World Bank green bonds support only \n\nWorld Bank-funded projects in developing \nWorld Bank-funded projects in developing \n\ncountries to mitigate global warming. \ncountries to mitigate global warming. \n\n*Research by Nikko Asset Management Co., Ltd. \n\nare encouraged to buy used books through \nare encouraged to buy used books through \n\nBOOKOFF, and employees collect and donate \nBOOKOFF, and employees collect and donate \n\nused books from their homes and companies. \nused books from their homes and companies. \n\n\n\n\n\n\n\nNikko Securities carry out ongoing cleanup \nNikko Securities carry out ongoing cleanup \n\nand other activities in the areas around their \nand other activities in the areas around their \n\noffices and branches. \noffices and branches. \n\nThe Minato Bank and Kansai Urban Banking \nThe Minato Bank and Kansai Urban Banking \n\nCorporation also engage in cleanup activities \nCorporation also engage in cleanup activities \n\naround Suma Beach and Lake Biwa, to \naround Suma Beach and Lake Biwa, to \n\nprotect the regional environment. \nprotect the regional environment. \n\n\n\n\n\nVolunteers at the Shonan Erosion Control Forest project \n62 participants \nHelping clean up Senju Shinbashi bridge that spans Ara River \n64 participants \nHelping clean up Nishi Araibashi bridge that spans Ara River \n37 participants", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\nEnvironmental and \nenergy businesses: \n34.2% \nOthers: \n23.7% \n\n**Together with Our Customers**\n\nKansai Genki \nFund \nFinancing \nby sector \n(June 30, 2011) \n\nInvestment \nand business \nexpansion \nin Asia, etc.: \n10.5% \n\n**We believe it is important to contribute to maintenance and protection of**\n**the natural environment and the sustainable development of regional society**\n**through our core business, hand in hand with the customer.**\n\nEnvironmentally Responsible \nEnvironmentally Responsible \nCompany Support Fund \nCompany Support Fund \nEnvironmental Facilities \nEnvironmental Facilities \nSupport Fund \nSupport Fund \n\n**Name**\n\n**Social contribution**\n**and donation type-cards**\n**Credit cards**\n\nMedical, nursing and healthcare businesses: \n31.6% \n\n¥50 billion \n¥50 billion **Size of fund** The “Chikyuni Yasashii Card” \n\nThe fund supports companies \n**Outline**The fund supports companies \nwith environmentally-aware \nwith environmentally-aware \nmanagements or involvement in \nmanagements or involvement in \nenvironmental businesses \nenvironmental businesses \n\n**Harnessing the Bank of Japan’s**\n**“Fund-Provisioning Measure**\n**to Support Strengthening**\n**the Foundations**\n**for Economic Growth”**\n\nGenki Fund is used to help customers develop \nGenki Fund is used to help customers develop \n\na wide range of businesses. The bank will \na wide range of businesses. The bank will \n\ncontinue to play its role as a regional financial \ncontinue to play its role as a regional financial \n\ninstitution dedicated to supporting customers \ninstitution dedicated to supporting customers \n\nKansai Genki Fund: \nthat show originality and energy in helping \nthat show originality and energy in helping \n\nA helping hand for the regional economy \ndevelop the Kansai economy. \ndevelop the Kansai economy. \n\nKansai Urban Banking Corporation has \nKansai Urban Banking Corporation has \nKansai Genki Fund \nKansai Genki Fund **Name**\nlaunched a support initiative to boot up \nlaunched a support initiative to boot up \n\n¥50 billion \n¥50 billion **Size of fund**\nnext-generation industries. Marketing teams \nnext-generation industries. Marketing teams \n\nwith specialists in fields such as medical and \nwith specialists in fields such as medical and \n**Outline**\n\nnursing care, and environment and energy \nnursing care, and environment and energy \n\n\n\n\n\nFiscal 2011 is the 20th anniversary of the \nFiscal 2011 is the 20th anniversary of the \n\n“Chikyuni Yasashii Card,” a social contribution \n“Chikyuni Yasashii Card,” a social contribution \n\nand donation-type credit card launched by \nand donation-type credit card launched by \n\nCedyna in 1991. Donations made through \nCedyna in 1991. Donations made through \n\nthe card totaled over ¥500 million by 2006, \nthe card totaled over ¥500 million by 2006, \n\nand are expected to surpass ¥600 million \nand are expected to surpass ¥600 million \n\nin the coming fiscal year—a tribute to the \nin the coming fiscal year—a tribute to the \n\ngenerosity of cardholders. \ngenerosity of cardholders. \n\n“Chikyuni Yasashii Cards” fall into 14 \n“Chikyuni Yasashii Cards” fall into 14 \n\ncategories, based on a global environmental \ncategories, based on a global environmental \n\nprotection theme. These range from major \nprotection theme. These range from major \n\nissues affecting the entire planet, such as \nissues affecting the entire planet, such as \n\n\n\n**Cedyna issues other social**\n**contribution and**\n**donation-type credit cards**\n\n**Cedyna’s**\n**social contribution and**\n**donation type-card**\n**“Chikyuni Yasashii Card”**\nChina Business Support Fund \nChina Business Support Fund **Name**\n\n¥50 billion \n¥50 billion **Size of fund**\n\nThe fund supports for companies \n**Outline**The fund supports for companies \nconsidering moving into China, or \nconsidering moving into China, or \nexpanding their business there \nexpanding their business there", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Does Chesapeake Energy have a project to reduce excessive water use?", + "target_page": 28, + "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. \n\n\n\n**ON THE COVER**\n*Moving west, a Chesapeake rig*\n*drills toward the Niobrara Shale*\n*in the Powder River Basin of*\n*southeastern Wyoming, one of*\n*several new liquids-rich plays*\n*that are enabling the company*\n*to increase its profitability and*\n*return on capital.*", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has \nbuilt a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays \nand in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica \nunconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise \ngained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of \nnatural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of \ndivestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays. \n\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion \ncubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end \n2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the \nU.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities — almost 50 years worth of drilling \nopportunities — on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake’s ownership position \nin our key operating areas. \n\n\n\nRockies \n\n**8**", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop \naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen- \ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling \nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion \nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments \nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage- \nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and \nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination \nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach \ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, \nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield \nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply \nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for \nJeff Fisher \nSenior Vice President – Production \n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer \n\n\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures. \n\n\n\n**Will U.S. natural gas prices reconnect with world natural gas prices?**\nNatural gas is a premium product and a cleaner-burning fuel than coal or oil-related products, including gasoline, \ndiesel and heating oil. Despite this fact, over the past two years natural gas has received a low price in the U.S. \nmarket relative to coal and oil-related products, primarily as a result of a temporary surplus of production. This \nsurplus has been principally caused by high levels of drilling activity as producers focused on holding by produc- \ntion (HBP) leasehold in new highly productive, low cost natural gas shale plays. In essence, producers reinvented \nU.S. supply ahead of reinventing of U.S. demand. We believe HBP-incentivized drilling on natural gas plays will \nlargely come to an end in 2012, and U.S. demand will soon also be reinvented to allow U.S. natural gas prices to \nreconnect to price parity with world natural gas prices that have risen to more than double U.S. natural gas prices. \nThis surge in world natural gas prices has been in response to $100+ oil prices and surging global liquefied \nnatural gas (LNG) demand. In our view, the arbitrage in value between competing fuels is simply too wide. Capital \nand ideas will flow toward projects that make the most of this price disparity. Chesapeake and other companies are \nworking to create the ability to export natural gas from the U.S. Gulf Coast and other regions in the form of LNG to \npremium Pacific Rim, European and South American markets, perhaps as soon as 2015. This initiative will also be \naided by the widening of the Panama Canal to accommodate large LNG vessels. Furthermore, we believe that the \ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it \nbe compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL) \nnatural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural \ngas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural \ngas is clean, affordable, abundant and American. Why*shouldn’t*it trade at a BTU premium in the years ahead? \n\nJeff Mobley \nSenior Vice President – \nInvestor Relations and Research \n\n**Why is an investment grade rating on its debt securities important to CHK?**\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt \nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s \nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake. \nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in \norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts \nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance \nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects, \nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our \nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest- \nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Strong Partners**\nOver the past few years, in addition to gathering the industry’s best \nassets, Chesapeake has also built the industry’s finest collection of global \nenergy partners and energy stock investors. We have now entered into \ntransactions with PXP, BP, Statoil, Total, CNOOC and BHP Billiton. Collec- \ntively, we have sold these companies certain assets for total consider- \nation of $20.5 billion in the form of cash and drilling and completion \ncarries for which our net cost was only $6.1 billion resulting in overall \nvalue creation of $14.4 billion. While these transactions have been very \n\nhappen to manage some of the world’s largest pools of capital and have \na very long-term investment horizon. Their support is an important \nvalidation of our strategy. \n\n**Short-Term Pain for Long-Term Gain**\nDespite this all-star lineup of global partners and investors, some other \ninvestors have not yet fully recognized the benefits of our industry \nleadership in acquiring unconventional natural gas and liquids assets. \nWhether it was our leveraged balance sheet during recent tough reces- \nsionary times, our heavy focus on natural gas during a time of persistent \nmarket pessimism about natural gas prices or our large capital invest- \nments in undeveloped liquids-rich leasehold undertaken to enable \nChesapeake to remain an industry leader in the years ahead, it is clear \n\n\n\nrewarding to our buyers, they have been truly outstanding for Chesapeake, \nproviding us an attractive source of capital, a reduction of risk, a quick \nrecovery of our leasehold investment in new plays and a much greater \nability to capture a large resource base with decades of highly profitable \ndrilling opportunities. \n\nthat we were less popular in the stock market in 2010 than we were in \n2009, when our stock price increased by 60%. \n\nWe anticipated that some market unpopularity in 2010 would \nlikely be the price we would pay as we positioned Chesapeake to be \nthe leader not only in unconventional U.S. natural gas, but also in \nunconventional U.S. liquids. However, now that we have largely com- \npleted the investments needed to accomplish this transition to a port- \nfolio balanced with liquids, the rebound in our stock price could be sharp \nas investors begin to focus more clearly on Chesapeake’s three-way \ntransition from an asset gatherer to an asset harvester, from less natural \ngas exposure to more liquids exposure and from a leveraged balance \nsheet to one worthy of an investment grade rating. \n\nIn addition, we are the only U.S. E&P company that has attracted \nto its stock ownership roster some of the world’s leading government- \nsponsored investors: Temasek Holdings (Singapore), China Investment \nCorporation, Korea Investment Corporation and Abu Dhabi Investment \nAuthority. Along with our largest shareholder, Memphis, Tennessee- \nbased Southeastern Asset Management (12%), these shareholders are \nsome of the world’s largest and most astute investors, and who also \n\nAccordingly, in early January 2011, we announced our “25/25 Plan,” \na two-year plan designed to reduce our long-term debt by 25% while \nstill growing the company’s production by 25%. We designed this plan \nto articulate very clearly the benefits of becoming an asset harvester", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "2010 ANNUAL REPORT |**18**\n\n**LIQUIDS-RICH AREAS**\n\n2010 Total Production: \n145 bcfe, +4%, 14% \nAnadarko Basin The Anadarko Basin is home to four of Chesapeake’s liquids-rich plays, \nwhich we anticipate will become significant contributors to our growth in the years ahead. \n**5**\n\n12/31/10 Proved Reserves: \n2,440 bcfe, +21%, 14% \n\nChesapeake was one of the first to utilize modern horizontal drilling methods and has assembled \nan unrivaled leasehold position in numerous horizontal liquids-rich plays in the basin. Chesapeake \nwill continue drilling with a focus on the Granite Wash, where rates of return are the highest in our \ncompany, and with an increasing focus on the Cleveland, Tonkawa and Mississippian liquids-rich \nunconventional plays. We estimate we could drill up to 11,400 net wells on our Anadarko Basin \nacreage in the future and plan to utilize an average of 31 operated rigs in 2011 to further develop \nour current 1.7 million net leasehold acres. \n\n12/31/10 Net Leasehold Acres: \n1,420,000, +15%, 11% \n\n\n\n2010 Total Production: \n0 bcfe, NM, NM \n\n12/31/10 Proved Reserves: \n10 bcfe, NM, NM \n\n12/31/10 Net Leasehold Acres:***\n205,000, +14%, 2% \n\n2010 Total Production: \n2 bcfe, NM, NM \n\n12/31/10 Proved Reserves: \n110 bcfe, NM, 1% \n\n12/31/10 Net Leasehold Acres: \n470,000, +488%, 4% \n\n\n\nEagle Ford Shale As part of a growing emphasis on increasing oil and natural gas liquids \n**6**\nproduction, Chesapeake has built the industry’s second-largest leasehold position in the Eagle \nFord Shale play in South Texas. In 2010 Chesapeake increased its leasehold from 80,000 net acres at the \nbeginning of the year to more than 600,000 net acres. In November 2010, Chesapeake completed \na $2.2 billion Eagle Ford Shale joint venture agreement with Beijing-based CNOOC Limited \n(NYSE:CEO), whereby CNOOC acquired a 33.3% interest in 600,000 net leasehold acres in the Eagle \nFord Shale. CNOOC paid Chesapeake approximately $1.12 billion in cash at closing and will pay 75% \nof Chesapeake’s share of drilling and completion expenditures until the $1.08 billion carry obligation \nhas been funded, which Chesapeake expects to occur by year-end 2012. Our focus has been in the wet gas and \noil prone portions of the play. We estimate we could drill up to 5,500 net wells on our Eagle Ford acreage and plan \nto utilize an average of 23 operated rigs in 2011 to further develop our leasehold position in the Eagle Ford Shale. In addition, \nwe believe that the Pearsall Shale should be prospective for natural gas underneath approximately 75% of our Eagle Ford leasehold. \n\n2010 Total Production: \n60 bcfe, -20%, 6% \n\n12/31/10 Proved Reserves: \n770 bcfe, +4%, 5% \n\n12/31/10 Net Leasehold Acres: \n1,200,000, -44%, 9% \n\nPermian Basin Chesapeake has built a strong position of approx- \nimately 1.2 million net leasehold acres in the Permian Basin including \n\n**7**\n560,000 net leasehold acres in the Bone Spring, Avalon, Wolfcamp and Wolfberry \nunconventional liquids plays. This area has the potential to deliver significant \nupside as we move toward increasing our oil production substantially in the years \nahead. We have developed multiple new horizontal oil projects in this area, where \nwe plan to utilize an average of approximately eight operated rigs in 2011 to further \ndevelop our leasehold in the Permian and Delaware basins and estimate we could drill \nup to 4,400 net wells. \n\n\n\n2010 Total Production: \n0 bcfe, NM, NM \n\n12/31/10 Proved Reserves: \n10 bcfe, NM, NM \n\n12/31/10 Net Leasehold Acres: \n800,000, +135%, 6% \n\n\n\nRockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale, \nFrontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Rockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale, \nFrontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming \n\n**8**\nand Colorado. In February 2011, Chesapeake completed a $1.3 billion joint venture agreement with \nCNOOC, whereby CNOOC acquired a 33.3% interest in Chesapeake’s approximately 800,000 net \nleasehold acres in the Powder River and DJ basins. CNOOC paid Chesapeake approximately $570 million \nin cash at closing and will pay an additional $697 million in carries by funding 66.7% of Chesapeake’s \n\n\n \n \n \n \n [html]\n
Note : Figuredo not add
Chesape*
Induced to last yearto utilize
*pany total
develop*
Chale acreage overlaps withour part
", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**30**| EMPLOYEES \n\nFROM PENNSYLVANIA TO NEW MEXICO, \nWE THANK EVERY MEMBER \nOF TEAM CHESAPEAKE » \n\nWe would like to thank each of Chesapeake’s 10,021 employees who brought a unique combination of experience, talent and \npositive attitude to the company in 2010. Last year the company was honored for the fourth consecutive year with inclusion \nin the FORTUNE 100 Best Companies to Work For® list at #32, the highest-ranking company in the energy production industry. \n\nBrent Scruggs \nVance Shires \nStuart Skelton \nDavid W. Smith \nCatherine Stairs \nJerry Townley \nNick Wavers \nBrenda Wheeler \nBob Whitman \nDavid Whitten \nBrent Williams \nBob Woodside \n\n**1989 (3)**\nKinney Louthan \nAubrey McClendon \nPatsy Watters \n\n**1990 (3)**\nKevin Decker \nDavid Higgins \nCindi Williams \n\n**1991 (4)**\nSteve Dixon \nMarilyn Pollard \nPatti Schlegel \nJulie Washam \n\n**1992 (2)**\nTom Price \nMelanie Weaver \n\n**1993 (5)**\nRalph Ball \nDavid Desalvo \nMike Johnson \nRandy Pierce \nDave Wittman \n\nJohn Qualls \nPat Rolla \nHank Scheel \nCharles W. Scholz \nStan Stinnett \nBrenda Stremble \nGreg Weinschenk \nBrian Winter \nJolene Schur \nCarolyn Simmons \nApril Smith \nWilma Smith \nFrank Unsicker \nIvajean Wallace \nCraig White \nDori Williams \nCurtis Williford \n\n**1996 (29)**\nHeather Anderson \nJamie Carter \nJasen Davis \nGeorge Denny \nTim Denny \nGary Dunlap \nLaurie Eck \nJan Fair \nBarbara Frailey \nLinda Gardner \nCharlene Glover \nRandy Goben \nJim Gomez \nMelissa Gruenewald \nDoug W. Johnson \nJim Johnson \nTaylor Kemp \nMike Lebsack \nSteve Lepretre \nLarry Lunardi \nJohn Marks \nSandi Michalicka \nLiz Muskrat \nAngela Ports \nTommy Putz \nBryan Sagebiel \nKurt Schrantz \nPhyllis Trammell \nAllan Waldroup \n\n**1994 (16)**\nBarbara Bale \nMartha Burger \nMichael Coles \nTraci Cook \nRon Goff \nGreg Knight \nDan LeDonne \nRich McClanahan \nSteve W. Miller \nTommy Morphew \nPat Pope \nDanny Rutledge \nStephanie Shedden \nRonnie Ward \nShelly White \nGerald Zgabay \n\n**1995 (26)**\nRichey Albright \nPaula Asher \nEric Ashmore \nRandy Borlaug \nShelli Butler \nMelissa Chambers \nDale Cook \nTed Davis \nMandy Duane \nSteve Gaskins \nJennifer Grigsby \nGayle Harris \nHenry Hood \nLorrie Jacobs \nBarry Langham \nCindy LeBlanc \nLeland Murray \nFred Portillo \n\n**1997 (32)**\nLinda Allen \nKarla Allford \nSara Caldwell \nSteve Cody \nKristine Conway \nRandy Cornelsen \nMichelle Cullen \nBruce Dixon \nGreg Drwenski \nMark B. Evans \nJoy Franklin \nRob Gilkes \nShane Hamilton \nMichael Horn \nEric Hughes \nDavid B. Jones \nMike Ludlow \nSarah Lumen \nLauren Matlock \nSam McCaskill \nBob Neely \nBob Pope \nErick Porter \n\n**1998 (62)**\nStephen Adams \nCrae Barr \nFrancy Beesley \nJoel Bennett \nLeonard Berry Jr. \nSusan Bradford \nMark Brown \nRandy Brown \nLori Budde \nTerry Caldwell \nBob Campbell \nTed Campbell \nSherri Childers \nTana Clark \nJennifer Copeland \nDavid Craycraft \nIris Drake \nMac Drake \nGary Egger \nSteve Emick \nDan Estes \nDennis Frick \nStacy Gilbert \nJim Gowens \nKelsey Hammit \nTresa Hammond \nJeff L. Harris \nDebbie Hulett \nJulie Ingram \nTammy Kelln \nRose Kim \nSteve King \nMike Lancaster \nChris H. Lee \nCarrie Lewis-Crawford \nCraig Madsen \nJohn Marshall \nKim Massey \nAllen May \nDennis McGee \nAllen A. Miller \nBill Miller \nCarey Milligan \nDavid Mobley \nWesley Myers \nBud Neff Jr. \nKathy Nowlin \nDon Pannell \nMichael Park \nMandy Pena \nMatt Rockers \nKelly Ruminer \nGreg Small \n\n**1999 (22)**\nJonathan Ball \nMel Barker \nSue Black \nDory Douglas \nMark Edge \nJenny Ferguson \nJeanie Fuller \nSusan Green \nYamei Hou \nDoug Jacobson \nJim Kelley \nLynn Looper \nDea Mengers \nMichael Miller \nTammy Nguyen \nLaCosta Rawls \nLarry Shipley \nMichelle Smith \nConnie Turner \nCourtney Tyson \nTonya Vallerand \nTobin Yocham", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "process is saving the company an average of $12 million per year in the \nMarcellus Shale alone. \n\ntopics covered includes Occupational Safety and Health Administra- \ntion (OSHA)-required safety training, such as hazard communica- \ntion, personal protective equipment, confined spaces and respiratory \nprotection. In addition to operations training, we also provide safe work \npractices, vehicle safety and specialized training for employees and \ncontractors who perform specific tasks such as emergency response. \nSpecialized environmental training is also provided to address topics \nsuch as air compliance, waste management and spill prevention. \n\n***Green Frac*®**\nChesapeake’s*Green Frac®*program was launched in October 2009 to \nevaluate the types of additives typically used in the fracking process. As \nan industry-leading program, \n*Green Frac*is a decisive move \ntoward an even greener fluid \nsystem. By reviewing all of the ingredients typically used in each fracking \noperation, the program identifies additives that can be removed and tests \nalternatives. To date, the company has eliminated 25% of the additives \nused in frack fluids in most of its shale plays. \n\nIn 2010 we conducted a total of 2,306 instructor-led training courses \nand 67 web-based training courses on safety and environmental pro- \ngrams for employees, contractors, vendors and visitors. \n\nTo further our training efforts and emphasize the importance \nof creating a safe work environment, the company established the \nChesapeake SAFE program in July 2010. Through workshop training \ncourses, the program focuses on developing safe behaviors, promot- \ning a safety-conscious culture and reducing risk in all operating areas. \nBy year-end 2010, more than 4,200 employees and consultants partici- \npated in 121 workshops in 18 cities across the country. \n\n*Green Frac*is also establishing simple guidelines for the company \nand its vendors to select fracking ingredients that present minimal risks \nto people and the environment. These guidelines will also be used to \n\nFrom state-of-the-art training facilities \n\nto extensive health and wellness programs, \n\nChesapeake provides employees with the skills \n\nthey need to succeed both in the field and at \n\nthe office while creating a well-rounded envi- \n\nronment for employees and their families. \n\n\n\n*Learning from the best — Our commitment to creating a safe work environ-*\n*ment continued to grow in 2010 with the founding of the Chesapeake SAFE*\n*program. Focused on developing safe behaviors, promoting a safety-conscious*\n*culture and eliminating risk in all operating areas, the program has trained*\n*more than 4,200 employees and consultants.*\n\nChesapeake’s commitment to employee health and wellness is also \nevident at our 72,000-square-foot fitness center, which provides Oklahoma \nCity headquarters employees and their families with on-site access to \nstate-of-the-art health equipment, recreation leagues and group exercise \nclasses. For employees who work outside of our headquarters, we subsi- \ndize family fitness memberships and recreational entry fees. \n\nincrease public understanding of the process and its necessity in the \nproduction of American natural gas. \n\nTo further promote healthy lifestyles, the company-wide Living Well \nprogram provides financial incentives for employees who participate in \nregular exercise, education, motivation and intervention. In 2010 more \nthan 6,900 employees participated in Chesapeake’s Living Well program \nwith more than 70% earning financial awards.", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", + "target_page": 16, + "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. \n\n\n\n**ON THE COVER**\n*Moving west, a Chesapeake rig*\n*drills toward the Niobrara Shale*\n*in the Powder River Basin of*\n*southeastern Wyoming, one of*\n*several new liquids-rich plays*\n*that are enabling the company*\n*to increase its profitability and*\n*return on capital.*", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**14**| LETTER TO SHAREHOLDERS \n\n*Rig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a*\n*series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.*\n\nI am pleased to report that we have apparently finally convinced \nPresident Barack Obama and Congressional leadership to recognize that \nthe energy path America is on today is completely unsustainable. There \nappears to be growing recognition that it is spectacularly dangerous for \nAmerica to continue importing 9 million barrels of oil per day and exporting more than $1 billion per day in national wealth to oil exporting countries. \nAmerica’s undiminished appetite for foreign oil has created the larg- \nest wealth transfer in the history of the world. The political leadership \nin Washington, D.C., has not seemed overly concerned about this issue \nuntil recently. However, after President Obama’s recent speech calling \n\n(1) \n\n Reserve replacement is calculated by dividing net reserve additions from all sources by actual production for the corresponding period. We calculate drilling and net acquisition cost per mcfe by dividing total drilling \nand net proved property acquisition costs incurred during the year (excludes certain costs primarily related to net unproved property acquisitions, geological and geophysical costs and deferred taxes related to \ncorporate acquisitions) by total proved reserve additions excluding price-related revisions. \n A non-GAAP financial measure, as defined below. Please refer to the Investors section of our website at www.chk.com for reconciliations of non-GAAP financial measures to comparable financial measures calculated \nin accordance with generally accepted accounting principles. \n• Adjusted ebitda is net income (loss) before interest expense, income tax expense (benefit), and depreciation, depletion and amortization expense, as adjusted to remove the effects of certain items that manage- \n\n(2) \n\nment believes affect the comparability of operating results. \n\n• Operating cash flow is cash provided by operating activities before changes in assets and liabilities. \n• Adjusted earnings per fully diluted share is net income (loss) per share available to Chesapeake common stockholders, assuming dilution, as adjusted to remove the effects of certain items that management \nbelieves affect the comparability of operating results. \n(3) \n FORTUNE 100 Best Companies to Work For® listed in the magazine’s February 7, 2011 issue.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**30**| EMPLOYEES \n\nFROM PENNSYLVANIA TO NEW MEXICO, \nWE THANK EVERY MEMBER \nOF TEAM CHESAPEAKE » \n\nWe would like to thank each of Chesapeake’s 10,021 employees who brought a unique combination of experience, talent and \npositive attitude to the company in 2010. Last year the company was honored for the fourth consecutive year with inclusion \nin the FORTUNE 100 Best Companies to Work For® list at #32, the highest-ranking company in the energy production industry. \n\nBrent Scruggs \nVance Shires \nStuart Skelton \nDavid W. Smith \nCatherine Stairs \nJerry Townley \nNick Wavers \nBrenda Wheeler \nBob Whitman \nDavid Whitten \nBrent Williams \nBob Woodside \n\n**1989 (3)**\nKinney Louthan \nAubrey McClendon \nPatsy Watters \n\n**1990 (3)**\nKevin Decker \nDavid Higgins \nCindi Williams \n\n**1991 (4)**\nSteve Dixon \nMarilyn Pollard \nPatti Schlegel \nJulie Washam \n\n**1992 (2)**\nTom Price \nMelanie Weaver \n\n**1993 (5)**\nRalph Ball \nDavid Desalvo \nMike Johnson \nRandy Pierce \nDave Wittman \n\nJohn Qualls \nPat Rolla \nHank Scheel \nCharles W. Scholz \nStan Stinnett \nBrenda Stremble \nGreg Weinschenk \nBrian Winter \nJolene Schur \nCarolyn Simmons \nApril Smith \nWilma Smith \nFrank Unsicker \nIvajean Wallace \nCraig White \nDori Williams \nCurtis Williford \n\n**1996 (29)**\nHeather Anderson \nJamie Carter \nJasen Davis \nGeorge Denny \nTim Denny \nGary Dunlap \nLaurie Eck \nJan Fair \nBarbara Frailey \nLinda Gardner \nCharlene Glover \nRandy Goben \nJim Gomez \nMelissa Gruenewald \nDoug W. Johnson \nJim Johnson \nTaylor Kemp \nMike Lebsack \nSteve Lepretre \nLarry Lunardi \nJohn Marks \nSandi Michalicka \nLiz Muskrat \nAngela Ports \nTommy Putz \nBryan Sagebiel \nKurt Schrantz \nPhyllis Trammell \nAllan Waldroup \n\n**1994 (16)**\nBarbara Bale \nMartha Burger \nMichael Coles \nTraci Cook \nRon Goff \nGreg Knight \nDan LeDonne \nRich McClanahan \nSteve W. Miller \nTommy Morphew \nPat Pope \nDanny Rutledge \nStephanie Shedden \nRonnie Ward \nShelly White \nGerald Zgabay \n\n**1995 (26)**\nRichey Albright \nPaula Asher \nEric Ashmore \nRandy Borlaug \nShelli Butler \nMelissa Chambers \nDale Cook \nTed Davis \nMandy Duane \nSteve Gaskins \nJennifer Grigsby \nGayle Harris \nHenry Hood \nLorrie Jacobs \nBarry Langham \nCindy LeBlanc \nLeland Murray \nFred Portillo \n\n**1997 (32)**\nLinda Allen \nKarla Allford \nSara Caldwell \nSteve Cody \nKristine Conway \nRandy Cornelsen \nMichelle Cullen \nBruce Dixon \nGreg Drwenski \nMark B. Evans \nJoy Franklin \nRob Gilkes \nShane Hamilton \nMichael Horn \nEric Hughes \nDavid B. Jones \nMike Ludlow \nSarah Lumen \nLauren Matlock \nSam McCaskill \nBob Neely \nBob Pope \nErick Porter \n\n**1998 (62)**\nStephen Adams \nCrae Barr \nFrancy Beesley \nJoel Bennett \nLeonard Berry Jr. \nSusan Bradford \nMark Brown \nRandy Brown \nLori Budde \nTerry Caldwell \nBob Campbell \nTed Campbell \nSherri Childers \nTana Clark \nJennifer Copeland \nDavid Craycraft \nIris Drake \nMac Drake \nGary Egger \nSteve Emick \nDan Estes \nDennis Frick \nStacy Gilbert \nJim Gowens \nKelsey Hammit \nTresa Hammond \nJeff L. Harris \nDebbie Hulett \nJulie Ingram \nTammy Kelln \nRose Kim \nSteve King \nMike Lancaster \nChris H. Lee \nCarrie Lewis-Crawford \nCraig Madsen \nJohn Marshall \nKim Massey \nAllen May \nDennis McGee \nAllen A. Miller \nBill Miller \nCarey Milligan \nDavid Mobley \nWesley Myers \nBud Neff Jr. \nKathy Nowlin \nDon Pannell \nMichael Park \nMandy Pena \nMatt Rockers \nKelly Ruminer \nGreg Small \n\n**1999 (22)**\nJonathan Ball \nMel Barker \nSue Black \nDory Douglas \nMark Edge \nJenny Ferguson \nJeanie Fuller \nSusan Green \nYamei Hou \nDoug Jacobson \nJim Kelley \nLynn Looper \nDea Mengers \nMichael Miller \nTammy Nguyen \nLaCosta Rawls \nLarry Shipley \nMichelle Smith \nConnie Turner \nCourtney Tyson \nTonya Vallerand \nTobin Yocham", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer \n\n\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has \nbuilt a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays \nand in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica \nunconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise \ngained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of \nnatural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of \ndivestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays. \n\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion \ncubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end \n2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the \nU.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities — almost 50 years worth of drilling \nopportunities — on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake’s ownership position \nin our key operating areas. \n\n\n\nRockies \n\n**8**", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures. \n\n\n\n**Will U.S. natural gas prices reconnect with world natural gas prices?**\nNatural gas is a premium product and a cleaner-burning fuel than coal or oil-related products, including gasoline, \ndiesel and heating oil. Despite this fact, over the past two years natural gas has received a low price in the U.S. \nmarket relative to coal and oil-related products, primarily as a result of a temporary surplus of production. This \nsurplus has been principally caused by high levels of drilling activity as producers focused on holding by produc- \ntion (HBP) leasehold in new highly productive, low cost natural gas shale plays. In essence, producers reinvented \nU.S. supply ahead of reinventing of U.S. demand. We believe HBP-incentivized drilling on natural gas plays will \nlargely come to an end in 2012, and U.S. demand will soon also be reinvented to allow U.S. natural gas prices to \nreconnect to price parity with world natural gas prices that have risen to more than double U.S. natural gas prices. \nThis surge in world natural gas prices has been in response to $100+ oil prices and surging global liquefied \nnatural gas (LNG) demand. In our view, the arbitrage in value between competing fuels is simply too wide. Capital \nand ideas will flow toward projects that make the most of this price disparity. Chesapeake and other companies are \nworking to create the ability to export natural gas from the U.S. Gulf Coast and other regions in the form of LNG to \npremium Pacific Rim, European and South American markets, perhaps as soon as 2015. This initiative will also be \naided by the widening of the Panama Canal to accommodate large LNG vessels. Furthermore, we believe that the \ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it \nbe compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL) \nnatural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural \ngas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural \ngas is clean, affordable, abundant and American. Why*shouldn’t*it trade at a BTU premium in the years ahead? \n\nJeff Mobley \nSenior Vice President – \nInvestor Relations and Research \n\n**Why is an investment grade rating on its debt securities important to CHK?**\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt \nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s \nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake. \nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in \norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts \nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance \nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects, \nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our \nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest- \nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
domestic oil production as two of its primary attributes, it is encouraging
to see our political leadership finally grasp that natural gas stands alone
as the only affordable, scalable and immediately available alternative to
foreign oil and that U. S. oil production can be increased significantly in
the years ahead.
The events of the past few months have unmistakably driven home
the fact that it is insanity to rely on the Middle East to provide our econ -
omy ' s lifeline of oil. This should be especially obvious when one realizes
that during the next 10 years, America will likely export at least another
\n\nThe combination of these vast new discoveries of unconventional \nnatural gas and liquids provides America with a unique future path- \nway toward greater energy independence, an industrial renaissance, \neconomic rejuvenation and greater national security. I remain fully con- \nfident that the marketplace understands this and that over time the U.S. \nwill more fully embrace and utilize clean, affordable, abundant American \nnatural gas and increased domestic oil production as the best alterna- \ntives to burning environmentally challenged coal and expensive and \ndangerous foreign oil. \n\nThere is now a clear road ahead toward a more sustainable, afford- \nable, dynamic and independent future if America embraces the remark- \nable gift of energy abundance that Chesapeake has helped discover in \nthe U.S. You have my commitment, and the commitment of more than \n\n\n\n\n\n10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards,", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**4**| LETTER TO SHAREHOLDERS \n\nDEAR FELLOW \nSHAREHOLDERS » \n\n2010 was a very important year of transition and achievement for Chesapeake, a year in which we \n\ninitiated three very important strategic shifts: from asset gathering to asset harvesting, from focusing \n\nexclusively on natural gas to a balanced focus on natural gas and liquids and from having a leveraged \n\nbalance sheet to one worthy of an investment grade rating. \n\n\n\n2010 also marked a truly transformative year for our industry. We and \na handful of our peers enhanced our capabilities to find and produce sig- \nnificant new resources of oil and natural gas liquids (collectively, “liquids”) in \nunconventional formations. Chesapeake and these other companies combined \ncreativity, innovation and technology to reinvent the way that our industry \nexplores for and produces natural gas and liquids. \n\nFurthermore, 2010 was the year when global energy companies more \nfully recognized the importance of these developments and the tremendous \nopportunities that have emerged in the U.S. Through a wide variety of trans- \nactions, including several led by Chesapeake, the global energy industry made \nit clear that the assets owned by Chesapeake and some of its peers are the most \nattractive in the world. This realization has already increased the value of high- \nquality unconventional assets in the U.S. and, in time, should lead to higher \nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy \nindustry is beating a path to our door, and we are welcoming it with open arms. \n\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, \nour stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operation- \nally and financially. Here are the year’s highlights for your review: \n\n*Home to three distinct forms*\n*of hydrocarbons: dry natural*\n*gas, natural gas liquids and*\n*oil, the Eagle Ford Shale*\n*in South Texas epitomizes*\n*Chesapeake’s shift to a bal-*\n*anced focus on natural gas*\n*and liquids.*\n\n>> Average daily natural gas and oil production increased 14% from 2.5 billion cubic feet of natural gas \n\nequivalent (bcfe) in 2009 to 2.8 bcfe in 2010; \n\n>> Proved natural gas and oil reserves increased 20% in 2010, from 14.3 trillion cubic feet of natural gas \n\nequivalent (tcfe) to 17.1 tcfe; \n\n>> Reserve replacement for 2010 reached 375% at a drilling, completion and net acquisition cost of only \n\n$0.76 per thousand cubic feet of natural gas equivalent (mcfe)(1); \n\n>> Realized hedging gains were $2.1 billion; \n\n>> Revenues increased 22% to $9.4 billion; \n\n>> Adjusted ebitda(2) increased 15% to $5.1 billion; \n\n>> Operating cash flow(2) increased 5% to $4.5 billion; and \n\n>> Adjusted earnings per fully diluted share(2) increased 16% to $2.95.", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Strong Partners**\nOver the past few years, in addition to gathering the industry’s best \nassets, Chesapeake has also built the industry’s finest collection of global \nenergy partners and energy stock investors. We have now entered into \ntransactions with PXP, BP, Statoil, Total, CNOOC and BHP Billiton. Collec- \ntively, we have sold these companies certain assets for total consider- \nation of $20.5 billion in the form of cash and drilling and completion \ncarries for which our net cost was only $6.1 billion resulting in overall \nvalue creation of $14.4 billion. While these transactions have been very \n\nhappen to manage some of the world’s largest pools of capital and have \na very long-term investment horizon. Their support is an important \nvalidation of our strategy. \n\n**Short-Term Pain for Long-Term Gain**\nDespite this all-star lineup of global partners and investors, some other \ninvestors have not yet fully recognized the benefits of our industry \nleadership in acquiring unconventional natural gas and liquids assets. \nWhether it was our leveraged balance sheet during recent tough reces- \nsionary times, our heavy focus on natural gas during a time of persistent \nmarket pessimism about natural gas prices or our large capital invest- \nments in undeveloped liquids-rich leasehold undertaken to enable \nChesapeake to remain an industry leader in the years ahead, it is clear \n\n\n\nrewarding to our buyers, they have been truly outstanding for Chesapeake, \nproviding us an attractive source of capital, a reduction of risk, a quick \nrecovery of our leasehold investment in new plays and a much greater \nability to capture a large resource base with decades of highly profitable \ndrilling opportunities. \n\nthat we were less popular in the stock market in 2010 than we were in \n2009, when our stock price increased by 60%. \n\nWe anticipated that some market unpopularity in 2010 would \nlikely be the price we would pay as we positioned Chesapeake to be \nthe leader not only in unconventional U.S. natural gas, but also in \nunconventional U.S. liquids. However, now that we have largely com- \npleted the investments needed to accomplish this transition to a port- \nfolio balanced with liquids, the rebound in our stock price could be sharp \nas investors begin to focus more clearly on Chesapeake’s three-way \ntransition from an asset gatherer to an asset harvester, from less natural \ngas exposure to more liquids exposure and from a leveraged balance \nsheet to one worthy of an investment grade rating. \n\nIn addition, we are the only U.S. E&P company that has attracted \nto its stock ownership roster some of the world’s leading government- \nsponsored investors: Temasek Holdings (Singapore), China Investment \nCorporation, Korea Investment Corporation and Abu Dhabi Investment \nAuthority. Along with our largest shareholder, Memphis, Tennessee- \nbased Southeastern Asset Management (12%), these shareholders are \nsome of the world’s largest and most astute investors, and who also \n\nAccordingly, in early January 2011, we announced our “25/25 Plan,” \na two-year plan designed to reduce our long-term debt by 25% while \nstill growing the company’s production by 25%. We designed this plan \nto articulate very clearly the benefits of becoming an asset harvester", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**12**| LETTER TO SHAREHOLDERS \n\nwet natural gas and dry natural gas), similar to the components of the \nEagle Ford Shale. We have made a large commitment to this play and \nhave acquired approximately 1.2 million net leasehold acres and expect \nto increase this total to as much as 1.5 million net leasehold acres in the \ncoming months. We are currently using three rigs to evaluate the play \nand believe our leasehold could support the drilling of up to 12,000 net \nwells. This is an area where we anticipate bringing in a joint venture \npartner late in 2011 or early in 2012. \n\n\n \n \n \n \n [html]\n
0.0000TableTableTableP ‐ CTable1.100Tabled1.TableTablePatientsTable
\n\n**Our People**\nGreat assets cannot exist without great people, so we take great pride \nin hiring, training, motivating, rewarding and retaining what we regard \n\nIn addition, we were honored in December 2010 at the 12th Annual \nPlatts Global Energy Awards as finalists for CEO of the Year, Community \n\nFrom our beginning 22 years ago with 10 \n\nemployees in Oklahoma City to employing \n\nmore than 10,000 people across 15 states \n\ntoday, Chesapeake has always focused on \n\nbuilding first-class human resources within \n\na distinctive corporate culture. \n\n\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an \n\n**Recent Events and a Better Way Forward**\nYou may be aware that I have been outspoken in attempting to persuade \nour country’s political leadership to recognize that the discovery of vast \nresources of unconventional natural gas and oil in the U.S. is a complete \ngame changer for our country from an economic, national security and \nenvironmental perspective. After two years of my best efforts and the \nefforts of many others in the industry, most notably T. Boone Pickens,", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + } + ] +] \ No newline at end of file